Teilnehmen Anmelden

Philipp Rieblinger

Mitglied seit 2023

Gold League

29340 Punkte
Google Security Operations - Deep Dive Earned Okt 17, 2024 EDT
Google Security Operations - Fundamentals Earned Okt 17, 2024 EDT
Using DevSecOps in your Google Cloud Environment Earned Aug 21, 2024 EDT
Mitigate Threats and Vulnerabilities with Security Command Center Earned Aug 21, 2024 EDT
Observability in Google Cloud Earned Aug 20, 2024 EDT
Securing your Network with Cloud Armor Earned Aug 19, 2024 EDT
Google Kubernetes Engine Best Practices: Security Earned Jul 30, 2024 EDT
Grundlegende Sicherheitsfunktionen in Google Cloud implementieren Earned Jul 29, 2024 EDT
Geschütztes Google Cloud-Netzwerk erstellen Earned Jul 16, 2024 EDT
Logging and Monitoring in Google Cloud Earned Jun 19, 2024 EDT
Mitigating Security Vulnerabilities on Google Cloud Earned Jun 13, 2024 EDT
Security Best Practices in Google Cloud Earned Jun 7, 2024 EDT
Networking in Google Cloud: Routing and Addressing Earned Apr 11, 2024 EDT
Networking in Google Cloud: Fundamentals Earned Feb 27, 2024 EST
Google Cloud-Grundlagen: Kerninfrastruktur Earned Feb 23, 2024 EST
Preparing for Your Professional Cloud Security Engineer Journey Earned Feb 21, 2024 EST
Managing Security in Google Cloud Earned Okt 17, 2023 EDT
Google Security Operations - SIEM Rules Earned Okt 6, 2023 EDT
Google Security Operations - SOAR Developer Earned Okt 6, 2023 EDT
Google Security Operations - SOAR Analyst Earned Okt 5, 2023 EDT
Security Practices with Google Security Operations - SIEM Earned Sep 27, 2023 EDT
Mandiant Fundamentals Earned Sep 1, 2023 EDT
SOAR Fundamentals Earned Sep 1, 2023 EDT
Chronicle SIEM Fundamentals Earned Sep 1, 2023 EDT

Take the next steps in working with the Chronicle Security Operations Platform. Build on fundamental knowledge to go deeper on cusotmization and tuning.

Weitere Informationen

This course covers the basline skills needed for the Chronicle Security Operations Platform. The modules will cover specific actions and features that security engineers should become familiar with to start using the toolset.

Weitere Informationen

In this course, you will learn the basic skills to implement secure and efficient DevSecOps practices on Google Cloud. You'll learn how to secure your development pipeline with Google Cloud services like Artifact Registry, Cloud Build, Cloud Deploy, and Binary Authorization. This enables you to build, test, and deploy containerized applications with security controls throughout the CI/CD pipeline.

Weitere Informationen

Complete the intermediate Mitigate Threats and Vulnerabilities with Security Command Center skill badge to demonstrate skills in the following: preventing and managing environment threats, identifying and mitigating application vulnerabilities, and responding to security anomalies.

Weitere Informationen

Welcome to the second part of the two part course, Observability in Google Cloud. This course is all about application performance management tools, including Error Reporting, Cloud Trace, and Cloud Profiler.

Weitere Informationen

Learn to secure your deployments on Google Cloud, including: how to use Cloud Armor bot management to mitigate bot risk and control access from automated clients; use Cloud Armor denylists to restrict or allow access to your HTTP(S) load balancer at the edge of the Google Cloud; apply Cloud Armor security policies to restrict access to cache objects on Cloud CDN and Google Cloud Storage; and mitigate common vulnerabilities using Cloud Armor WAF rules.

Weitere Informationen

Get Anthos Ready. This Google Kubernetes Engine-centric quest of best practice hands-on labs focuses on security at scale when deploying and managing production GKE environments -- specifically role-based access control, hardening, VPC networking, and binary authorization.

Weitere Informationen

Mit dem Skill-Logo zum Kurs Grundlegende Sicherheitsfunktionen in Google Cloud implementieren weisen Sie fortgeschrittene Kenntnisse in folgenden Bereichen nach: Erstellen und Zuweisen von Rollen mit Identity and Access Management (IAM); Erstellen und Verwalten von Dienstkonten; Herstellen einer privaten Verbindung zwischen Virtual Private Cloud-Netzwerken (VPC); Beschränken des Anwendungszugriffs mithilfe von Identity-Aware Proxy; Verwalten von Schlüsseln und verschlüsselten Daten mit Cloud Key Management Service (KMS); und Erstellen eines privaten Kubernetes-Clusters. Ein Skill-Logo ist ein exklusives digitales Abzeichen, das von Google Cloud ausgestellt wird und Ihre Kenntnisse über unsere Produkte und Dienste belegt. In diesem Zusammenhang wird auch Ihre Fähigkeit bewertet, Ihr Wissen in einer interaktiven praxisnahen Umgebung anzuwenden. Absolvieren Sie eine kursspezifische Aufgabenreihe und die Challenge-Lab-Prüfung, um ein digitales Abzeichen zu erhalten, das Sie in Ihrem Netz…

