On-demand activities

Google Cloud 根據您的需求規劃了全方位的課程內容,內含超過 980 項學習活動,並涵蓋多種活動型態,您可自由選擇。您可以選擇簡短的個別研究室,或是包含影片、文件、研究室和測驗的多單元課程。在研究室中,您可以透過臨時憑證實際使用雲端資源,直接累積 Google Cloud 實作經驗。完成課程可獲得徽章,讓您輕鬆掌握、追蹤及評估自己的 Google Cloud 學習成果!

过滤条件
全部清除
  • Badge
  • 格式
  • 语言

1190 条结果
  1. 实验 精选

    Cloud SQL for MySQL: Qwik Start

    In this lab, you create a Google Cloud SQL MySQL instance and perform SQL operations using Google Cloud Platform Console and mysql client. Watch this short video, Manage PostgreSQL and MySQL Databases Easily with Cloud SQL.

  2. 实验 精选

    Analyze BigQuery data in Connected Sheets: Challenge Lab

    This challenge lab tests your skills and knowledge from the labs in the Analyze BigQuery data in Connected Sheets quest. You should be familiar with the content of labs before attempting this lab.

  3. 实验 精选

    Eventarc for Cloud Run

    In this lab you will use Eventarc for Cloud Run to listen to events from Cloud Pub/Sub and Audit Logs. At the end of this lab you will be able to deliver events from various sources to Google Cloud sinks.

  4. 实验 精选

    Dialogflow CX: Bot Building Basics

    Build a conversational agent using Dialogflow CX

  5. 实验 精选

    標記 Dataplex 資產

    本研究室將說明如何開始標記 Dataplex 資產,方便管理及探索資料。

  6. 实验 精选

    VPC Flow Logs - Analyzing Network Traffic

    In this lab, you configure a network to record traffic to and from an apache web server using VPC Flow Logs. You then export the logs to BigQuery to analyze them.

  7. 实验 精选

    Data Catalog: Qwik Start

    In this lab, you explore existing datasets with Data Catalog and mine the table and column metadata for insights.

  8. 实验 精选

    透過 Cloud Monitoring 監控多項專案

    這個實作研究室帶您瞭解 Cloud Monitoring 工具提供的資訊,認識重要概念,以便有效運用 Cloud Monitoring。

  9. 实验 精选

    使用 TensorFlow 卷積類神經網路分類圖片

    在本實驗室中,您將瞭解如何使用卷積類神經網路,提升圖片分類模型效能。

  10. 实验 精选

    Mitigate Threats and Vulnerabilities with Security Command Center: Challenge Lab

    In this lab, you test your Security Command Center skills by demonstrating your proficiency in creating mute rules, analyzing and fixing high vulnerability findings, identifying application vulnerabilities, and exporting Findings.