TrueschoTruescho
All Courses
Cloud Security Risks: Identify and Protect Against Threats
Coursera
Course
Unknown

Cloud Security Risks: Identify and Protect Against Threats

Google Cloud

Explore identity management and access control essentials in cloud computing, including key security principles and authentication, authorization, and auditing processes.

Unknown4 weeksEnglish

About this Course

Two courses down, three to go – you’re well on your way! This is the third course of the Google Cloud Cybersecurity Certificate. You’ll delve into the key aspects of identity management and access control in cloud computing, including security principles like least-privilege and separation-of-duties, and the crucial elements of AAA: authentication, authorization, and auditing. AAAnd…let’s go to it! ← See what we did there?!

What You'll Learn

  • Describe fundamental identity and access management concepts specific to the cloud
  • Identify key components of AAA (Authentication, Authorization, Auditing) for strengthened cloud security
  • Explain capabilities and best practices for efficient asset and resource management in the cloud
  • Explore common security vulnerabilities and evaluate their impact and risk mitigation strategies

Instructors

G

Google Cloud Training

Topics

Authentications
Network Analysis
Cloud Computing
Personally Identifiable Information
Authorization (Computing)
Data Security
Cloud-Native Computing
Infrastructure Security
Threat Management
Vulnerability Management

Course Info

PlatformCoursera
LevelUnknown
PacingUnknown
PriceFree

Skills

إدارة الهوية
تحليل الشبكات
الحوسبة السحابية
البيانات الشخصية
التفويض
أمن البيانات
الحوسبة السحابية الأصلية
أمن البنية التحتية
Threat Management
Vulnerability Management

Start Learning Now