Mitigating Security Vulnerabilities on Google Cloud
In this self-paced training course, participants learn mitigations for attacks at many points in a Google Cloud-based infrastructure, including Distributed Denial-of-Service attacks, phishing attacks, and threats involving content classification and use.
In this self-paced training course, participants learn mitigations for attacks at many points in a Google Cloud-based infrastructure, including Distributed Denial-of-Service attacks, phishing attacks, and threats involving content classification and use. They also learn about the Security Command Center, cloud logging and audit logging, and using Forseti to view overall compliance with your organization’s security policies.
Author Name: Google Cloud
Author Description:
Google Cloud can help solve your toughest problems and grow your business. With Google Cloud, their infrastructure is your infrastructure. Their tools are your tools. And their innovations are your innovations.
Table of Contents
- Welcome to Mitigating Security Vulnerabilities on Google Cloud
0mins - Welcome to Mitigating Security Vulnerabilities on Google Cloud
0mins - Protecting against Distributed Denial of Service Attacks (DDoS)
14mins - Protecting against Distributed Denial of Service Attacks (DDoS)
14mins - Content-Related Vulnerabilities: Techniques and Best Practices
12mins - Content-Related Vulnerabilities: Techniques and Best Practices
12mins - Monitoring, Logging, Auditing and Scanning
25mins - Monitoring, Logging, Auditing and Scanning
25mins - Course Resources
0mins - Course Resources
0mins
There are no reviews yet.