{"id":11905,"date":"2022-08-17T10:04:53","date_gmt":"2022-08-17T10:04:53","guid":{"rendered":"https:\/\/www.cloudthat.com\/training\/?post_type=stm-courses&#038;p=11905"},"modified":"2026-04-16T12:35:25","modified_gmt":"2026-04-16T12:35:25","slug":"google-cloud-professional-security-engineer","status":"publish","type":"stm-courses","link":"https:\/\/www.cloudthat.com\/training\/google-cloud-certification\/google-cloud-professional-security-engineer-certification-training","title":{"rendered":"Google Cloud Professional Security Engineer Certification Training"},"content":{"rendered":"<p>A Cloud Security Engineer enables organizations to design and implement secure workloads and infrastructure on Google Cloud. Through an understanding of security best practices and industry security requirements, this individual designs, develops, and manages a secure infrastructure by leveraging Google security technologies. The Cloud Security Engineer should be proficient in all aspects of cloud Security including identity and access management, defining organizational structure and policies, using Google technologies to provide data protection, configuring network security defenses, collecting and analyzing Google Cloud logs, managing incident responses, and demonstrating an understanding of the application of dynamic regulatory considerations.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A Cloud Security Engineer enables organizations to design and implement secure workloads and infrastructure on Google Cloud. Through an understanding of security best practices and industry security requirements, this individual designs, develops, and manages a secure infrastructure by leveraging Google security technologies. The Cloud Security Engineer should be proficient in all aspects of cloud Security [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":12394,"template":"","meta":{"footnotes":""},"stm_lms_course_taxonomy":[58],"metadata":{"permalink_customizer_regenerate_status":["1"],"stm_lms_product_id":["13604"],"_edit_last":["5091"],"_wp_page_template":["default"],"apss_content_flag":["0"],"lsq_tracking":["a:2:{s:8:\"tracking\";s:0:\"\";s:5:\"score\";s:0:\"\";}"],"_yoast_wpseo_content_score":["90"],"_yoast_wpseo_estimated-reading-time-minutes":["1"],"duration":[""],"_duration":["field_5fa0f3f0c86eb"],"day_1":[""],"_day_1":["field_5fce082f42f1e"],"time":[""],"_time":["field_5fce084742f1f"],"day_2":[""],"_day_2":["field_5fce085142f20"],"time_2":[""],"_time_2":["field_5fce089942f21"],"day_3":[""],"_day_3":["field_5fce08df42f22"],"time_3":[""],"_time_3":["field_5fce08f842f23"],"banner_image":[""],"_banner_image":["field_621873548f922"],"banner_description":["This Google Cloud Professional Security Engineer training equips the aspirants with hands-on skills and technical expertise to diligently prepare for the final exam and get certified."],"_banner_description":["field_612c733ed3564"],"after_completing_course_0_desciption":["Acquire knowledge on all the topics of cloud security. Mainly they will be proficient in configuring access, configure network security,  managing operations on Google Cloud."],"_after_completing_course_0_desciption":["field_6103ad2f9f5b2"],"after_completing_course_1_desciption":["Attain skills required to clear the GCP Professional Security Engineer Exam."],"_after_completing_course_1_desciption":["field_6103ad2f9f5b2"],"after_completing_course":["2"],"_after_completing_course":["field_6103aae828228"],"key_features_0_lists":["Our GCP Security Engineer training modules have 50% - 60% hands-on lab sessions to encourage Thinking-Based Learning (TBL)."],"_key_features_0_lists":["field_6103ad559f5b3"],"key_features_1_lists":["Interactive-rich virtual and face-to-face classroom teaching to inculcate Problem-Based Learning (PBL)."],"_key_features_1_lists":["field_6103ad559f5b3"],"key_features_2_lists":["Industry certified instructor-led training and mentoring sessions to develop Competency-Based Learning (CBL)."],"_key_features_2_lists":["field_6103ad559f5b3"],"key_features_3_lists":["Well-structured use-cases to simulate challenges encountered in a Real-World environment."],"_key_features_3_lists":["field_6103ad559f5b3"],"key_features_4_lists":["Integrated teaching assistance and support through experts designed Learning Management System (LMS) and ExamReady platform."],"_key_features_4_lists":["field_6103ad559f5b3"],"key_features_5_lists":["Being an authorized Industry Learning Partner gives us the edge over competition."],"_key_features_5_lists":["field_6103ad559f5b3"],"key_features":["6"],"_key_features":["field_6103aaff28229"],"who_should_attend_0_attend_lists":["A Cloud Security Engineer who designs and implements secure workloads and infrastructure on Google Cloud."],"_who_should_attend_0_attend_lists":["field_6103adfb3f3e4"],"who_should_attend":["1"],"_who_should_attend":["field_6103ab0d2822a"],"prerequisites_text":["<li>Google Cloud Associate Engineer certification.