按照您自己的方式探索 Google Cloud 培训。

Google Cloud 提供 980 多项学习活动供您选择,我们设计的目录完整全面,充分考虑了您的需求。该目录包含各种可供您选择的活动形式,既有简短的单个实验,也有由视频、文档、实验和测验组成的多模块课程,您可以根据需求进行选择。我们的实验可为您提供实际云资源的临时凭据,以便您通过实际操作掌握 Google Cloud 知识。您可以跟踪、衡量和了解自己的 Google Cloud 学习进度,完成学习活动即可赢取徽章!

过滤条件
全部清除
  • 徽章
  • 格式
  • 语言

1190 条结果
  1. 实验 精选

    Cloud SQL for MySQL: Qwik Start

    In this lab, you create a Google Cloud SQL MySQL instance and perform SQL operations using Google Cloud Platform Console and mysql client. Watch this short video, Manage PostgreSQL and MySQL Databases Easily with Cloud SQL.

  2. 实验 精选

    Analyze BigQuery data in Connected Sheets: Challenge Lab

    This challenge lab tests your skills and knowledge from the labs in the Analyze BigQuery data in Connected Sheets quest. You should be familiar with the content of labs before attempting this lab.

  3. 实验 精选

    Eventarc for Cloud Run

    In this lab you will use Eventarc for Cloud Run to listen to events from Cloud Pub/Sub and Audit Logs. At the end of this lab you will be able to deliver events from various sources to Google Cloud sinks.

  4. 实验 精选

    Dialogflow CX: Bot Building Basics

    Build a conversational agent using Dialogflow CX

  5. 实验 精选

    标记 Dataplex 资产

    本实验向您介绍如何开始标记 Dataplex 资产以支持数据治理和发现。

  6. 实验 精选

    VPC Flow Logs - Analyzing Network Traffic

    In this lab, you configure a network to record traffic to and from an apache web server using VPC Flow Logs. You then export the logs to BigQuery to analyze them.

  7. 实验 精选

    Data Catalog: Qwik Start

    In this lab, you explore existing datasets with Data Catalog and mine the table and column metadata for insights.

  8. 实验 精选

    使用 Cloud Monitoring 监控多个项目

    在本实操实验中,我们将介绍 Cloud Monitoring 工具提供的一些信息,并讲授有效利用 Cloud Monitoring 所需了解的一些概念。

  9. 实验 精选

    使用 TensorFlow 卷积神经网络进行图片分类

    在本实验中,您将了解如何使用卷积神经网络来改进图片分类模型。

  10. 实验 精选

    Mitigate Threats and Vulnerabilities with Security Command Center: Challenge Lab

    In this lab, you test your Security Command Center skills by demonstrating your proficiency in creating mute rules, analyzing and fixing high vulnerability findings, identifying application vulnerabilities, and exporting Findings.