Security in Google Cloud Training in United States of America

  • Learn via: Online Instructor-Led / Classroom Based / Onsite
  • Duration: 3 Days
  • Level: Intermediate
  • Price: From €3,861+VAT
  • Upcoming Date:
  • UK Based Global Training Provider

This training course gives you a broad study of security controls and techniques in Google Cloud. Through recorded lectures, demonstrations, and hands-on labs, you’ll explore and deploy the components of a secure Google Cloud solution, including Cloud Identity, Resource Manager, Identity and Access Management (IAM), Virtual Private Cloud firewalls, Cloud Load Balancing, Direct Peering, Carrier Peering, Cloud Interconnect, and VPC Service Controls.

Who this course is for

  • Cloud information security analysts, architects, and engineers
  • Information security/cybersecurity specialists
  • Cloud infrastructure architects

Products

Google: Cloud Identity, Resource Manager, IAM, HSM, Secret Manager, Google Kubernetes Engine, Managed Service for Microsoft Active Directory, Cloud Interconnect, Cloud Storage, Web Security Scanner, Identity-Aware Proxy, VPC Service Controls, Google Cloud’s operations suite (formerly Stackdriver), Google Cloud Armor, Compute Engine, Cloud Data Loss Prevention API

Third party: Forseti Inventory, Forseti Scanner.

We can organize this training at your preferred date and location. Contact Us!

Prerequisites

  • Prior completion of Google Cloud Fundamentals: Core Infrastructure or equivalent experience
  • Prior completion of Networking in Google Cloud or equivalent experience
  • Basic understanding of Kubernetes terminology (preferred but not required)
  • Knowledge of foundational concepts in information security, through experience or through online training such as SANS’s SEC301: Introduction
  • to Cyber Security
  • Basic proficiency with command-line tools and Linux operating system environments
  • Systems Operations experience, including deploying and managing applications, either on-premises or in a public cloud environment
  • Reading comprehension of code in Python or Javascript

What You Will Learn

  • Understand Google’s approach to security.
  • Manage administration identities using Cloud Identity.
  • Implement least privilege administration using Resource Manager and IAM.
  • Implement Identity-Aware Proxy.
  • Implement IP traffic controls using VPC firewalls and Google Cloud Armor.
  • Remediate security vulnerabilities, especially public access to data and virtual machines.
  • Scan for and redact sensitive data using the Cloud Data Loss Prevention API.
  • Analyze changes to resource metadata configuration using audit logs.
  • Scan a Google Cloud deployment with Forseti, to remediate important types of vulnerabilities, especially in public access to data and VMs

Training Outline

Module 01: Foundations of Google Cloud Security

Topics

  • Google Cloud’s Approach to Security
  • The Shared Security Responsibility Model
  • Threats Mitigated by Google and Google Cloud
  • Access Transparency

Objectives

  • Learn about Google Cloud’s approach to security.
  • Understand the shared security responsibility model.
  • Understand the kinds of threats mitigated by Google and by Google Cloud.
  • Define and understand access transparency.

Module 02 Cloud Identity

Topics

  • Cloud Identity
  • Cloud Identity
  • Google Cloud Directory Sync
  • Google Authentication Versus SAML-based SSO
  • Authentication Best Practices

Objectives

  • Learn what Cloud Identity is and what it does.
  • Learn how Directory Sync securely syncs users and permissions between your on-prem LDAP or AD server and the cloud.
  • Understand the two ways Google Cloud handles authentication and how to set up SSO.
  • Explore best practices for managing groups, permissions, domains and admins with Cloud Identity.

Module 03 Identity and Access Management (IAM)

Topics

  • Resource Manager
  • IAM Roles
  • IAM Policies
  • IAM Recommender
  • IAM Troubleshooter
  • IAM Audit Logs
  • IAM Best Practices

Objectives

  • Understand Resource Manager: projects, folders, and organizations.
  • Learn how to implement IAM roles, including custom roles.
  • Understand IAM policies, including organization policies.
  • Understand best practices, including separation of duties and least privilege, the use of Google groups in policies, and avoiding the use of basic roles.
  • Learn how to configure IAM, including custom roles and organization policies.

Activity

  • Lab: Configuring IAM

Module 04 Configuring Virtual Private Cloud for Isolation and Security

Topics

  • VPC Firewalls
  • Load Balancing and SSL Policies
  • Interconnect and Peering Policies
  • Best Practices for VPC Networks
  • VPC Flow Logs

Objectives

  • Learn best practices for configuring VPC firewalls (both ingress and egress rules).
  • Understand load balancing and SSL policies.
  • Understand how to set up private Google API access.
  • Understand SSL proxy use.
  • Learn best practices for VPC networks, including peering and shared VPC use, and the correct use of subnetworks.
  • Learn best security practices for VPNs.
  • Understand security considerations for interconnect and peering options.
  • Become familiar with available security products from partners.
  • Learn to configure VPC firewalls.
  • Prevent data exfiltration with VPC Service Controls.