<\/li>"],"_prerequisites_text":["field_612c7498c4b84"],"certification_0_short_description":[""],"_certification_0_short_description":["field_6103ab2f2822c"],"certification_0_list_content":["<li>By earning Google Cloud Professional Cloud Security Engineer certification, you can be a competent Google Cloud certified professional.<\/li>\r\n<li>Demonstrate your abilities to to provide data protection, configuring network security defenses, collecting and analyzing Google Cloud logs using Google technologies.<\/li>\r\n<li>On successful completion of Google Cloud Certified Security Engineer training, aspirants receive a Course Completion Certificate from us.<\/li>\r\n<li>By successfully clearing the GCP Professional Cloud Security Engineer exam, aspirants earn Google Certification.<\/li>"],"_certification_0_list_content":["field_6103ab4a2822d"],"certification_0_image":["9737"],"_certification_0_image":["field_6103ab5b2822e"],"certification":["1"],"_certification":["field_6103ab1a2822b"],"about_trainer":[""],"_about_trainer":["field_6103ab6c2822f"],"course_fee_list":[""],"_course_fee_list":["field_6103abb728234"],"brochure_pdf":["16868"],"_brochure_pdf":["field_61232e258f89b"],"trainer":[""],"_trainer":["field_6124990e13784"],"course_section_0_module_title":["Module 1: Preparing for Your Professional Cloud Security Engineer Journey"],"_course_section_0_module_title":["field_612f5535940c3"],"course_section_0_module_description":[""],"_course_section_0_module_description":["field_612f564c921af"],"course_section_0_section_0_title":[""],"_course_section_0_section_0_title":["field_612f5233b0278"],"course_section_0_section_0_lesson_list_0_lession_title":["Introduction"],"_course_section_0_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_0_section_0_lesson_list_1_lession_title":["Configuring Access Within a Cloud Solution Environment"],"_course_section_0_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_0_section_0_lesson_list_2_lession_title":["Ensuring Data Protection\\"],"_course_section_0_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_0_section_0_lesson_list":["5"],"_course_section_0_section_0_lesson_list":["field_612f530a0ac40"],"course_section_0_section":["1"],"_course_section_0_section":["field_612f51e6b0277"],"course_section":["7"],"_course_section":["field_612f4f27b0276"],"note_section":[""],"_note_section":["field_616d3ed46bbd2"],"popular_sort":[""],"_popular_sort":["field_6172496402af3"],"related_courses":["a:3:{i:0;s:4:\"8287\";i:1;s:5:\"11506\";i:2;s:5:\"11869\";}"],"_related_courses":["field_61c453ca6b2dd"],"review_rating":[""],"_review_rating":["field_62a813a92bee6"],"total_review_count":["2564"],"_total_review_count":["field_62b002d8d2de5"],"average_review_count":["4.5"],"_average_review_count":["field_62b00367d2de6"],"scorm_package":[""],"curriculum":[""],"shareware":[""],"featured":[""],"views":["3455"],"level":["Professional"],"current_students":["0"],"duration_info":["4 Days"],"video_duration":[""],"status":[""],"status_dates":[""],"not_single_sale":[""],"price":["49900"],"sale_price":[""],"sale_price_dates":[""],"enterprise_price":[""],"not_membership":[""],"affiliate_course":[""],"affiliate_course_text":[""],"affiliate_course_link":[""],"expiration_course":[""],"end_time":[""],"drip_content":[""],"prerequisites":[""],"prerequisite_passing_level":[""],"announcement":[""],"faq":[""],"course_files_pack":[""],"course_certificate":[""],"type":[""],"preview":[""],"lesson_excerpt":[""],"lesson_video_poster":[""],"lesson_video_url":[""],"lesson_video":[""],"lesson_files_pack":[""],"stream_start_date":[""],"stream_start_time":[""],"stream_end_date":[""],"stream_end_time":[""],"timezone":[""],"stm_password":[""],"join_before_host":[""],"option_host