按照您自己的方式探索 Google Cloud 培训。
Google Cloud 提供 980 多项学习活动供您选择,我们设计的目录完整全面,充分考虑了您的需求。该目录包含各种可供您选择的活动形式,既有简短的单个实验,也有由视频、文档、实验和测验组成的多模块课程,您可以根据需求进行选择。我们的实验可为您提供实际云资源的临时凭据,以便您通过实际操作掌握 Google Cloud 知识。您可以跟踪、衡量和了解自己的 Google Cloud 学习进度,完成学习活动即可赢取徽章!
-
实验 精选 Protect Cloud Traffic with BeyondCorp Enterprise (BCE) Security: Challenge Lab
This is a challenge lab based on Protect Cloud Traffic with BeyondCorp Enterprise (BCE) Security quest, where the user complete a series of tasks within a limited time period. Instead of following step-by-step instructions, you will be presented with a general objective, and will be scored automatically based on y…
-
实验 精选 Ingesting FHIR Data with the Healthcare API
In this lab you will learn the basic functionalities of Cloud Healthcare API using the Fast Healthcare Interoperability (FHIR) data model.
-
实验 精选 使用 Natural Language API 进行实体和情感分析
借助 Cloud Natural Language API,您可以从一段文本中提取实体并执行情感和语法分析。在此动手实验中,您将了解如何使用 Cloud Natural Language API 从文本中提取实体和情感。
-
实验 精选 Store, Process, and Manage Data on Google Cloud - Command Line: Challenge Lab
This challenge lab tests your skills and knowledge from the labs in the Store, Process, and Manage Data on Google Cloud - Command Line quest. You should be familiar with the content of labs before attempting this lab.
-
实验 精选 Eventarc for Cloud Run
In this lab you will use Eventarc for Cloud Run to listen to events from Cloud Pub/Sub and Audit Logs. At the end of this lab you will be able to deliver events from various sources to Google Cloud sinks.
-
实验 精选 Getting Started with Liquid to Customize the Looker User Experience
In this lab you will use Liquid to customize dimensions and measure in Looker.
-
实验 精选 Protecting APIs with Apigee X and Cloud Armor
In this lab, you use an Apigee X threat protection policy and Cloud Armor to protect your APIs.
-
实验 精选 Authentication, Authorization, and Identity with Vault
In this hands-on lab, you will learn to use authentication and authorization methods within Vault. You will also create users, aliases, entities, and groups.