Activities

  • Lab: Configuring VPC Firewalls
  • Lab: Configuring and Using VPC Flow Logs in Cloud Logging

Module 05 Securing Compute Engine: Techniques and Best Practices

Topics

  • Service Accounts, IAM Roles and API Scopes
  • Managing VM Logins
  • Organization Policy Controls
  • Compute Engine Best Practices
  • Encrypting Disks with CSEK

Objectives

  • Learn about Compute Engine service accounts, default and customer-defined.
  • Understand IAM roles and scopes for VMs.
  • Understand how Shielded VMs help maintain your system and application integrity

Activities

  • Lab: Configuring, Using, and Auditing VM Service Accounts and Scopes
  • Lab: Encrypting Disks with Customer-Supplied Encryption Keys

Module 06 Securing Cloud Data: Techniques and Best Practices

Topics

  • Cloud Storage IAM permissions and ACLs
  • Auditing Cloud Data
  • Signed URLs and Policy Documents
  • Encrypting with CMEK and CSEK
  • Cloud HSM
  • BigQuery IAM Roles and Authorized Views
  • Storage Best Practices

Objectives

  • Use cloud permissions and roles to secure cloud resources.
  • Audit cloud data.
  • Use signed URLs to give access to objects in a Cloud Storage bucket.
  • Manage what can be placed in a Cloud Storage bucket using Signed Policy Document.
  • Encrypt cloud data using customer managed encryption keys (CMEK), customer supplied encryption keys (CSEK), and Cloud HSM.
  • Protecting data in BigQuery using IAM roles and authorized views

Activities

  • Lab: Using Customer-Supplied Encryption Keys with Cloud Storage
  • Lab: Using Customer-Managed Encryption Keys with Cloud Storage and Cloud KMS
  • Lab: Creating a BigQuery Authorized View

Module 07 Application Security: Techniques and Best Practices

Topics

  • Types of Application Security Vulnerabilities
  • Web Security Scanner
  • Threat: Identity and Oauth Phishing
  • Identity-Aware Proxy
  • Secret Manager

Objectives

  • Recall various types of application security vulnerabilities.
  • Understand DoS protections in App Engine and Cloud Functions.
  • Understand the role of Web Security Scanner in mitigating risks.
  • Define and recall the threats posed by Identity and Oauth phishing.
  • Understand the role of Identity-Aware Proxy in mitigating risks.
  • Store application credentials and metadata securely using Secret Manager.

Activities

  • Lab: Using Web Security Scanner to Find Vulnerabilities in an App Engine Application
  • Lab: Configuring Identity-Aware Proxy to Protect a Project
  • Lab: Configuring and Using Credentials with Secret Manager

Module 08 Securing Google Kubernetes Engine: Techniques and Best Practices

Topics

  • Introduction to Kubernetes/GKE
  • Authentication and Authorization
  • Hardening Your Clusters
  • Securing Your Workloads
  • Monitoring and Logging

Objectives

  • Understand the basic components of a Kubernetes environment.
  • Understand how authentication and authorization works in Google Kubernetes Engine.
  • Recall how to harden Kubernetes Clusters against attacks.
  • Recall how to harden Kubernetes workloads against attacks.
  • Understand logging and monitoring options in Google Kubernetes Engine.

Module 09 Protecting against Distributed Denial of Service Attacks (DDoS)

Topics

  • How DDoS Attacks Work
  • Google Cloud Mitigations
  • Types of Complementary Partner Products

Objectives

  • Understand how DDoS attacks work.
  • Recall common mitigations: Cloud Load Balancing, Cloud CDN, autoscaling, VPC ingress and egress firewalls, Google Cloud Armor.
  • Recall the various types of complementary partner products available.
  • Use Google Cloud Armor to blocklist an IP address and restrict access to an HTTP load balancer

Activities

  • Lab: Configuring Traffic Blocklisting with Google Cloud Armor

Module 10 Content-Related Vulnerabilities: Techniques and Best Practices

Topics

  • Threat Ransomware
  • Ransomware Mitigations
  • Threats: Data Misuse, Privacy Violations, Sensitive Content
  • Content-Related Mitigations

Objectives

  • Discuss the threat of ransomware.
  • Understand ransomware mitigations: Backups, IAM, Cloud Data Loss Prevention API.
  • Understand threats to content: Data misuse, privacy violations, sensitive/restricted/unacceptable content.
  • Recall mitigations for threats to content: Classifying content using Cloud ML APIs; scanning and redacting data using the DLP API.

