Google Workspace Administrator (GCX)
Virtualization, Google
This course delivers a structured overview of administering and securing Google Workspace, focusing on configuring security policies, using the Admin Console and applying Audit logs with the Investigation Tool for forensic analysis of Gmail, Drive and login activity.
It covers practical prevention and response: enforcing MFA/2SV, DLP rules for Gmail and Drive, configuring SPF/DKIM/DMARC and Context-Aware Access, integrating with SIEMs and automating tasks via Admin SDK, APIs and GAM for incident reporting and audits.
Location, current course term
Contact us
The course:
Hide detail
-
Introduction to Google Workspace and SaaS security
-
Shared Responsibility Model — responsibilities of Google vs. the customer
-
Roles and org structure (Org Units, Groups, Access Groups)
-
Licenses and editions (Business / Enterprise) and security implications
-
Typical threats (phishing, public links, auto-forwarding, OAuth)
-
Admin Console and Audit logs
-
Key Admin Console areas (Alert Center, Security Rules)
-
Working with Email Log Search, Drive Audit, Login Activity
-
Investigation Tool (Enterprise) — building queries and exporting results
-
Exporting logs (CSV, Reports API, BigQuery) and offline analysis
-
Forensic analysis — practical case study
-
Data exfiltration and email forwarding incidents
-
Downloading and analysing logs (Drive, Email, Login)
-
Creating an attack timeline — attacker steps and stolen files
-
Remediation steps (password resets, MFA, removing forwards)
-
Structuring reports and communicating with management
-
Security policies and data loss prevention
-
MFA / 2SV and SSO integration (Azure AD, Okta)
-
DLP rules for Gmail and Drive
-
Sharing settings (internal, public, domain allow/block lists)
-
SPF / DKIM / DMARC and anti‑phishing policies
-
Context-Aware Access — restrict by IP, device, geolocation
-
Alerting (webhooks, email, Chat notifications)
-
Automation and integration
-
Admin SDK, Reports API, Directory API
-
GAMADV‑XTD3 — exporting logs, auditing sharing, changing forwards
-
Apps Script / Cloud Functions for scheduled audits
-
SIEM integration (Chronicle, Splunk, ELK)
-
Connecting to ticketing systems (Jira, ServiceNow)
-
Best practices and security checklist
-
Incident Response Playbook (detect → contain → recover)
-
Communication plan and documentation (reports, logs, chain of custody)
-
Tabletop exercises, sharing audits, phishing tests
-
Quick admin checklist (daily / weekly / monthly controls)
-
Bonus (if time allows)
-
Compliance (GDPR, ISO 27001, SOC 2)
-
Auditing OAuth apps and restricting app access
-
Chronicle SIEM mini-lab — ingesting logs and creating detections
-
Assumed knowledge:
-
Basic Google Workspace user knowledge; admin experience with SaaS is a plus.
-
Schedule:
-
2 days (9:00 AM - 5:00 PM )
-
Language:
-