On-demand activities

כשתכננו את Google Cloud, חשבנו עליכם. קטלוג ההדרכה שלנו מכיל למעלה מ-980 פעילויות שונות ממגוון סוגים. תוכלו לבחור מבין שיעורי Lab קצרים ואישיים או קורסים עם מודולים מרובים שמכילים סרטונים, מסמכים, שיעורי Lab ובחנים. בשיעורי ה-Lab תקבלו פרטי כניסה זמניים למשאבים עצמם בענן, כדי שתוכלו לתרגל במו ידיכם את השימוש ב-Google Cloud. תקבלו גם תגים על השיעורים והקורסים שתסיימו, ותוכלו לעקוב אחרי ההתקדמות ולהגדיר מה מבחינתכם נחשב להצלחה ב-Google Cloud!

FILTER BY
Clear all
  • Badge
  • Format
  • Language

242 results
  1. Course Featured

    Cloud Engineering

    This fundamental-level quest is unique amongst the other quest offerings. The labs have been curated to give IT professionals hands-on practice with topics and services that appear in the Google Cloud Certified Associate Cloud Engineer Certification. From IAM, to networking, to Kubernetes engine deployment, this q…

  2. Course Featured

    Automate Deployment and Manage Traffic on a Google Cloud Network

    Networking is a principle theme of cloud computing. It’s the underlying structure of Google Cloud, and it’s what connects all your resources and services to one another. This course will cover essential Google Cloud networking services and will give you hands-on practice with specialized tools for developing matur…

  3. Course Featured

    Data Catalog Fundamentals

    Data Catalog is a fully managed and scalable metadata management service that empowers organizations to quickly discover, understand, and manage all of their data. In this quest you will start small by learning how to search and tag data assets and metadata with Data Catalog. After learning how to build your own t…

  4. Lab Featured

    Getting Started with Cloud KMS

    In this lab, you work with advanced features of Google Cloud Security and Privacy APIs, including setting up a secure Cloud Storage bucket, managing keys and encrypted data using Key Management Storage, and viewing Cloud Storage audit logs.

  5. Course Featured

    Cloud Architecture: Design, Implement, and Manage

    Earn a skill badge by completing the Cloud Architecture: Design, Implement, and Manage to demonstrate skills in the following: deploy a publicly accessible website using Apache web servers, configure a Compute Engine VM using startup scripts, configure secure RDP using a Windows Bastion host and firewall rules, bu…

  6. Course Featured

    Deploy Kubernetes Applications on Google Cloud

    Complete the intermediate Deploy Kubernetes Applications on Google Cloud skill badge to demonstrate skills in the following: configuring and building Docker container images, creating and managing Google Kubernetes Engine (GKE) clusters, utilizing kubectl for efficient cluster management, and deploying Kubernetes …

  7. Course Featured

    Kubernetes in Google Cloud

    Kubernetes is the most popular container orchestration system, and Google Kubernetes Engine was designed specifically to support managed Kubernetes deployments in Google Cloud. In this advanced-level quest, you will get hands-on practice configuring Docker images, containers, and deploying fully-fledged Kubernetes…

  8. Course Featured

    Using DevSecOps in your Google Cloud Environment

    In this course, you will learn the basic skills to implement secure and efficient DevSecOps practices on Google Cloud. You'll learn how to secure your development pipeline with Google Cloud services like Artifact Registry, Cloud Build, Cloud Deploy, and Binary Authorization. This enables you to build, test, and de…

  9. Course Featured

    Introduction to Cloud Identity

    Introduction to Cloud Identity serves as the starting place for any new Cloud Identity, Identity/Access Management/Mobile Device Management admins as they begin their journey of managing and establishing security and access management best practices for their organization. This 15-30 hour accelerated, one-week co…

  10. Course Featured

    Using Vault on Google Cloud

    This quest introduces you to Vault and teaches you how to secure, store, and tightly control access to tokens, passwords, certificates, and encryption keys to protect secrets and other sensitive data.