Curriculum
- 15 Sections
- 75 Lessons
- 10 Weeks
Expand all sectionsCollapse all sections
- Module 1: Course Kickoff + Cloud Security Basics5
- Module 2: Resource Hierarchy + Governance Controls5
- Module 3: IAM Fundamentals (Access Control Done Right)5
- Module 4: IAM Advanced (Real-World Access Patterns)5
- Module 5: Identity Federation + SSO + MFA5
- Module 6: Network Security Basics (VPC, Subnets, Firewalls)5
- Module 7: Boundary Protection (Zero Trust in GCP)5
- Module 8: Secure Communications (TLS, Ingress/Egress Security)5
- Module 9: Data Protection Foundations5
- 9.1Data classification: public/internal/confidential/restricted
- 9.2Encryption at rest and in transit: what’s default vs what you control
- 9.3Database security basics (Cloud SQL/BigQuery security concepts)
- 9.3Storage security patterns (bucket policies, access controls)
- 9.4Data loss prevention concepts (DLP-style thinking)
- Module 10: Cloud KMS + Secret Management5
- Module 11: Workload Security (Compute, Containers, Serverless)6
- 11.1VM hardening basics: OS Login, patching, least privilege
- 11.2Shielded VM concepts (protecting boot integrity)
- 11.3GKE security essentials: node vs pod security thinking
- 11.4Workload Identity for GKE (avoiding service account keys)
- 11.5Supply chain security basics: Artifact Registry, image scanning concepts
- 11.6Binary Authorization concept (only deploy approved images)
- Module 12: Logging, Monitoring, and Auditability5
- Module 13: Threat Detection + Security Posture5
- 13.1Security Command Center (SCC) overview: assets, findings, prioritization
- 13.2Misconfiguration detection and risk scoring approach
- 13.3Threat detection concepts: what signals matter (IAM, network, workloads)
- 13.4Vulnerability management basics (scan → triage → fix → verify)
- 13.5Hardening roadmap: quick wins vs long-term controls
- Module 14: Incident Response + Security Operations5
- Module 15: Compliance Support + Policy-Driven Security4
Shared responsibility model in cloud
Next
