Loading...
No results found.
Share on LinkedIn Feed Twitter Facebook

Google Cloud Skills Boost

Apply your skills in Google Cloud console

Security Engineer Learning Path

A Security Engineer develops, implements, and monitors their organization’s security infrastructure to protect sensitive information against cybercrime.

school 20 activities
update Last updated 9 months
person Managed by Google Cloud
A Security Engineer develops, implements, and monitors their organization’s security infrastructure to protect sensitive information against cybercrime. This learning path guides you through a curated collection of on-demand courses, labs, and skill badges that provide you with real-world, hands-on experience using Google Cloud technologies essential to the Security Engineer role. Once you complete the path, check out the Google Cloud Security Engineer certification to take the next steps in your professional journey.
Start learning path
Activity Thumbnail for A Tour of Google Cloud Hands-on Labs
01 A Tour of Google Cloud Hands-on Labs
book Lab
access_time 45 minutes
show_chart Introductory

In this first hands-on lab you will access the Google Cloud console and use these basic Google Cloud features: Projects, Resources, IAM Users, Roles, Permissions, and APIs.

Start lab
Activity Thumbnail for Preparing for Your Professional Cloud Security Engineer Journey
02 Preparing for Your Professional Cloud Security Engineer Journey
book Course
access_time 8 hours 30 minutes
show_chart Introductory

This course helps learners prepare for the Professional Cloud Security Engineer (PCSE) Certification exam. Learners will be exposed to and engage with exam topics through a series of lectures, diagnostic questions, and knowledge checks. After completing this course, learners will...

Start course
Activity Thumbnail for Google Cloud Fundamentals: Core Infrastructure
03 Google Cloud Fundamentals: Core Infrastructure
book Course
access_time 5 hours
show_chart Introductory

Google Cloud Fundamentals: Core Infrastructure introduces important concepts and terminology for working with Google Cloud. Through videos and hands-on labs, this course presents and compares many of Google Cloud's computing and storage services, along with important resource and policy management...

Start course
Activity Thumbnail for Networking in Google Cloud: Fundamentals
04 Networking in Google Cloud: Fundamentals
book Course
access_time 5 hours
show_chart Intermediate

Networking in Google cloud is a 6 part course series. Welcome to the first course of our six part course series, Networking in Google Cloud: Fundamentals.  This course provides a comprehensive overview of core networking concepts, including networking fundamentals, virtual...

Start course
Activity Thumbnail for Networking in Google Cloud: Routing and Addressing
05 Networking in Google Cloud: Routing and Addressing
book Course
access_time 5 hours
show_chart Intermediate

Welcome to the second course in the networking and Google Cloud series routing and addressing. In this course, we'll cover the central routing and addressing concepts that are relevant to Google Cloud's networking capabilities. Module one will lay the foundation...

Start course
Activity Thumbnail for Networking in Google Cloud: Network Architecture
06 Networking in Google Cloud: Network Architecture
book Course
access_time 2 hours 30 minutes
show_chart Intermediate

Welcome to the third course of the "Networking in Google Cloud" series: Network Architecture! In this course, you will explore the fundamentals of designing efficient and scalable network architectures within Google Cloud. In the first module, Introduction to Network Architecture,...

Start course
Activity Thumbnail for Networking in Google Cloud: Network Security
07 Networking in Google Cloud: Network Security
book Course
access_time 6 hours 15 minutes
show_chart Intermediate

Welcome to the fourth course of the "Networking in Google Cloud" series: Network Security! In this course, you'll dive into the services for safeguarding your Google Cloud network infrastructure. The first module, Distributed Denial of Service (DDoS) Protection, covers how...

Start course
Activity Thumbnail for Networking in Google Cloud: Load Balancing
08 Networking in Google Cloud: Load Balancing
book Course
access_time 3 hours
show_chart Intermediate

This training course builds on the concepts covered in the Networking in Google Cloud: Fundamentals course. Through presentations, demonstrations, and labs, participants explore and implement Cloud Load Balancing.

Start course
Activity Thumbnail for Networking in Google Cloud: Hybrid and Multicloud
09 Networking in Google Cloud: Hybrid and Multicloud
book Course
access_time 3 hours
show_chart Intermediate

Welcome to the sixth course in our networking and Google Cloud series hybrid and multicloud. The first module will walk you through various Cloud connectivity options with a deep dive into Cloud interconnect exploring its different types and functionalities. In...