Weitere Informationen

Sichern Sie sich ein Skill-Logo, indem Sie den Kurs Geschütztes Google Cloud-Netzwerk erstellen abschließen. Dabei lernen Sie verschiedene netzwerkbezogene Ressourcen kennen, mit denen Sie Ihre Anwendungen in Google Cloud erstellen, skalieren und schützen können. Ein Skill-Logo ist ein exklusives digitales Abzeichen, das von Google Cloud ausgestellt wird und Ihre Kenntnisse über unsere Produkte und Dienste belegt. In diesem Zusammenhang wird auch die Fähigkeit bewertet, Ihr Wissen in einer interaktiven praxisnahen Umgebung anzuwenden. Absolvieren Sie eine kursspezifische Aufgabenreihe und die Challenge-Lab-Prüfung, um ein digitales Abzeichen zu erhalten, das Sie in Ihrem Netzwerk posten können.

Weitere Informationen

This course teaches participants techniques for monitoring and improving infrastructure and application performance in Google Cloud. Using a combination of presentations, demos, hands-on labs, and real-world case studies, attendees gain experience with full-stack monitoring, real-time log management and analysis, debugging code in production, tracing application performance bottlenecks, and profiling CPU and memory usage.

Weitere Informationen

In this self-paced training course, participants learn mitigations for attacks at many points in a Google Cloud-based infrastructure, including Distributed Denial-of-Service attacks, phishing attacks, and threats involving content classification and use. They also learn about the Security Command Center, cloud logging and audit logging, and using Forseti to view overall compliance with your organization's security policies.

Weitere Informationen

This self-paced training course gives participants broad study of security controls and techniques on Google Cloud. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution, including Cloud Storage access control technologies, Security Keys, Customer-Supplied Encryption Keys, API access controls, scoping, shielded VMs, encryption, and signed URLs. It also covers securing Kubernetes environments.

Weitere Informationen

Welcome to the second course in the networking and Google Cloud series routing and addressing. In this course, we'll cover the central routing and addressing concepts that are relevant to Google Cloud's networking capabilities. Module one will lay the foundation by exploring network routing and addressing in Google Cloud, covering key building blocks such as routing IPv4, bringing your own IP addresses and setting up cloud DNS. In Module two will shift our focus to private connection options, exploring use cases and methods for accessing Google and other services privately using internal IP addresses. By the end of this course, you'll have a solid grasp of how to effectively route and address your network traffic within Google Cloud.

Weitere Informationen

Networking in Google cloud is a 6 part course series. Welcome to the first course of our six part course series, Networking in Google Cloud: Fundamentals.  This course provides a comprehensive overview of core networking concepts, including networking fundamentals, virtual private clouds (VPCs), and the sharing of VPC networks. Additionally, the course covers network logging and monitoring techniques. 

Weitere Informationen

In „Google Cloud-Grundlagen: Kerninfrastruktur“ werden wichtige Konzepte und die Terminologie für die Arbeit mit Google Cloud vorgestellt. In Videos und praxisorientierten Labs werden viele Computing- und Speicherdienste von Google Cloud sowie wichtige Tools für die Ressourcen- und Richtlinienverwaltung präsentiert und miteinander verglichen.

Weitere Informationen

This course helps learners prepare for the Professional Cloud Security Engineer (PCSE) Certification exam. Learners will be exposed to and engage with exam topics through a series of lectures, diagnostic questions, and knowledge checks. After completing this course, learners will have a personalized workbook that will guide them through the rest of their certification readiness journey.

Weitere Informationen

This self-paced training course gives participants broad study of security controls and techniques on Google Cloud. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution, including Cloud Identity, Resource Manager, IAM, Virtual Private Cloud firewalls, Cloud Load Balancing, Cloud Peering, Cloud Interconnect, and VPC Service Controls. This is the first course of the Security in Google Cloud series. After completing this course, enroll in the Security Best Practices in Google Cloud course.

Weitere Informationen

Get hands-on experience applying and building rules for Chronicle. You learn what YARA-L is and how to customize & create event rules.

Weitere Informationen

This course helps developers customize Chronicle and augment its abilities with third party integrations.

Weitere Informationen

This course helps you understand how to use Chronicle to properly handle security incidents.

Weitere Informationen

Learn the technical aspects you need to know about Chronicle and how it can help you detect and action threats.

Weitere Informationen

Learn which Mandiant products directly enhance or augment capabilities provided by Chronicle SIEM and SOAR and how those products integrate into our workflow.

Weitere Informationen

This course will familiarize you with the core functionality of Chronicle, including the user interface, connections, and settings.

Weitere Informationen

This course will provide you with an overview of SIEM technology to set the stage for the differentiation and expansion of capabilities that Chronicle SIEM provides.

Weitere Informationen