Loading...
No results found.
Share on LinkedIn Feed Twitter Facebook

Practicing Zero Trust

school 7 activities
update Last updated 14 days
person Managed by Google Cloud Partners
This learning path showcases many of the products and skills needed to amplify zero trust capabilities in Google Cloud. From securing end points, proving trusted relationships or understanding how to build limited roles, this path will give you experience in applying zero trust principles.
Start learning path
Activity Thumbnail for Introduction to reCAPTCHA
01 Introduction to reCAPTCHA
book Course
access_time 3 hours 45 minutes
show_chart Introductory

This course equips learners with the information they need to deploy reCAPTCHA in their websites, mobile applications, and web application firewalls (WAF). The course covers roles and permissions needed to integrate various reCAPTCHA features such as keys, assessments, and IP...

Start course
Activity Thumbnail for Bot Management with Google Cloud Armor and reCAPTCHA
02 Bot Management with Google Cloud Armor and reCAPTCHA
book Lab
access_time 1 hour 30 minutes
show_chart Introductory

Use Google Cloud Armor bot management to mitigate bot risk and to control access from automated clients

Start lab
Activity Thumbnail for Protect Cloud Traffic with Chrome Enterprise Premium Security
03 Protect Cloud Traffic with Chrome Enterprise Premium Security
book Course
access_time 1 hour 45 minutes
show_chart Intermediate

Earn a skill badge by completing the Protect Cloud Traffic with Chrome Enterprise Premium Security skill badge course, where you learn how to leverage Chrome Enterprise Premium to provide secure access to critical apps and services, improve your security posture...

Start course
Activity Thumbnail for Get Started with Sensitive Data Protection
04 Get Started with Sensitive Data Protection
book Course
access_time 1 hour
show_chart Introductory

Complete the introductory Get Started with Sensitive Data Protection skill badge course to demonstrate skills in the following: using Sensitive Data Protection services (including the Cloud Data Loss Prevention API) to inspect, redact, and de-identify sensitive data in Google Cloud.

Start course
Activity Thumbnail for Privileged Access with IAM
05 Privileged Access with IAM
book Course
access_time 1 hour 15 minutes
show_chart Intermediate

Complete the intermediate Privileged Access with IAM skill badge to demonstrate skills in the following: custom roles using Identity and Access Management (IAM), the principle of least privilege, Just-in-Time (JIT) temporary elevated access, and security for web applications using Identity-Aware...

Start course
Activity Thumbnail for Cloud Audit Logs
06 Cloud Audit Logs
book Lab
access_time 1 hour
show_chart Intermediate

Have some fun with admin activity and data access audit logs

Start lab
Activity Thumbnail for IAM Custom Roles
07 IAM Custom Roles
book Lab
access_time 1 hour
show_chart Introductory

Cloud IAM provides the right tools to manage resource permissions with minimum fuss and high automation. You do not directly grant users permissions. Instead, you grant them roles, which bundle one or more permissions. This allows you to map job...

Start lab