Back to Courses

Cloud Computing Courses - Page 23

Showing results 221-230 of 930
Google Kubernetes Engine Security: Binary Authorization
This is a self-paced lab that takes place in the Google Cloud console. This lab deploys a Kubernetes Engine Cluster with the Binary Authorization feature enabled; you'll learn how to whitelist approved container registries and the process of creating and running a signed container.
Authentication, Authorization, and Identity with Vault
This is a self-paced lab that takes place in the Google Cloud console. In this hands-on lab, you will learn to use authentication and authorization methods within Vault. You will also create users, aliases, entities, and groups.
SAP Customer Engagement and Discovery
SAP Customer Engagement and Discovery is the third course in the SAP Technology Consultant Professional Certificate program. The course introduces you to SAP Activate methodology and teaches you how to engage with customers and work with them in exploring how to achieve their transformation goals. You’ll learn how to gather information and insights about a customer’s business, technology, and data. You’ll investigate SAP’s fit-to-standard analysis approach. You’ll consider how to accurately understand and assess a client’s needs. And you’ll look at SAP’s Customer Journey Roadmap, which includes how to identify and communicate the value of a solution to stakeholders and get signoff. By the end of this course, you will be able to: Describe the key elements of the SAP Activate methodology and Customer Engagement Model. Explain the program planning and set up activities for a typical SAP customer project. Explain what a technology consultant does in the Customer Engagement and Discovery phase of SAP projects. Explain how to gather relevant information and insights about customer strategy, objectives, processes, technology, and data. Describe how to conduct discovery workshops and interviews. Explain SAP's fit-to-standard approach and key preparation activities and develop a Customer Journey Roadmap. Identify and communicate the business value of a proposed SAP solution.
Visualizing Billing Data with Google Data Studio
This is a self-paced lab that takes place in the Google Cloud console. In this lab, you will harness the power of Data Studio, where you will learn how to build billing graphs and charts so you can slice and dice your GCP bill the way you want.
Online Data Migration to BigQuery using Striim
This is a self-paced lab that takes place in the Google Cloud console. Continuous Data Replication from Cloud SQL for MySQL to BigQuery using Striim
Check Point Jump Start: Harmony Endpoint Security
Harmony Endpoint is a complete solution that protects the remote workforce from today’s complex threat landscape. It prevents the most imminent threats to the endpoint such as ransomware, phishing, or drive-by malware, while quickly minimizing breach impact with autonomous detection and response. With remote users connecting to your corporate applications from anywhere, your organization’s attack surface is increasingly expanding. Check Point Harmony is the industry’s first unified security solution for users' devices and access.It protects devices and internet connections from the most sophisticated attacks while ensuring zero-trust access to corporate applications. The course modules are: Introduction Architecture Architecture-the Flow Architecture-Accessing the Endpoint Server Deployment Deployment-Installing the Client on Windows Deployment-Installing the Client on Linux Deployment-Visibility Deployment-Change Policy Deployment-Upgrade Deployment-Remove a client Communication Communication-Port, Services, and URLs Exclusions Summary Check Point Software Technologies Ltd. is a leading provider of cybersecurity solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry-leading catch rate of malware, ransomware, and other types of attacks. Check Point offers multilevel security architecture, “Infinity” Total Protection with Gen V advanced threat prevention, which defends enterprises’ cloud, network, and mobile device-held information. Check Point provides the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes.
Pub/Sub Lite: Qwik Start
This is a self-paced lab that takes place in the Google Cloud console. Pub/Sub Lite is a zonal service for messaging systems with predictable traffic patterns. In this lab you will create Lite topics and Lite subscriptions, then send and receive messages using the Pub/Sub Lite client library for Python.
Troubleshooting Workloads on GKE for Site Reliability Engineers
This is a self-paced lab that takes place in the Google Cloud console. The Cloud Operations Sandbox is intended to make it easy for you to deploy and run a non-trivial application that lets you explore the Google Cloud Platform services, particularly the Cloud Operations (formerly Stackdriver) product suite.
Networking 101
This is a self-paced lab that takes place in the Google Cloud console. In this lab you will learn how to perform basic networking tasks on Google Cloud Platform by setting up a network and 3 subnetworks; and how GCP might differ from an on-premises setup.
Cloud Top Ten Risks
After completing the course, the student should be able to do the following: ● Associate lists of OWASP Top Ten Risks with major cloud cybersecurity risks. ● Apply appropriate cryptographic techniques to secure authentication mechanisms and cloud data. ● Identify the most effective strategies for resisting injection attacks, cross-site scripting attacks, and object deserialization attacks. ● Assess strategies to address risks posed by administrative failures, including misconfiguration, broken access control, vulnerable software components, and security monitoring.