Droga do Professional Collaboration Engineer (GCP)

Zmiana nazwy – Professional Google Workspace Administrator

Effective April 29, the Professional Collaboration Engineer Certification Exam will be renamed „Professional Google Workspace Administrator Certification Exam”.
 
Please note that this is a name change only, and that no content, program, or exam guide changes are affected by this update. Candidates should continue to prepare using the currently published exam guide, whether they are taking the exam before or after April 29.
 

Czym jest certyfikacja Google Cloud?

Certyfikacja Google Cloud zaświadcza, że osoba jest odpowiednio wyszkolona, posiada wystarczające doświadczenie i kompetencje, aby z sukcesami działać w środowisku chmurowym. 

Certyfikacje GCP cieszą się dużą renomą z powodu wysokiego poziomu trudności.

Google umożliwia aktualnie 10 ścieżek certyfikacji w zakresie kompetencji chmurowych w trzech kategoriach:

Dziś zajmiemy się trzecią, najtrudniejszą grupą, która wymaga znacznego doświadczenia z Google Cloud Platform.

Certyfikacja na poziomie profesjonalnym obejmują kluczowe techniczne funkcje pracy i oceniają zaawansowane umiejętności w zakresie projektowania, wdrażania i zarządzania.

Te certyfikaty są zalecane dla osób z doświadczeniem w branży i znajomością produktów i rozwiązań Google Cloud.

Dla kogo?

Zdobycie certyfikacji może być świetną (i wartościową) przygodą dla:

  • administratorów Google Workspace i/lub Microsoft 365
  • osób zajmujących się migracją systemów Digital Workplace
  • administratorów systemów IT
  • inżynierów rozwiązań chmurowych

Szczegóły dotyczące Professional Collaboration Engineer

Egzamin Professional Collaboration Engineer sprawdzi wiedzę z m.in:

  • zarządzania użytkownikami
  • zarządzania usługami
  • zarządzania migracjami
  • zarządzania sprawami bezpieczeństwa
  • rozwiązywania problemów użytkowników Google Workspace

Informacje organizacyjne:

  • Długość: 2 godziny
  • Opłaty: $200
  • Język: Angielski, Japoński
  • Forma:
    1. Zdalnie
    2. Stacjonarnie

Wszystkie informacje dostępne są na stronie: https://cloud.google.com/certification/collaboration-engineer200

Materiały

 

Przydatne linki

 

Kursy wideo

 

Whitepapers

 

Dokumentacje

 

Migracje

Google Workspace migration product matrix – Google Workspace Admin Help

https://support.google.com/a/topic/6245191?hl=en&ref_topic=9212795

 

Newsy, roadmapy

 

Best Practices

 

Przykładowe pytania

https://docs.google.com/forms/d/e/1FAIpQLSfdLA0hTTzsKnw5Mt23yL-jH06xNzV_f-s32nEBc9ZKAIFYLA/viewform

Jak zmieniały się formuły egzaminu?

Do wakacji 2021 aktywna była wcześniejsza formuła. Przez dwa miesiące dostępna była wersja BETA. Po chwilowym powrocie do wcześniejszej wersji zaczęła obowiązywać stara. Wyniki BETA pojawiły się 20 grudnia. 5 stycznia oficjalnie wprowadzona została nowa certyfikacja.

Formuła certyfikacji <2021

Formuła certyfikacji BETA

Formuła certyfikacji 2022

1. Planning and implementing Google Workspace authorization and access

1.1 Implementing authorization policies. Considerations include:

  • Basic user security controls (e.g., password length enforcement and 2-Step verification)

  • Security aspects of identity, perimeter security, and data protection

1.2 Using Google Workspace as a service provider. Considerations include:

  • Configuring third-party SSO for Google Workspace

  • Integrating with third party for provisioning

1.3 Using Google Workspace as an identity provider. Considerations include:

  • Configuring and managing SSO for common third-party applications

  • Configuring and managing provisioning

1.4 Managing access to third-party applications and sites. Activities include:

  • Granting API access to applications that need access

  • Revoking third-party OAuth access

  • Removing connected applications and sites

2. Managing user, resource, and shared drive life cycles

2.1 Managing users. Considerations include:

  • Adding users (e.g., individual, bulk, automated)

  • Removing users (e.g., suspending, deleting, recovering)

  • Transferring user data from one user to another

  • Editing user attributes (e.g., renaming, passwords, aliases)

  • Creating administrative roles (e.g., default roles, custom roles)

  • Managing user licenses (e.g., licensing models, Google Workspace SKUs)

  • Troubleshooting conflicting accounts

  • Implications of current Google Workspace APIs to development efforts

  • Using Google Apps Script to automate tasks

2.2 Synchronizing data in your Google domain with your Microsoft® Active Directory® or LDAP server. Considerations include:

  • Integrating LDAP with Google Workspace

  • Configuring and troubleshooting GSPS and GCDS

  • Implications of current Google Workspace APIs to development efforts

  • Using Apps Script to automate tasks

2.3 Managing organizational structure. Considerations include:

  • Designing efficient organizational unity (OU) structure based on business needs