_video":[""],"option_participants_video":[""],"option_mute_participants":[""],"option_enforce_login":[""],"questions":[""],"quiz_style":[""],"duration_measure":[""],"correct_answer":[""],"passing_grade":[""],"re_take_cut":[""],"random_questions":[""],"answers":[""],"question_explanation":[""],"review_course":[""],"review_user":[""],"review_mark":[""],"order":[""],"absolute":[""],"sticky":[""],"sticky_threshold":[""],"sticky_threshold_color":[""],"stm_agenda":[""],"stm_host":[""],"stm_date":[""],"stm_time":[""],"stm_timezone":[""],"stm_duration":[""],"stm_waiting_room":[""],"stm_join_before_host":[""],"stm_host_join_start":[""],"stm_start_after_participants":[""],"stm_mute_participants":[""],"stm_enforce_login":[""],"stm_alternative_hosts":[""],"author_id":[""],"emails":[""],"assignment_tries":[""],"assignment_files":[""],"editor_comment":[""],"try_num":[""],"start_time":[""],"assignment_id":[""],"student_id":[""],"course_id":[""],"_thumbnail_id":["12394"],"course_section_0_section_0_lesson_list_3_lession_title":["Managing Operations in a Cloud Environment"],"_course_section_0_section_0_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_0_section_0_lesson_list_4_lession_title":["Ensuring Compliance"],"_course_section_0_section_0_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_1_module_title":["Module 2: Google Cloud Fundamentals: Core Infrastructure"],"_course_section_1_module_title":["field_612f5535940c3"],"course_section_1_module_description":[""],"_course_section_1_module_description":["field_612f564c921af"],"course_section_1_section_0_title":[""],"_course_section_1_section_0_title":["field_612f5233b0278"],"course_section_1_section_0_lesson_list_0_lession_title":["Introducting Google Cloud"],"_course_section_1_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_1_section_0_lesson_list_1_lession_title":["Resources and Access in the Cloud"],"_course_section_1_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_1_section_0_lesson_list_2_lession_title":["Virtual Machines and Networks in the Cloud"],"_course_section_1_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_1_section_0_lesson_list_3_lession_title":["Storage in the Cloud"],"_course_section_1_section_0_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_1_section_0_lesson_list_4_lession_title":["Containers in the Cloud"],"_course_section_1_section_0_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_1_section_0_lesson_list_5_lession_title":["Applications in the Cloud"],"_course_section_1_section_0_lesson_list_5_lession_title":["field_612f533b0ac41"],"course_section_1_section_0_lesson_list_6_lession_title":["Developing and Deploying in the Cloud"],"_course_section_1_section_0_lesson_list_6_lession_title":["field_612f533b0ac41"],"course_section_1_section_0_lesson_list_7_lession_title":["Logging and Monitoring in the Cloud"],"_course_section_1_section_0_lesson_list_7_lession_title":["field_612f533b0ac41"],"course_section_1_section_0_lesson_list":["8"],"_course_section_1_section_0_lesson_list":["field_612f530a0ac40"],"course_section_1_section_1_title":["Hands-On"],"_course_section_1_section_1_title":["field_612f5233b0278"],"course_section_1_section_1_lesson_list_0_lession_title":["A Tour of Google Cloud Hands-on Labs"],"_course_section_1_section_1_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_1_section_1_lesson_list_1_lession_title":["Compute Engine: Qwik Start - Windows"],"_course_section_1_section_1_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_1_section_1_lesson_list_2_lession_title":["Getting Started with Cloud Shell and gcloud"],"_course_section_1_section_1_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_1_section_1_lesson_list_3_lession_title":["Kubernetes Engine: Qwik Start"],"_course_section_1_section_1_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_1_section_1_lesson_list_4_lession_title":["Cloud Storage: Qwik Start - Cloud Console\t"],"_course_section_1_section_1_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_1_section_1_lesson_list":["5"],"_course_section_1_section_1_lesson_list":["field_612f530a0ac40"],"course_section_1_section":["2"],"_course_section_1_section":["field_612f51e6b0277"],"course_section_2_module_title":["Module 3: Networking in Google Cloud: Defining and Implementing