Get startedGet started for free

Introduction

1. Introduction

At Google Cloud, we believe in going beyond reliance on a single technology for security. Our multilayered strategy builds progressive security layers, combining global data centers, purpose-built servers, custom security hardware and software, and two-step authentication. This approach provides true defense-in-depth. In this section of the course, you’ll learn about how Google designs and builds its own data centers by using purpose-built servers, networking, and custom security hardware and software, the role that encryption plays in securing an organization’s data and the ways that it can protect data exposed to risks in different states, the differences between authentication, authorization, and auditing, the benefits of using two-step verification and Identity and Access Management, or IAM, how an organization can protect against network attacks by using Google products, and security operations in the cloud and its related business benefits.

2. Let's practice!

Create Your Free Account

or

By continuing, you accept our Terms of Use, our Privacy Policy and that your data is stored in the USA.