Activities

  • Lab: Redacting Sensitive Data with the DLP AP

Module 11 Monitoring, Logging, Auditing, and Scanning

Topics

  • Cloud Audit Logs
  • Deploying and Using Forseti

Objectives

  • Understand and use Security Command Center.
  • Understand and use Cloud Monitoring and Cloud Logging.
  • Install the Monitoring and Logging Agents.
  • Understand Cloud Audit Logs.
  • Gain experience configuring and viewing Cloud Audit Logs.
  • Gain experience deploying and using Forseti.
  • Learn how to inventory a deployment with Forseti Inventory.
  • Learn how to scan a deployment with Forseti Scanner

Activities

  • Lab: Installing Cloud Logging and Monitoring Agents
  • Lab: Configuring and Using Cloud Logging and Monitoring
  • Lab: Configuring and Viewing Cloud Audit Logs

Why Choose Us

Experience live, interactive learning from the comfort of your home or office with Bilginç IT Academy's Online Instructor-Led Security in Google Cloud Training in United States of America. Engage directly with expert trainers in a virtual environment that mirrors the energy and schedule of a physical classroom.

  • Live Sessions: Join scheduled classes with a live instructor and other delegates in real-time.
  • Interactive Experience: Engage in group activities, hands-on labs, and direct Q&A sessions with your trainer and peers.
  • Global Expert Trainers: Learn from a handpicked global pool of expert trainers with deep industry experience.
  • Proven Expertise: Benefit from over 30 years of quality training experience, equipping you with lasting skills for success.
  • Scalable Delivery: Accessible worldwide, including United States of America, with flexible scheduling to meet your professional needs.

Immerse yourself in our most sought-after learning style for Security in Google Cloud Training in United States of America. Our hand-picked classroom venues in United States of America offer an invaluable human touch, providing a focused and interactive environment for professional growth.

  • Highly Experienced Trainers: Boost your skills with trainers boasting 10-20+ years of real-world experience.
  • State-of-the-Art Venues: Learn in high-standard facilities designed to ensure a comfortable and distraction-free experience.
  • Small Class Sizes: Our limited class sizes foster meaningful discussions and a personalized learning journey.
  • Best Value: Achieve your certification with high-quality training and competitive pricing.

Streamline your organization's training requirements with Bilginç IT Academy’s Onsite Security in Google Cloud Training in United States of America. Experience expert-led learning at your own business premises, tailored to your corporate goals.

  • Tailored Learning Experience: Customize the training content to fit your unique business projects or specific technical needs.
  • Maximize Training Budget: Eliminate travel and accommodation costs, focusing your entire budget on the training itself.
  • Team Building Opportunity: Enhance team bonding and collaboration through shared learning experiences in your workspace.
  • Progress Monitoring: Track and evaluate your employees' progression and performance with relative ease and direct oversight.


Contact us for more detail about our trainings and for all other enquiries!

Available Training Dates

Join our public courses in our United States of America facilities. Private class trainings will be organized at the location of your preference, according to your schedule.

We can organize this training at your preferred date and location.
09 April 2026 (3 Days)
New York, San Francisco, Austin, Seattle, Chicago €3,861 +VAT
26 April 2026 (3 Days)
New York, San Francisco, Austin, Seattle, Chicago €3,861 +VAT
08 June 2026 (3 Days)
New York, San Francisco, Austin, Seattle, Chicago €3,861 +VAT
14 June 2026 (3 Days)
New York, San Francisco, Austin, Seattle, Chicago €3,861 +VAT
08 July 2026 (3 Days)
New York, San Francisco, Austin, Seattle, Chicago €3,861 +VAT
13 July 2026 (3 Days)
New York, San Francisco, Austin, Seattle, Chicago €3,861 +VAT
19 July 2026 (3 Days)
New York, San Francisco, Austin, Seattle, Chicago €3,861 +VAT
21 July 2026 (3 Days)
New York, San Francisco, Austin, Seattle, Chicago €3,861 +VAT

Other trainings and courses related to the Security in Google Cloud

The United States continues to define the global frontier of technology and innovation, serving as the home to the world's most influential tech titans. From the legendary Silicon Valley and San Francisco Bay Area to emerging hubs like Austin, Seattle, and the Silicon Alley in New York, the US ecosystem remains unparalleled. Top-tier institutions such as MIT, Stanford, and Carnegie Mellon provide the research backbone for breakthroughs in Artificial Intelligence, Quantum Computing, and Cybersecurity. Our training programs are meticulously aligned with these industry-leading standards, ensuring that professionals can navigate the complexities of the modern digital landscape. We bridge the gap between academic theory and high-stakes corporate execution in the most competitive tech market on Earth.

By using this website you agree to let us use cookies. For further information about our use of cookies, check out our Cookie Policy.