Networks"],"_course_section_2_module_title":["field_612f5535940c3"],"course_section_2_module_description":[""],"_course_section_2_module_description":["field_612f564c921af"],"course_section_2_section_0_title":[""],"_course_section_2_section_0_title":["field_612f5233b0278"],"course_section_2_section_0_lesson_list_0_lession_title":["Google Cloud VPC Networking Fundamentals"],"_course_section_2_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_2_section_0_lesson_list_1_lession_title":["Controlling Access to VPC Networks"],"_course_section_2_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_2_section_0_lesson_list_2_lession_title":["Sharing Networks across Projects"],"_course_section_2_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_2_section_0_lesson_list_3_lession_title":["Load Balancing"],"_course_section_2_section_0_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_2_section_0_lesson_list":["4"],"_course_section_2_section_0_lesson_list":["field_612f530a0ac40"],"course_section_2_section_1_title":["Hands-On"],"_course_section_2_section_1_title":["field_612f5233b0278"],"course_section_2_section_1_lesson_list_0_lession_title":["Multiple VPC Networks"],"_course_section_2_section_1_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_2_section_1_lesson_list_1_lession_title":["VPC Network Peering"],"_course_section_2_section_1_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_2_section_1_lesson_list_2_lession_title":["VPC Networks - Controlling Access"],"_course_section_2_section_1_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_2_section_1_lesson_list_3_lession_title":["HTTP Load Balancer with Cloud Armor"],"_course_section_2_section_1_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_2_section_1_lesson_list_4_lession_title":["Create an Internal Load Balancer"],"_course_section_2_section_1_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_2_section_1_lesson_list":["5"],"_course_section_2_section_1_lesson_list":["field_612f530a0ac40"],"course_section_2_section":["2"],"_course_section_2_section":["field_612f51e6b0277"],"course_section_3_module_title":["Module 4: Managing Security in Google Cloud"],"_course_section_3_module_title":["field_612f5535940c3"],"course_section_3_module_description":[""],"_course_section_3_module_description":["field_612f564c921af"],"course_section_3_section_0_title":[""],"_course_section_3_section_0_title":["field_612f5233b0278"],"course_section_3_section_0_lesson_list_0_lession_title":["Foundations of Google Cloud Security"],"_course_section_3_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_3_section_0_lesson_list_1_lession_title":["Cloud Identity"],"_course_section_3_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_3_section_0_lesson_list_2_lession_title":["Identity and Access Management (IAM)"],"_course_section_3_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_3_section_0_lesson_list_3_lession_title":["Configuring Virtual Private Cloud for Isolation and Security"],"_course_section_3_section_0_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_3_section_0_lesson_list":["4"],"_course_section_3_section_0_lesson_list":["field_612f530a0ac40"],"course_section_3_section_1_title":["Hands-On"],"_course_section_3_section_1_title":["field_612f5233b0278"],"course_section_3_section_1_lesson_list_0_lession_title":["Cloud IAM: Qwik Start"],"_course_section_3_section_1_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_3_section_1_lesson_list_1_lession_title":["IAM Custom Roles"],"_course_section_3_section_1_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_3_section_1_lesson_list_2_lession_title":["Service Accounts and Roles: Fundamentals"],"_course_section_3_section_1_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_3_section_1_lesson_list_3_lession_title":["User Authentication: Identity-Aware Proxy"],"_course_section_3_section_1_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_3_section_1_lesson_list_4_lession_title":["Getting Started with Cloud KMS"],"_course_section_3_section_1_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_3_section_1_lesson_list_5_lession_title":["Setting up a Private Kubernetes Cluster"],"_course_section_3_section_1_lesson_list_5_lession_title":["field_612f533b0ac41"],"course_section_3_section_1_lesson_list":["6"],"_course_section_3_section_1_lesson_list":["field_612f530a0ac40"],"course_section_3_section":["2"],"_course_section_3_section":["field_612f51e6b0277"],"course_section_4_module_title":["Module 