or
Deze oefening maakt deel uit van de cursus
In this introduction, you explore the course goals and preview each section.
In this section of the course, you explore today's top cybersecurity threats and how they impact businesses, differences between cloud security and traditional on-premises security, and key security terms and concepts.
In this section of the course, you focus on the security benefits of Google's data centers, the role encryption plays in securing data, the difference between authentication, authorization, and auditing, and how Google products can help protect against network attacks.
Huidige oefening
In this section of the course, you learn how Google Cloud's trust principles, transparency reports, and independent third-party audits support customer trust. You also explore the importance of data sovereignty and data residency, and how the Google Cloud compliance resource center and Compliance Reports Manager supports industry and regional compliance needs.
The course closes with a summary of the main points covered in each section and next steps to continue learning.