Korzystaj ze szkoleń Google Cloud zgodnie ze swoimi potrzebami.
W Google Cloud stworzyliśmy dla Ciebie katalog z ponad 980 modułami i kursami szkoleniowymi. Możesz w nim wybierać różne rodzaje aktywności: krótkie pojedyncze moduły lub kursy składające się z wielu modułów zawierających filmy, dokumenty i testy. W ramach naszych modułów przyznajemy Ci tymczasowe uprawnienia do rzeczywistych zasobów w chmurze, co umożliwia naukę korzystania z chmury przy użyciu prawdziwego środowiska. Zdobywaj odznaki za ukończone moduły, a także ustalaj swoje cele oraz śledź i mierz postępy w ich realizacji w Google Cloud.
-
Szkolenie Wyróżnione Cloud Engineering
This fundamental-level quest is unique amongst the other quest offerings. The labs have been curated to give IT professionals hands-on practice with topics and services that appear in the Google Cloud Certified Associate Cloud Engineer Certification. From IAM, to networking, to Kubernetes engine deployment, this q…
-
Szkolenie Wyróżnione Automate Deployment and Manage Traffic on a Google Cloud Network
Networking is a principle theme of cloud computing. It’s the underlying structure of Google Cloud, and it’s what connects all your resources and services to one another. This course will cover essential Google Cloud networking services and will give you hands-on practice with specialized tools for developing matur…
-
Szkolenie Wyróżnione Data Catalog Fundamentals
Data Catalog is a fully managed and scalable metadata management service that empowers organizations to quickly discover, understand, and manage all of their data. In this quest you will start small by learning how to search and tag data assets and metadata with Data Catalog. After learning how to build your own t…
-
Moduł Wyróżnione Getting Started with Cloud KMS
In this lab, you work with advanced features of Google Cloud Security and Privacy APIs, including setting up a secure Cloud Storage bucket, managing keys and encrypted data using Key Management Storage, and viewing Cloud Storage audit logs.
-
Szkolenie Wyróżnione Cloud Architecture: Design, Implement, and Manage
Earn a skill badge by completing the Cloud Architecture: Design, Implement, and Manage to demonstrate skills in the following: deploy a publicly accessible website using Apache web servers, configure a Compute Engine VM using startup scripts, configure secure RDP using a Windows Bastion host and firewall rules, bu…
-
Szkolenie Wyróżnione Deploy Kubernetes Applications on Google Cloud
Complete the intermediate Deploy Kubernetes Applications on Google Cloud skill badge to demonstrate skills in the following: configuring and building Docker container images, creating and managing Google Kubernetes Engine (GKE) clusters, utilizing kubectl for efficient cluster management, and deploying Kubernetes …
-
Szkolenie Wyróżnione Kubernetes in Google Cloud
Kubernetes is the most popular container orchestration system, and Google Kubernetes Engine was designed specifically to support managed Kubernetes deployments in Google Cloud. In this advanced-level quest, you will get hands-on practice configuring Docker images, containers, and deploying fully-fledged Kubernetes…
-
Szkolenie Wyróżnione Using DevSecOps in your Google Cloud Environment
In this course, you will learn the basic skills to implement secure and efficient DevSecOps practices on Google Cloud. You'll learn how to secure your development pipeline with Google Cloud services like Artifact Registry, Cloud Build, Cloud Deploy, and Binary Authorization. This enables you to build, test, and de…
-
Szkolenie Wyróżnione Introduction to Cloud Identity
Introduction to Cloud Identity serves as the starting place for any new Cloud Identity, Identity/Access Management/Mobile Device Management admins as they begin their journey of managing and establishing security and access management best practices for their organization. This 15-30 hour accelerated, one-week co…
-
Szkolenie Wyróżnione Using Vault on Google Cloud
This quest introduces you to Vault and teaches you how to secure, store, and tightly control access to tokens, passwords, certificates, and encryption keys to protect secrets and other sensitive data.