5: Logging, Monitoring and Observability in Google Cloud"],"_course_section_4_module_title":["field_612f5535940c3"],"course_section_4_module_description":[""],"_course_section_4_module_description":["field_612f564c921af"],"course_section_4_section_0_title":[""],"_course_section_4_section_0_title":["field_612f5233b0278"],"course_section_4_section_0_lesson_list_0_lession_title":["Introduction to Monitoring in Google Cloud"],"_course_section_4_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_4_section_0_lesson_list_1_lession_title":["Avoiding Customer Pain"],"_course_section_4_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_4_section_0_lesson_list_2_lession_title":["Alerting Policies"],"_course_section_4_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_4_section_0_lesson_list_3_lession_title":["Monitoring Critical Systems"],"_course_section_4_section_0_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_4_section_0_lesson_list_4_lession_title":["Configuring Google Cloud Services for Observability"],"_course_section_4_section_0_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_4_section_0_lesson_list_5_lession_title":["Advanced Logging and Analysis"],"_course_section_4_section_0_lesson_list_5_lession_title":["field_612f533b0ac41"],"course_section_4_section_0_lesson_list_6_lession_title":["Monitoring Network Security and Audit Logs"],"_course_section_4_section_0_lesson_list_6_lession_title":["field_612f533b0ac41"],"course_section_4_section_0_lesson_list_7_lession_title":["Managing Incidents"],"_course_section_4_section_0_lesson_list_7_lession_title":["field_612f533b0ac41"],"course_section_4_section_0_lesson_list_8_lession_title":["Investigating Application Performance Issues"],"_course_section_4_section_0_lesson_list_8_lession_title":["field_612f533b0ac41"],"course_section_4_section_0_lesson_list_9_lession_title":["Optimizing the Costs of Monitoring"],"_course_section_4_section_0_lesson_list_9_lession_title":["field_612f533b0ac41"],"course_section_4_section_0_lesson_list":["10"],"_course_section_4_section_0_lesson_list":["field_612f530a0ac40"],"course_section_4_section_1_title":["Hands-On"],"_course_section_4_section_1_title":["field_612f5233b0278"],"course_section_4_section_1_lesson_list_0_lession_title":["Cloud Monitoring: Qwik Start"],"_course_section_4_section_1_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_4_section_1_lesson_list":["1"],"_course_section_4_section_1_lesson_list":["field_612f530a0ac40"],"course_section_4_section":["2"],"_course_section_4_section":["field_612f51e6b0277"],"course_section_5_module_title":["Module 6: Security Best Practices in Google Cloud"],"_course_section_5_module_title":["field_612f5535940c3"],"course_section_5_module_description":[""],"_course_section_5_module_description":["field_612f564c921af"],"course_section_5_section_0_title":[""],"_course_section_5_section_0_title":["field_612f5233b0278"],"course_section_5_section_0_lesson_list_0_lession_title":["Securing Compute Engine: Techniques and Best Practices"],"_course_section_5_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_5_section_0_lesson_list_1_lession_title":["Securing Cloud Data: Techniques and Best Practices"],"_course_section_5_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_5_section_0_lesson_list_2_lession_title":["Application Security: Techniques and Best Practices"],"_course_section_5_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_5_section_0_lesson_list_3_lession_title":["Securing Kubernetes: Techniques and Best Practices"],"_course_section_5_section_0_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_5_section_0_lesson_list":["4"],"_course_section_5_section_0_lesson_list":["field_612f530a0ac40"],"course_section_5_section_1_title":["Hands-On"],"_course_section_5_section_1_title":["field_612f5233b0278"],"course_section_5_section_1_lesson_list_0_lession_title":["Migrating to GKE Containers"],"_course_section_5_section_1_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_5_section_1_lesson_list_1_lession_title":["How to Use a Network Policy on Google Kubernetes Engine"],"_course_section_5_section_1_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_5_section_1_lesson_list_2_lession_title":["Using Role-based Access Control in Kubernetes