Google Professional Cloud Architect: Designing Google Cloud Security

Google Cloud    |    Intermediate
  • 15 videos | 1h 26m 58s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 15 users Rating 4.6 of 15 users (15)
One of the top reasons organizations have historically been reluctant to embrace cloud technologies is the fear that security is not robust enough for their needs. A cloud architect and Google Cloud Identity and Access Management (IAM) can help to address these security concerns. In this course, discover how to control authentication and authorization using IAM and implement cloud separation of duties. Next, learn how to organize a resource hierarchy, use auditing and policy security controls, secure access to network controls and storage with IAM, and remote access your environment securely. Finally, examine use cases you can expect to encounter in an exam environment. This course is one of a collection that prepares learners for the Google Professional Cloud Architect exam.


  • Discover the key concepts covered in this course
    Recognize how google cloud's identity and access management (iam) system works and how you can use it to manage access in google cloud
    Recall the use cases that effectively leverage iam
    Outline how to configure different projects with different iam roles to establish separation of duties
    Identify the tools used to create a resource hierarchy, their differences, and how they can be leveraged to create a more secure cloud infrastructure
    Create groups for aggregating users and roles to aggregate permissions assignments, including both default and custom roles
    Outline how the organization policy service enables centralized and programmatic control over cloud resources
    Work with iam policies and the available options
  • Identify the iam roles and permissions needed to use network connectivity center
    Recognize the scope of protections available when implementing managed networking functionality via vpc service controls
    Outline the iam roles and permissions needed to use google cloud storage buckets
    Identify the benefits and process of using identity and context to secure applications and virtual machines
    Recall the benefits of providing secure remote access through a zero trust model
    Recognize potential security design decisions in google case studies
    Summarize the key concepts covered in this course


  • 1m 12s
  • 8m 11s
  • Locked
    3.  Use Cases for IAM
    9m 33s
  • Locked
    4.  Security Tightening Using Separation of Duties
    3m 12s
  • Locked
    5.  Secure Resource Hierarchy Design
    10m 6s
  • Locked
    6.  Creating Groups and Roles in IAM
    4m 50s
  • Locked
    7.  Control Access with the Organization Policy Service
    5m 29s
  • Locked
    8.  Working with IAM Policies
    5m 32s
  • Locked
    9.  Cloud Networking with Access Control Design
    3m 47s
  • Locked
    10.  Secure Google VPCs with Service Controls
    4m 45s
  • Locked
    11.  Secure Google Cloud Storage with Access Control
    6m 51s
  • Locked
    12.  Network Access Security with Identity
    5m 48s
  • Locked
    13.  Secure Remote Access Design with BeyondCorp
    5m 5s
  • Locked
    14.  Security Design Decision Case Studies
    11m 30s
  • Locked
    15.  Course Summary
    1m 8s


Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.


Rating 4.7 of 63 users Rating 4.7 of 63 users (63)
Rating 4.7 of 37 users Rating 4.7 of 37 users (37)
Rating 4.6 of 54 users Rating 4.6 of 54 users (54)