Cloud Technology training: Security in Google Cloud Platform

Become a Professional GCP Security Engineer. Design, develop, and manage a secure infrastructure leveraging Google security technologies. This course is part of Google's Security Engineering track that leads to a Professional Cloud Security Engineer certificate.

Become a Google Cloud Security Engineer 

Are you an Information Security Specialist or Cloud Architect planning to use Google Cloud Platform? Do you want to obtain a Professional Google certificate? Time to gain the knowledge and skills to design, develop, and manage a secure infrastructure leveraging Google security technologies. This training enables you to do this all on GCP and prepares you for the Google Security Engineer exam.

Security in GCP is perfect for 

This training is ideal for Cloud Information Security Analysts, Architects, Engineers, Information Security/Cybersecurity Specialists, Cloud Infrastructure Architects, and Developers of Cloud applications.

Before enrolling, we advice you to complete the Google Cloud Fundamentals: Core Infrastructure / Networking in Google Cloud Platform course. We recommend you have: 

  • Knowledge of foundational concepts of Information Security 
  • Basic proficiency with command-line tools and Linux operating system environments
  • Systems Operations experience (deploying and managing applications on-premises or in a public cloud environment)
  • Reading comprehension of code in Python or JavaScript

What will you learn during the Security in GCP training? 

This 2-day training offers a combination of presentations, demos, and hands-on labs. You will explore and deploy the components of a secure GCP solution. You will learn mitigation techniques for attacks at many points in a GCP-based infrastructure, like Distributed Denial-of-Service attacks, phishing attacks, and threats involving content classification and use.


Foundations of GCP Security

  • Google Cloud's approach to security
  • The shared security responsibility model
  • Threats mitigated by Google and by GCP
  • Access Transparency

Cloud Identity

  • Cloud Identity
  • Syncing with Microsoft Active Directory
  • Choosing between Google authentication and SAML-based SSO
  • GCP best practices

Identity and Access Management

  • GCP Resource Manager: projects, folders, and organizations
  • GCP IAM roles, including custom roles
  • GCP IAM policies, including organization policies
  • GCP IAM best practices

Configuring Google Virtual Private Cloud for Isolation and Security

  • Configuring VPC firewalls (both ingress and egress rules)
  • Load balancing and SSL policies
  • Private Google API access
  • SSL proxy use
  • Best practices for structuring VPC networks
  • Best security practices for VPNs
  • Security considerations for interconnecting and peering options
  • Available security products from partners

Monitoring, Logging, Auditing, and Scanning

  • Stackdriver monitoring and logging
  • VPC flow logs
  • Cloud audit logging
  • Deploying and Using Forseti

Securing Compute Engine: techniques and best practices

  • Compute Engine service accounts, default and customer-defined
  • IAM roles for VMs
  • API scopes for VMs
  • Managing SSH keys for Linux VMs
  • Managing RDP logins for Windows VMs
  • Organization policy controls: trusted images, public IP address, disabling serial port
  • Encrypting VM images with customer-managed encryption keys and with customer-supplied encryption keys
  • Finding and remediating public access to VMs
  • VM best practices
  • Encrypting VM disks with customer-supplied encryption keys

Securing cloud data: techniques and best practices

  • Cloud Storage and IAM permissions
  • Cloud Storage and ACLs
  • Auditing cloud data, including finding and remediating publicly accessible data
  • Signed Cloud Storage URLs
  • Signed policy documents
  • Encrypting Cloud Storage objects with customer-managed encryption keys and with customer-supplied encryption keys
  • Best practices, including deleting archived versions of objects after key rotation
  • BigQuery authorized views
  • BigQuery IAM roles
  • Best practices, including preferring IAM permissions over ACLs

Protecting against Distributed Denial of Service Attacks: techniques and best practices

  • How DDoS attacks work
  • Mitigations: GCLB, Cloud CDN, autoscaling, VPC ingress, and egress firewalls, Cloud Armor
  • Types of complementary partner products

Application Security: techniques and best practices

  • Examples of application security vulnerabilities
  • DoS protection in App Engine and Cloud Functions
  • Cloud Security Scanner
  • Threat: Identity and OAuth phishing
  • Identity Aware Proxy

Content-related vulnerabilities: techniques and best practices

  • Threat: Ransomware
  • Mitigations: Backups, IAM, Data Loss Prevention API
  • Threats: Data misuse, privacy violations, sensitive/restricted/unacceptable content
  • Mitigations: Classifying content using Cloud ML APIs; scanning and redacting data using Data Loss Prevention API

GCP Trainers

This Cloud Technology training is brought to you by develops Cloud-Based Solutions, trains and coaches teams, and provides Managed Cloud Services. is Google Cloud Authorized Training Partner, and your trainer is a real Cloud guru who enjoys sharing his or her experiences to help you get the most out of GCP.

Google Certification

Our Google Cloud Platform training courses all follow the curriculum drawn up by Google. The Security in Google Cloud Platform training gives you in-depth knowledge and a Professional level understanding of how to secure infrastructure in GCP. This training prepares you for Google's Professional Cloud Security Engineering exam and certificate. Google recommends you to have 3+ years of industry experience, including 1+ years designing and managing solutions using GCP before taking the exam. The exam is not included in this training and more information about the exam and how to buy/plan it can be found here.

Google Cloud Platform Learning Journey

Your GCP Network Engineering Learning Journey starts with a Foundation level training. Once you have the basics in place, you can select the Certified Google Cloud Platform track that best fits your professional ambitions. This training is an essential step on your journey to becoming a Google Cloud Professional Security Engineer. If you are just getting started, the Foundation level training you need for the Security Engineer track is Google Cloud Platform Fundamentals: Core Infrastructure

Yes, I want to become a Professional Security Engineer.

After registering for this training, you will receive a confirmation email with practical information. A week before the training, we will ask you about any dietary requirements. See you soon!

What else should I know?

  • Literature and a delicious lunch are included in the price of the training
  • Travel and accommodation expenses are not included
  • You need to bring your laptop to this training

Get in touch

Our team is at your service

Get in touch! →

Or call +31 (0)20 760 9844