Course Highlights
- The programme prepares learners for entry-level roles in Cloud Cybersecurity.
- Learners will complete hands-on labs in each course to practise key skills and produce work examples for potential employers.
- The final course includes an interactive capstone project where concepts from courses 1-4 are applied, preparing learners to establish a career in the cloud security field.
- The total time to complete the programme is approximately 90 hours.
- The programme includes 5 courses, 19 modules, 212 videos, 12 labs, 154 readings, 94 quizzes, and one capstone.
-
Skill Type
-
Course Duration
-
Domain
-
GOI Incentive applicable
-
Course Category
-
Nasscom Assessment
-
Placement Assistance
-
Certificate Earned
-
Badge Earned
-
Content Alignment Type
-
NOS Details
-
Mode of Delivery
Course Details
What will you learn in the Google Cloud Cybersecurity course?
Upon completion of the programme, learners will be able to:
- Apply the material from courses 1-4 in an interactive capstone project, including cloud security principles, risk management, identifying vulnerabilities, incident management, and crisis communications.
- Develop a plan to protect an organisation by detecting, responding to, and recovering from security threats and incidents.
- Explain IAM, the scope of permissions and roles, and the roles and responsibilities of a security organisation.
- Identify the regulatory requirements and standards that apply to different industries.
- Interpret and identify risks and vulnerabilities.
- Develop career resources and practise resume and interview techniques for a role in cloud security computing.
Why should you take the Google Cloud Cybersecurity course?
- Prepare you for entry-level roles in Cloud Cybersecurity.
- Provides hands-on labs to practise key skills and produce work examples to show potential employers.
- Culminate in a capstone project that applies learning principles to prepare you for a career in the cloud security field.
- Teach you to identify threats, risks, and vulnerabilities, and then respond to and defend against security incidents.
- Include content on foundational Cybersecurity concepts for learners who do not have prior knowledge.
Who should take the Google Cloud Cybersecurity course?
- Individuals seeking entry-level roles in Cloud Cybersecurity.
- Learners who have familiarity with foundational Cybersecurity concepts, skills, and tools.
- People who want to learn the basics of network security, threat analysis, SIEM technologies, Linux and SQL, and incident detection and documentation.
- Those preparing for job applications and interviews in the cloud security field.
Curriculum
The programme has five courses:
- Course 1: Introduction to Security Principles in Cloud Computing (approx. 15 hours): Introduces cloud security principles, the field of cloud security, primary roles and responsibilities, and cloud fundamentals.
- Course 2: Strategies for Cloud Security Risk Management (approx. 20 hours): Introduces widely used cloud risk management frameworks, security domains, the compliance lifecycle, and regulations such as HIPAA, NIST CSF and SOC.
- Course 3: Cloud Security Risks: Identify and Protect Against Threats (approx. 22 hours): Covers identity management and access control, threat and vulnerability management, cloud‑native principles and data protection measures.
- Course 4: Detect, Respond and Recover from Cloud Cybersecurity Attacks (approx. 22 hours): Emphasises logging, security and alert monitoring, attack mitigation techniques, incident management, crisis communications and preparing for business continuity and disaster recovery.
- Course 5: Put It All Together: Prepare for a Cloud Security Analyst Job (approx. 11 hours): Combines and applies material from courses 1-4 in an interactive capstone project and finalises resume updates and interview techniques.
Tools you will learn in the Google Cloud Cybersecurity course
Skills:
- Cloud security principles and the security lifecycle
- Risk management processes and implementing security controls to mitigate risks
- Compliance lifecycle, data protection, and privacy
- Identity and Access Management (IAM), including AAA elements
- Threat and vulnerability management, securing containers and Kubernetes
- Security monitoring, identifying security alerts, and composing custom queries against aggregated logs
- Incident response, attack mitigation, and disaster recovery planning
Tools:
- Google Cloud Console and Cloud Shell
- Google Cloud and multi-cloud tools for risk and compliance management
- Google Cloud's Security Command Center (SCC) and Risk Manager
- Logging and security monitoring systems in a cloud environment