SADA and Google Cloud are teaming up to offer you a complimentary five-week deep dive into cloud security on the Google Cloud Platform. This crash course will be jam-packed with sessions on resource governance, identity and authorization, data and network security, asset threat management and more.

Enjoy this hands-on training and guidance by SADA and Google Cloud engineers as they walk you through five weeks of learnings, accompanied with valuable resources.

Starting Tuesday, September 7th through Tuesday, October 5th at 11:00 am PST / 2:00 pm EST.

Learn from the best

Each lesson is led by the best that Google Cloud and SADA have to offer. Get real hands-on training in Security and the Google Cloud Platform.

Valuable resources

Further your learning with additional resources for each week. You’ll gain access to labs, videos, documentation and tutorials.

Win prizes

We’ll be raffling off three vouchers for the Professional Cloud Security Engineer certification following the five weeks.

Course leaders


Each on-demand session will provide hands-on training and guidance by SADA and Google Cloud engineers. By the end of this five-week course, you’ll be able to bring your organization's cloud security practice to the next level.


  • Training: Every Tuesday starting September 7th at 11:00 am PT / 2:00 pm ET
  • Office hours: Every Thursday starting September 9th at 11:am PST / 2:00 pm ET, so make sure to write down all your questions as they come up.


  • Security Architect
  • Security Engineer
  • Director Information Security
  • Information Security Analyst
  • DevSecOps Engineer
  • SecOps Operator
  • Network Security Engineer


Resource governance

Speakers: John Giglio - SADA / Yan Bellerose - Google

Learn how to design an organizational structure and hierarchy that'll enable best practices in governance and access controls.

This session will dive deep into organizational policies and how to implement guardrails for your organization. We'll cover best practices for organization setup, roles and policies, and you'll learn how to utilize them for governance as well as environmental isolation options and meetings compliance needs.

Join us as we discuss the importance and value of organizational structure in governance.

Identity and auth

Speakers: John Giglio - SADA / Yan Bellerose - Google

Gain an understanding of best-practice identity management techniques including short-term access, break glass, or firecall methods, and handling various identity personas and their varying access requirements.

By the end of this session, attendees will have a better understanding of identity management methods.

Shifting left in security

Speakers: Erik Gomez - SADA / Mike Ensor - Google

One thing we all know is that change is constant, and keeping up with the growing threat of cyberattacks is getting more complex. Join us as we discuss what shifiting left in security means and why it's crucial to your organization.

In this session, we'll cover the steps that Google takes with Prevention, Detection and Response w/DFIR (Data incident response process).

We'll provide an overview of the five cloud-native architecture design principles and discuss the differences between AppDev vs. DevOps vs. DevSecOps.

Securing the Software Supply Chain

Speakers: Erik Gomez - SADA / Mike Ensor - Google

“Invisible security” and “security transparency” are just some of the phrases being adopted by the information security (infosec/IS) market.

These concepts have value and can result in great controls. As teams cooperate and collaborate in the delivery of secured business services, a culture of shared responsibility and pervasive security can be achieved.

Join us as we discuss some of the cloud security challenges faced by organizations and what solutions helped to secure the software supply chain.

BeyondCorp Enterprise

Speakers: Seth Moffitt - SADA / Yan Bellerose - Google

BeyondCorp Enterprise is a zero trust solution that enables secure access with integrated threat and data protection.

In this session, we'll discuss the benefits of providing a scalable, reliable foundation with continuous end-to-end protection for an open and extensible ecosystem.

Join us as we dive into the key features of a proven approach to zero trust security.

Scroll to Top