Summary
In this chapter, you have learned how to implement security in your VPCs in Google Cloud Platform. You have learned how to configure identity and access management with Google Cloud IAM. Moreover, you have learned how to configure Cloud Armor to protect your web applications from global threats, such as Denial of Service (DoS) attacks. Finally, you have learned how to deploy and use third-party firewall software devices in your VPC.
Now, let's go to the next chapter to learn about managing and monitoring network operations.
This is the end of the second part of our book. In this second part, you gained the knowledge and the configuration skills related to network services, hybrid connectivity, and network security.
In the next part, we will start exploring the world of monitoring, maintaining, and optimizing VPC networks and their services, and also start using some advanced network features.