Cloud Security Risks: Identify and Protect Against Threats

This course is part of Google Cloud Cybersecurity Professional Certificate

Instructor: Google Cloud Training

What you'll learn

  •   Describe fundamental identity and access management concepts specific to the cloud.
  •   Identify key components of AAA (Authentication, Authorization, Auditing) for strengthened cloud security.
  •   Explain capabilities and best practices for efficient asset and resource management in the cloud.
  •   Explore common security vulnerabilities and evaluate their impact and risk mitigation strategies.
  • Skills you'll gain

  •   Cloud Security
  •   Authorization (Computing)
  •   Authentications
  •   Identity and Access Management
  •   Data Governance
  •   Threat Management
  •   Vulnerability Assessments
  •   Vulnerability Management
  •   Role-Based Access Control (RBAC)
  •   Containerization
  •   Infrastructure Security
  •   Infrastructure as Code (IaC)
  •   Data Security
  •   Cloud-Native Computing
  •   Personally Identifiable Information
  •   Cloud Computing
  •   Multi-Factor Authentication
  • There are 4 modules in this course

    Two courses down, three to go – you’re well on your way! This is the third course of the Google Cloud Cybersecurity Certificate. You’ll delve into the key aspects of identity management and access control in cloud computing, including security principles like least-privilege and separation-of-duties, and the crucial elements of AAA: authentication, authorization, and auditing. AAAnd…let’s go to it! ← See what we did there?!

    Threat and vulnerability management

    Cloud Native Principles of Ephemerality and Immutability

    Data Protection and Privacy

    Explore more from Software Development

    ©2025  ementorhub.com. All rights reserved