Engine"],"_course_section_5_section_1_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_5_section_1_lesson_list_3_lession_title":["Google Kubernetes Engine Security: Binary Authorization"],"_course_section_5_section_1_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_5_section_1_lesson_list_4_lession_title":["Securing Applications on Kubernetes Engine - Three Examples"],"_course_section_5_section_1_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_5_section_1_lesson_list_5_lession_title":["Hardening Default GKE Cluster Configurations"],"_course_section_5_section_1_lesson_list_5_lession_title":["field_612f533b0ac41"],"course_section_5_section_1_lesson_list":["6"],"_course_section_5_section_1_lesson_list":["field_612f530a0ac40"],"course_section_5_section":["2"],"_course_section_5_section":["field_612f51e6b0277"],"course_section_6_module_title":["Module 7: Mitigating Security Vulnerabilities on Google Cloud Platform"],"_course_section_6_module_title":["field_612f5535940c3"],"course_section_6_module_description":[""],"_course_section_6_module_description":["field_612f564c921af"],"course_section_6_section_0_title":[""],"_course_section_6_section_0_title":["field_612f5233b0278"],"course_section_6_section_0_lesson_list_0_lession_title":["Securing Compute Engine"],"_course_section_6_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_6_section_0_lesson_list_1_lession_title":["Securing Cloud Data"],"_course_section_6_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_6_section_0_lesson_list_2_lession_title":["Protecting against Distributed Denial of Service Attacks (DDoS)"],"_course_section_6_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_6_section_0_lesson_list_3_lession_title":["Application Security"],"_course_section_6_section_0_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_6_section_0_lesson_list_4_lession_title":["Content-Related Vulnerabilities"],"_course_section_6_section_0_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_6_section_0_lesson_list":["5"],"_course_section_6_section_0_lesson_list":["field_612f530a0ac40"],"course_section_6_section_1_title":["Hands-On"],"_course_section_6_section_1_title":["field_612f5233b0278"],"course_section_6_section_1_lesson_list_0_lession_title":["Configuring, Using, and Auditing VM Service Accounts and Scopes"],"_course_section_6_section_1_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_6_section_1_lesson_list_1_lession_title":["Using Customer-Managed Encryption Keys with Cloud Storage and Cloud KMS"],"_course_section_6_section_1_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_6_section_1_lesson_list_2_lession_title":["Configuring Traffic Blocklisting with Google Cloud Armor"],"_course_section_6_section_1_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_6_section_1_lesson_list_3_lession_title":["Using Web Security Scanner to Find Vulnerabilities in an App Engine Application"],"_course_section_6_section_1_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_6_section_1_lesson_list":["4"],"_course_section_6_section_1_lesson_list":["field_612f530a0ac40"],"course_section_6_section":["2"],"_course_section_6_section":["field_612f51e6b0277"],"_yoast_wpseo_primary_stm_lms_course_taxonomy":[""],"custom_permalink":["gcp\/google-cloud-professional-security-engineer\/"],"_wp_old_date":["2022-08-22"],"course_mark_average":["0"],"course_marks":["a:0:{}"],"_yoast_wpseo_canonical":["https:\/\/www.cloudthat.com\/training\/gcp\/google-cloud-professional-security-engineer-certification-training"],"_edit_lock":["1776342798:5091"],"_wpb_vc_js_status":["false"],"_yoast_wpseo_wordproof_timestamp":[""],"video_type":[""],"presto_player_idx":[""],"lesson_video_width":[""],"lesson_shortcode":[""],"lesson_embed_ctx":[""],"lesson_youtube_url":[""],"lesson_stream_url":[""],"lesson_vimeo_url":[""],"lesson_ext_link_url":[""],"question_view_type":[""],"stm_select_approved_denied":[""],"stm_multiselect_approved":[""],"stm_multiselect_denied":[""],"course_banner_image":[""],"_course_banner_image":["field_63c69a6b81cf1"],"banner_url":[""],"_banner_url":["field_63c69a9681cf2"],"sale_price_dates_start":[""],"sale_price_dates_end":[""],"popular_course":["0"],"_popular_course":["field_64253688bc2e5"],"mobile_banner_image":[""],"_mobile_banner_image":["field_63cf93896d207"],"banner_link":[""],"_banner_link":["field_63c69a9681cf2"],"overview_section_heading":["Google