Start course
Activity Thumbnail for Managing Security in Google Cloud
10 Managing Security in Google Cloud
book Course
access_time 8 hours 30 minutes
show_chart Intermediate

This self-paced training course gives participants broad study of security controls and techniques on Google Cloud. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution, including Cloud Identity, Resource Manager,...

Start course
Activity Thumbnail for Security Best Practices in Google Cloud
11 Security Best Practices in Google Cloud
book Course
access_time 11 hours 15 minutes
show_chart Intermediate

This self-paced training course gives participants broad study of security controls and techniques on Google Cloud. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution, including Cloud Storage access control...

Start course
Activity Thumbnail for Mitigating Security Vulnerabilities on Google Cloud
12 Mitigating Security Vulnerabilities on Google Cloud
book Course
access_time 5 hours
show_chart Introductory

In this self-paced training course, participants learn mitigations for attacks at many points in a Google Cloud-based infrastructure, including Distributed Denial-of-Service attacks, phishing attacks, and threats involving content classification and use. They also learn about the Security Command Center, cloud...

Start course
Activity Thumbnail for Logging and Monitoring in Google Cloud
13 Logging and Monitoring in Google Cloud
book Course
access_time 8 hours 30 minutes
show_chart Introductory

This course teaches participants techniques for monitoring and improving infrastructure and application performance in Google Cloud. Using a combination of presentations, demos, hands-on labs, and real-world case studies, attendees gain experience with full-stack monitoring, real-time log management and analysis, debugging...

Start course
Activity Thumbnail for Observability in Google Cloud
14 Observability in Google Cloud
book Course
access_time 6 hours 30 minutes
show_chart Introductory

Welcome to the second part of the two part course, Observability in Google Cloud. This course is all about application performance management tools, including Error Reporting, Cloud Trace, and Cloud Profiler.

Start course
Activity Thumbnail for Build a Secure Google Cloud Network
15 Build a Secure Google Cloud Network
book Course
access_time 6 hours 45 minutes
show_chart Intermediate

Earn a skill badge by completing the Build and Secure Networks in Google Cloud course, where you will learn about multiple networking-related resources to build, scale, and secure your applications on Google Cloud. A skill badge is an exclusive digital...

Start course
Activity Thumbnail for Implement Cloud Security Fundamentals on Google Cloud
16 Implement Cloud Security Fundamentals on Google Cloud
book Course
access_time 8 hours 15 minutes
show_chart Intermediate

Complete the intermediate Implement Cloud Security Fundamentals on Google Cloud skill badge to demonstrate skills in the following: creating and assigning roles with Identity and Access Management (IAM); creating and managing service accounts; enabling private connectivity across virtual private cloud...

Start course
Activity Thumbnail for Google Kubernetes Engine Best Practices: Security
17 Google Kubernetes Engine Best Practices: Security
book Course
access_time 4 hours 45 minutes
show_chart Intermediate

Get Anthos Ready. This Google Kubernetes Engine-centric quest of best practice hands-on labs focuses on security at scale when deploying and managing production GKE environments -- specifically role-based access control, hardening, VPC networking, and binary authorization.

Start course
Activity Thumbnail for Using DevSecOps in your Google Cloud Environment
18 Using DevSecOps in your Google Cloud Environment
book Course
access_time 4 hours 45 minutes
show_chart Intermediate

In this course, you will learn the basic skills to implement secure and efficient DevSecOps practices on Google Cloud. You'll learn how to secure your development pipeline with Google Cloud services like Artifact Registry, Cloud Build, Cloud Deploy, and Binary...

Start course
Activity Thumbnail for Securing your Network with Cloud Armor
19 Securing your Network with Cloud Armor
book Course
access_time 5 hours 45 minutes
show_chart Introductory

Learn to secure your deployments on Google Cloud, including: how to use Cloud Armor bot management to mitigate bot risk and control access from automated clients; use Cloud Armor denylists to restrict or allow access to your HTTP(S) load balancer...

Start course
Activity Thumbnail for Mitigate Threats and Vulnerabilities with Security Command Center
20 Mitigate Threats and Vulnerabilities with Security Command Center
book Course
access_time 5 hours 30 minutes
show_chart Intermediate

Complete the intermediate Mitigate Threats and Vulnerabilities with Security Command Center skill badge to demonstrate skills in the following: preventing and managing environment threats, identifying and mitigating application vulnerabilities, and responding to security anomalies.

Start course