- Google Cloud VPC Networking Fundamentals
- Recall that networks belong to projects
- Explain the differences among default, auto, and custom networks
- Create networks and subnets
- Explain how IPv4 addresses are assigned to Compute Engine instances
- Publish domain names using Google Cloud DNS
- Create Compute Engine instances with IP aliases
- Create Compute Engine instances with multiple virtual networks
- Controlling Access to VPC Networks
- Outline how IAM policies affect VPC networks
- Control access to network resources using service accounts
- Control access to Compute Engine instances with tag-based firewall rules
- Sharing Networks Across Projects
- Outline the overall workflow for configuring Shared VPC
- Differentiate between the IAM roles that allow network resources to be managed
- Configure peering between unrelated VPC Networks
- Recall when to use Shared VPC and when to use VPC Network Peering
- Load Balancing
- Recall the various load balancing services
- Configure Layer 7 HTTP(S) load balancing
- Whitelist and blacklist IP traffic with Cloud Armor
- Cache content with Cloud CDN
- Explain Layer 4 TCP or SSL proxy load balancing
- Explain regional network load balancing
- Configure internal load balancing
- Recall the choices for enabling IPv6 Internet connectivity for Google Cloud load balancers
- Determine which Google Cloud load balancer to use In which situation
- Hybrid Connectivity
- Recall the Google Cloud interconnect and peering services available to connect your infrastructure to Google Cloud
- Explain Dedicated Interconnect and Partner Interconnect
- Describe the workflow for configuring a Dedicated Interconnect
- Build a connection over a VPN with Cloud Router
- Determine which Google Cloud interconnect service to use in which situation
- Explain Direct Peering and Partner Peering
- Determine which Google Cloud peering service to use in which situation
- Networking Pricing and Billing
- Recognize how networking features are charged
- Use Network Service Tiers to optimize spend
- Determine which Network Service Tier to use in which situation
- Recall that labels can be used to understand networking spend
- Network Design and Deployment
- Explain common network design patterns
- Configure Private Google Access to allow access to certain Google Cloud services from VM instances with only internal IP addresses
- Configure Cloud NAT to provide your instances without public IP addresses access to the internet
- Automate the deployment of networks using Deployment Manager or Terraform
- Launch networking solutions using Cloud Marketplace
- Network Monitoring and Troubleshooting
- Configure uptime checks, alerting policies and charts for your network services
- Use VPC Flow Logs to log and analyze network traffic behavior
Dernière mise à jour : le 04/05/2024 à 13:05