Drew Pilarski
Member since 2022
Silver League
15825 points
Member since 2022
This self-paced training course gives participants broad study of security controls and techniques on Google Cloud. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution, including Cloud Identity, Resource Manager, IAM, Virtual Private Cloud firewalls, Cloud Load Balancing, Cloud Peering, Cloud Interconnect, and VPC Service Controls. This is the first course of the Security in Google Cloud series. After completing this course, enroll in the Security Best Practices in Google Cloud course.
Welcome to the second course in the networking and Google Cloud series routing and addressing. In this course, we'll cover the central routing and addressing concepts that are relevant to Google Cloud's networking capabilities. Module one will lay the foundation by exploring network routing and addressing in Google Cloud, covering key building blocks such as routing IPv4, bringing your own IP addresses and setting up cloud DNS. In Module two will shift our focus to private connection options, exploring use cases and methods for accessing Google and other services privately using internal IP addresses. By the end of this course, you'll have a solid grasp of how to effectively route and address your network traffic within Google Cloud.
Networking in Google cloud is a 6 part course series. Welcome to the first course of our six part course series, Networking in Google Cloud: Fundamentals. This course provides a comprehensive overview of core networking concepts, including networking fundamentals, virtual private clouds (VPCs), and the sharing of VPC networks. Additionally, the course covers network logging and monitoring techniques.
Google Cloud Fundamentals: Core Infrastructure introduces important concepts and terminology for working with Google Cloud. Through videos and hands-on labs, this course presents and compares many of Google Cloud's computing and storage services, along with important resource and policy management tools.
Get hands-on experience applying and building rules for Chronicle. You learn what YARA-L is and how to customize & create event rules.
Learn the technical aspects you need to know about Chronicle and how it can help you detect and action threats.
This course helps developers customize Chronicle and augment its abilities with third party integrations.
This course will familiarize you with the core functionality of Chronicle, including the user interface, connections, and settings.
This course helps you understand how to use Chronicle to properly handle security incidents.