Course summary
1. Course summary
This brings us to the end of the “Trust and Security with Google Cloud” course. Let’s do a quick recap. In the first section of the course titled, “Trust and security in the cloud,” you explored important security terms and concepts, the difference between cloud security and traditional on-premises security, today’s top cybersecurity threats and business implications, and the importance of control, compliance, confidentiality, integrity, and availability in a cloud security model. In the second section of the course, titled “Google’s trusted infrastructure,” you learned about how Google designs and builds data centers, the role encryption plays in securing an organization’s data, the differences between authentication, authorization, and auditing, the benefits of using two-step verification and IAM, ways to protect against network attacks by using Google products, and security operations in the cloud and its related business benefits. And finally, in the third section of the course, titled “Google Cloud’s trust principles and compliance,” you examined Google’s seven trust principles, data residency and data sovereignty options with Google Cloud, and how the Google Cloud compliance resource center and Compliance Reports Manager support industry and regional compliance needs. Now that you had a comprehensive introduction to trust and security on Google Cloud, you can move on to the final course in the Cloud Digital Leader series, “Scaling with Google Cloud Operations,” where you’ll learn about how Google Cloud supports an organization's financial governance and ability to control their cloud costs, the basic concepts of modern operations, reliability, and resilience in the cloud, and how Google Cloud helps organizations meet sustainability goals and reduce environmental impact. We’ll see you next time!2. Let's practice!
Create Your Free Account
or
By continuing, you accept our Terms of Use, our Privacy Policy and that your data is stored in the USA.