Google Workspace Security
Google Workspace Security is the third course in the Google Workspace Administration series.In this course you will focus on the various aspects of Google Workspace Security including user password policies and how to enable and enforce two step verification (2SV) for your users. You will learn about application security and understand how to whitelist and block API access to your account. You will see how Google Workspace can easily be integrated with a number of …
Google Workspace Security
Google Workspace Security is the third course in the Google Workspace Administration series.In this course you will focus on the various aspects of Google Workspace Security including user password policies and how to enable and enforce two step verification (2SV) for your users. You will learn about application security and understand how to whitelist and block API access to your account. You will see how Google Workspace can easily be integrated with a number of predefined 3rd party applications. You will also become familiar with the SSO options in Google Workspace. Finally you will understand how to spot potential security risks within your organization and learn how to address them using the tools available in the admin console.
By the end of this course participants will be able to:
- Configure Google’s default user protection settings such as password policies and recovery options.
- Understand best practices for implementing and enforcing 2-step verification in your organization.
- Understand the SSO options available and be able to identify the differences between using Google as an Identity Provider versus a 3rd party provider.
- Be able to integrate cloud based enterprise SAML applications into your Google Workspace account using Google as the Identity Provider.
- Understand how to integrate your own LDAP compliant applications into Google Workspace using the Secure LDAP service.
- Restrict access to a Google service to trusted applications only to prevent malicious attacks on that service.
- Manage the Google Workspace Marketplace for your organization to ensure only trusted applications can be installed on your devices.
- Use the security and alert centers to identify, triage, and take action on security and privacy issues in your organization.
Prerequisites
You should have completed the Introduction to Google Workspace Administration and Managing Google Workspace courses.
Configure settings such as password policie and recovery options.Describe best practices for implementing 2-step verification in your organization.
Understand the SSO options available and identify the differences between using Google as an Identity Provider versus a 3rd party provider.
Manage the Google Workspace Marketplace for your organization to ensure only trusted applications can be installed on your devices.
Use the security and alert centers to identify, triage, and take action on security and privacy issues in your organization.
Syllabus
Syllabus - What you will learn from this course
Week 1
Google Workspace Security
FAQ
When will I have access to the lectures and assignments?
Access to lectures and assignments depends on your type of enrollment. If you take a course in audit mode, you will be able to see most course materials for free. To access graded assignments and to earn a Certificate, you will need to purchase the Certificate experience, during or after your audit. If you don't see the audit option:
What will I get if I subscribe to this Certificate?
When you enroll in the course, you get access to all of the courses in the Certificate, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile. If you only want to read and view the course content, you can audit the course for free.
Reviews
Awesome love to be part on an amazing certification course
G - suite security explained very clearly and information regarding this very easy.
Overall good, but I felt the SSO and LDAP parts were hard to follow as it wasn't possible to complete realistic workshops on these. Perhaps when the videos are added it will help.
This course really helped us. thanks coursera and thanks to Google for providing us such a valuble course.