Accelerate 2020: Google Cloud Hero... PreGame!
Fundamental 8 Steps 7 hours 51 Credits
If you are a Technical Attendee at Accelerate 2020 Las Vegas (Jan 14-16, 2020), enroll now and complete this Quest. You'll be part of a hands-on labs competition, Google Cloud Hero, where you'll take labs to score points and compete with your colleagues to win prizes. The six labs in this Quest are the prerequisites: you need to complete these before attending, and the points you earn for completing these labs will be part of your event score. In order to maximize your final score and have a chance to be on the leaderboard, you must complete these labs!
Prerequisites:These are the prerequisite fundamental labs for the technical attendees at Accelerate 2020. The expectation is that you accomplish this foundational hands-on GCP knowledge across all platform tools and services and have taken self-paced labs on the Qwiklabs platform before.
Architecting Hybrid Infrastructure with Anthos: Install and review the Bookinfo sample application on a GKE cluster using the Istio on GKE Add-On.
This lab demonstrates a use of an assessment tool and how to enable it on a source environment on AWS. During the lab the students will get exposure to features and capabilities they are not familiar with.
In this lab you will build several Data Pipelines that will ingest data from a publicly available dataset into BigQuery.
In this lab you will use GCP services to help graph trades, volume, and time delta from trade execution to see any patterns in the high volatility of the cryptocurrency market.
In this lab you will learn how Kubernetes Engine security features can be used to grant varying levels of privilege to applications based on their particular requirements
Basic G Suite administration. Access controls, personalize your Admin Console, company profile; load users in single or batch mode. Watch G Suite Admin Getting Started - Personalization.
This lab embeds the Palo Alto Networks VM-Series Firewall into GCP to provide a combination of visibility, applications and data control, and protection against both known and unknown threats.