A Professional Cloud Security Engineer enables organizations to design and implement a secure infrastructure on Google Cloud Platform. Through an understanding of security best practices and industry security requirements, this individual designs, develops, and manages a secure infrastructure leveraging Google security technologies. The Cloud Security Professional should be proficient in all aspects of Cloud Security including managing identity and access management, defining organizational structure and policies, using Google technologies to provide data protection, configuring network security defenses, collecting and analyzing Google Cloud Platform logs, managing incident responses, and an understanding of regulatory concerns.
Objectives
The Professional Cloud Security Engineer exam assesses your ability to:
Configure access within a cloud solution environment
Configure network security
Ensure data protection
Manage operations within a cloud solution environment
Ensure compliance
Audience
Please refer objective
Prerequisites
Familiarity with the Linux command line, web servers, and text editors.
Content
Section 1: Designing, Planning, and Prototyping a GCP Network
1.1 Designing the overall network architecture. Considerations include:
Failover and disaster recovery strategy
Options for high availability
DNS strategy (e.g., on-premises, Cloud DNS, GSLB)
Meeting business requirements
Meeting availability SLAs
Choosing the appropriate load balancing options
Optimizing for latency (e.g., MTU size, caches, CDN)
Understanding how quotas are applied per project and per VPC
Hybrid connectivity (e.g., Google private access for hybrid connectivity)
Container networking
IAM and security
SaaS, PaaS, and IaaS services
Microsegmentation for security purposes (e.g., using metadata, tags)
1.2 Designing a Virtual Private Cloud (VPC). Considerations include:
CIDR range for subnets
IP addressing (e.g., static, ephemeral, private)
Standalone or shared
Multiple vs. single
Multi-zone and multi-region
Peering
Firewall (e.g., service account–based, tag-based)
Routes
Differences between Google Cloud Networking and other cloud platforms
1.3 Designing a hybrid network. Considerations include:
Using Interconnect (e.g., dedicated vs. partner)
Peering options (e.g., direct vs. carrier)
IPsec VPN
Cloud Router
Failover and disaster recovery strategy (e.g., building high availability with BGP using cloud router)
Shared vs. standalone VPC Interconnect access
Cross-organizational access
Bandwidth
1.4 Designing a Container IP Addressing plan for Google Kubernetes Engine
Section 2: Implementing a GCP Virtual Private Cloud (VPC)