On-demand activities

Find the right on-demand learning activities for you. Labs are short learning activities that teach you a specific lesson by giving you direct, temporary, hands-on access to real cloud resources. Courses are longer activities, consisting of several modules made of videos, documents, hands-on labs and quizzes. Finally, quests are similar, but are usually shorter and contain only labs.

FILTER BY
Clear all
  • Badge
  • Format
  • Language

1187 results
  1. Lab Featured

    Performance and Cost Optimization with BigQuery

    Learn how to improve your database from a performance and cost perspective

  2. Lab Featured

    Explore a lakehouse

    Use a data lakehouse and combine data on GCS with BigQuery

  3. Lab Featured

    Change firewall rules using Terraform and Cloud Shell

    Change firewall rules using Terraform.

  4. Lab Featured

    Create symmetric and asymmetric keys

    Key management - create symmetric and asymmetric keys

  5. Lab Featured

    Test Network Latency Between VMs

    Use the gcloud CLI to add VMs to your network, then test the latency between the VMs

  6. Lab Featured

    Creating Dynamic Secrets for Google Cloud with Vault

    In this hands-on lab, you will learn how to create dynamic secrets in Vault.

  7. Lab Featured

    Build Google Cloud Infrastructure for Azure Professionals: Challenge Lab

    This challenge lab tests your skills and knowledge from the labs in the Build Google Cloud Infrastructure for Azure Professionals course. You should be familiar with the content of the labs before attempting this lab.

  8. Lab Featured

    Use reports to remediate findings

    Remediate threats detailed in a management report

  9. Lab Featured

    Data Catalog: Qwik Start

    In this lab, you explore existing datasets with Data Catalog and mine the table and column metadata for insights.

  10. Lab Featured

    Mitigate Threats and Vulnerabilities with Security Command Center: Challenge Lab

    In this lab, you test your Security Command Center skills by demonstrating your proficiency in creating mute rules, analyzing and fixing high vulnerability findings, identifying application vulnerabilities, and exporting Findings.