Cloud Professional Security Engineer Course Overview"],"_overview_section_heading":["field_64538867ffdd0"],"after_completing_course_heading":["After completing Google Cloud Professional Security Engineer Training, students will be able to"],"_after_completing_course_heading":["field_645c78ade3f50"],"key_features_heading":["Google Cloud Professional Security Engineer Certification Course Key Features"],"_key_features_heading":["field_645388ceffdd1"],"who_should_attend_heading":["Who should attend this Google Cloud Professional Security Engineer Certification Training?"],"_who_should_attend_heading":["field_645388faffdd2"],"prerequisites_heading":["Prerequisites for the course"],"_prerequisites_heading":["field_64538a51ffdd3"],"category_features_heading":[""],"_category_features_heading":["field_644b8ff35049c"],"category_features_features":[""],"_category_features_features":["field_644b90025049d"],"category_features_cta_text":[""],"_category_features_cta_text":["field_644b90285049f"],"category_features_cta_link":[""],"_category_features_cta_link":["field_644b902d504a0"],"category_features":[""],"_category_features":["field_644b8fe15049b"],"course_features_0_heading":[""],"_course_features_0_heading":["field_644a0fae0e67e"],"course_features_0_features_list":[""],"_course_features_0_features_list":["field_644a0fb70e67f"],"course_features_0_background_color":[""],"_course_features_0_background_color":["field_644a0fde0e681"],"course_features":["1"],"_course_features":["field_644a0fa10e67d"],"certification_heading":[""],"_certification_heading":["field_64538bffffdd5"],"course_fee_heading":[""],"_course_fee_heading":["field_64538c1cffdd6"],"course_outline_heading":["Google Cloud Professional Security Engineer Course Outline"],"_course_outline_heading":["field_64538a8effdd4"],"reviews_heading":[""],"_reviews_heading":["field_64538c39ffdd7"],"faq_heading":[""],"_faq_heading":["field_64538c59ffdd8"],"permalink_customizer":["google-cloud-certification\/google-cloud-professional-security-engineer-certification-training"],"wpdocs-meta-bdt":["49900"],"wpdocs-meta-gbp":["1399"],"wpdocs-meta-usd":["1599"],"_yoast_wpseo_title":["Google Cloud Professional Security Engineer - CloudThat Certification Training"],"_yoast_wpseo_metadesc":["Gain in-depth knowledge of Google Cloud security principles. Train for certification as a Professional Security Engineer with CloudThat"],"question_sets_details_heading":[""],"_question_sets_details_heading":["field_65d303841f38d"],"question_sets_details_description":[""],"_question_sets_details_description":["field_65d303841f38e"],"question_sets_details_button_text":[""],"_question_sets_details_button_text":["field_65d303841f38f"],"question_sets_details_question_sets":[""],"_question_sets_details_question_sets":["field_65d303841f390"],"question_sets_details":[""],"_question_sets_details":["field_65d303841f38c"],"educational_schema":[""],"_educational_schema":["field_652fbbf6f589a"],"_regular_price_wmcp":["{\"USD\":\"1199\",\"GBP\":\"999\",\"BDT\":\"49900\"}"],"wpdocs-meta-rand":["5399"],"wpdocs-meta-aed":["2500"],"offline_price":[""],"offline-bdt":[""],"offline-gbp":[""],"offline-rand":[""],"offline-aed":[""],"offline-usd":[""]},"acf":[],"_links":{"self":[{"href":"https:\/\/www.cloudthat.com\/training\/wp-json\/wp\/v2\/stm-courses\/11905"}],"collection":[{"href":"https:\/\/www.cloudthat.com\/training\/wp-json\/wp\/v2\/stm-courses"}],"about":[{"href":"https:\/\/www.cloudthat.com\/training\/wp-json\/wp\/v2\/types\/stm-courses"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudthat.com\/training\/wp-json\/wp\/v2\/users\/12"}],"version-history":[{"count":1,"href":"https:\/\/www.cloudthat.com\/training\/wp-json\/wp\/v2\/stm-courses\/11905\/revisions"}],"predecessor-version":[{"id":27915,"href":"https:\/\/www.cloudthat.com\/training\/wp-json\/wp\/v2\/stm-courses\/11905\/revisions\/27915"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cloudthat.com\/training\/wp-json\/wp\/v2\/media\/12394"}],"wp:attachment":[{"href":"https:\/\/www.cloudthat.com\/training\/wp-json\/wp\/v2\/media?parent=11905"}],"wp:term":[{"taxonomy":"stm_lms_course_taxonomy","embeddable":true,"href":"https:\/\/www.cloudthat.com\/training\/wp-json\/wp\/v2\/stm_lms_course_taxonomy?post=11905"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}