- Overview
- Audience
- Prerequisites
- Curriculum
Description:
This training provides an in-depth understanding of securing workloads, services, and data on Google Cloud Platform.
Participants will learn IAM best practices, VPC network security, encryption and key management, as well as logging and monitoring for compliance.
The course covers hands-on labs that simulate real-world scenarios of securing applications, encrypting sensitive data, and auditing GCP environments.
By the end of the training, learners will be able to implement GCP security policies, monitor threats, and respond to incidents effectively.
Duration: 4 Days
Course Code: BDT 525
Learning Objectives:
After this training, participants will be able to:
- Secure GCP resources with IAM and VPC
- Apply encryption and manage keys
- Monitor and audit workloads
- Implement incident response processes
- Security engineers
- Cloud administrators
- Compliance officers
- Knowledge of GCP basics
- Understanding of security fundamentals
- Familiarity with networking concepts
Course Outline:
Module 1: Introduction to GCP Deep Dive
- Recap of GCP services and architecture
- Role of compute, storage, networking, and IAM in cloud deployments
- How these components interconnect in real-world projects
Module 2: Compute Engine Deep Dive
- Compute options on GCP (VMs, Containers, Serverless)
- Google Compute Engine (GCE) overview
- VM lifecycle and configuration options
- Persistent disks and attached storage
Labs:
- Creating a VM instance via Console
- Editing a VM instance
- Creating a VM instance using gcloud CLI
- Creating and attaching a persistent disk
Module 3: Cloud Storage Deep Dive
- GCP storage options (object, block, relational, NoSQL)
- Google Cloud Storage overview
- Buckets, objects, permissions, lifecycle management
- Common issues (e.g., AccessDeniedException: 403) and fixes
Labs:
- Working with Cloud Storage buckets
- Configuring bucket and object permissions
- Implementing lifecycle management policies
- Running a program on a VM and storing results in Cloud Storage
Module 4: Cloud SQL Deep Dive
- Overview of Cloud SQL (supported engines: MySQL, PostgreSQL, SQL Server)
- Use cases for Cloud SQL vs. Spanner/Bigtable
Labs:
- Creating a Cloud SQL instance
- Running SQL commands on Cloud SQL
- Bulk loading data into Cloud SQL tables
Module 5: Identity and Access Management (IAM)
- GCP resources and hierarchy (organization → folders → projects → resources)
- IAM overview: principles and enforcement
- Roles (primitive, predefined, custom) and policies
- Service accounts and workloads
- Best practices for enterprises
- GSuite integration for identity
Activity: Whiteboard Cloud Security architecture
Module 6: Networking and Host Security
- VPCs: global architecture and regional subnets
- Virtual networking fundamentals
- Cloud Identity and secure connectivity
- IP addressing, routes, firewall rules
- Compute and container security considerations
- Bastion hosts for secure access
- VPN and hybrid connectivity
Labs:
- Creating VPCs and subnets
- Working with static IP addresses
- Configuring firewall rules
- Comparing auto mode vs. custom mode networks
- Deploying a bastion host
- Setting up a VPN
Module 7: Data Storage Security and Compliance
- Data storage security controls on GCP
- Encryption (at rest, in transit, CMEK vs. Google-managed)
- Compliance requirements and regulatory alignment
- Governance strategies for sensitive data
Module 8: Monitoring and Managing Cloud Resources
- Stackdriver (now Cloud Operations suite) overview
- Cloud Monitoring: metrics, dashboards, alerting
- Cloud Logging: log-based metrics, audits
- Security and governance monitoring (Cloud Security Command Center)
- GCP compliance and governance capabilities
- App Engine Security Scanner
- Pentesting guidelines and policies
Labs/Demos:
- Creating monitoring dashboards
- Setting up alerts for resource usage
Module 9: Application Services and Modern Workloads
- App Engine (PaaS) for web applications
- Kubernetes Engine (GKE) for container orchestration
- Security and scaling considerations for apps and containers
- When to choose Compute Engine vs. App Engine vs. GKE
Module 10: Wrap-Up and Resources
- Recap of GCP security fundamentals
- Cloud Asset Inventory and resource management
- Reviewing security features and whitepapers
- Certification pathways and learning resources
- Course closeout with Q&A
Training material provided: Yes (Digital format)