  • Assigning users to relevant OUs

  • Modifying OU policies

  • Implications of current Google Workspace APIs to development efforts

  • Using Apps Script to automate tasks

  • Managing and verifying domains

  • Using Google Takeout to export data

  • Managing company profile settings

2.4 Managing groups. Considerations include:

  • Configuring Google Groups

  • Adding users to groups

  • Implications of current Google Workspace APIs to development efforts

  • Using Apps Script to automate tasks

2.5 Managing contacts. Considerations include:

  • Creating contacts

  • Sharing contacts

  • Implications of current Google Workspace APIs to development efforts

  • Using Apps Script to automate tasks

3. Managing mail

3.1 Managing mail-related DNS settings. Activities include:

  • Managing domain MX records

  • Managing domain SPF records

  • Managing domain DKIM records

  • Managing domain DMARC records

3.2 Diagnosing and resolving mail routing issues. Considerations include:

  • Analyzing mail flow

  • Analyzing email headers

  • Email log search

  • Disparate email services

  • Using Google Workspace Toolbox

3.3 Configuring and managing security, compliance, and spam rules. Activities include:

  • Configuring attachment compliance

  • Configuring blocked senders

  • Configuring email allow list

  • Configuring objectionable content

  • Configuring phishing settings

  • Configuring spam settings

  • Managing admin quarantine

  • Configuring secure transport compliance

  • Configuring safety settings

3.4 Configuring mail routing rules. Considerations include:

  • Configuring split and dual delivery scenarios

  • Implications of integrating third-party mail services

  • Configuring routing rules

  • Configuring recipient map

  • Configuring non-Gmail mailbox

  • Configuring hosts

3.5 Configuring general mail settings. Activities include:

  • Configuring append footer setting

  • Configuring forwarding

  • Configuring SMTP relay

  • Enabling email delegation for an OU

  • Disabling IMAP and POP

  • Managing Gmail archives

4. Controlling and configuring Google Workspace services:

4.1 Administering Google Workspace Services. Activities include:

  • Managing rollout of new Google functionality to end users

  • Troubleshooting Google Workspace services (e.g., performance issues for services suite, Google Workspace apps for OUs)

  • Configuring services

4.2 Configuring and managing Google Workspace core apps. Considerations include:

  • Contacts/Directory (e.g., ability to make updates to Directory services or contact support or contacts sharing settings)

  • Calendar (e.g., Calendar sharing settings and delegations, Calendar resource management, Calendar invitations sent to Groups, troubleshooting calendar interoperability)

  • Drive/Shared Drive (e.g., storage limitations in Basic plan)

  • Groups (e.g., creating and editing groups, banning group members from posting to the group)

  • Chat/Meet (e.g., disabling Meet voice calls for organization, designing video conferencing integration of Meet with different end points, disabling bot access on new chats)

  • Sites (e.g., usage and implementation)

4.3 Managing services integrations. Activities include:

  • Integrating third-party marketplace apps to specific OUs in Google Workspace

  • Evaluating Marketplace and Connected app landscape

  • Adding SP to Cloud Identity

4.4 Implementing automation. Considerations include:

  • API permissions

  • Able to interact with APIs and lightweight scripting

  • Service Accounts

5. Configuring and managing content access

5.1 Configuring and managing Vault. Activities include:

  • Setting retention rules (e.g., setting retention rules, placing legal holds, searching your domain’s data by user account, OU, date, or keyword, exporting data for additional processing and review, auditing reports)

  • Holding and exporting data

  • Running Vault audit reports

5.2 Configuring and managing Drive and Shared Drive. Activities include:

  • Configuring sharing settings (e.g., updating sharing settings to external domains, controlling file access with Information Rights Management)

  • Managing Drive folder structure (e.g., using Google Drive native file formats, recommending Google Drive and Shared Drive file structures)

5.3 Ensuring compliance with regulatory requirements. Activities include:

  • Scanning email with Data Loss Prevention (DLP)

  • Managing content compliance rules

5.4 Implementing and monitoring data security. Activities include:

  • Configuring security and data region

  • Monitoring security health check

  • Configuring security settings

  • Creating security records

  • Designing security integration and addressing objections.

5.5 Managing third-party applications and access. Activities include:

  • Backing up solutions of Google Workspace data for compliance

  • Allow list OAuth apps

6. Configuring and managing endpoint access

6.1 Configuring mobile devices. Considerations include:

  • Company-owned vs. personal devices

  • Configuring personal device settings (e.g., password, Android, iOS, advanced, device approvals, app management, insights)

6.2 Provisioning, deprovisioning, and enabling Chrome devices

6.3 Managing Google meeting room hardware (e.g., provisioning, deprovisioning, hanging up, calling, rebooting)

6.4 Managing Chrome apps, extensions, and Android apps

6.5 Configuring network settings (e.g., Wi-Fi, Ethernet, VPN, certificates, and general)

7. Monitoring organizational operations

7.1 Setting up and using reports (e.g., creating usage reports, measuring adoption and satisfaction)

7.2 Setting up and using audits (e.g., auditing document sharing, auditing Gmail and drive, auditing users)

7.3 Interpreting report and audit data and taking appropriate action. Examples include:

  • Troubleshooting and escalating support issues to Google Partner support or Google Engineering

  • Troubleshooting error logs

  • Identifying data leakage scenarios and implementing ways to prevent

  • Streaming audit data to BigQuery

7.4 Managing alerts (e.g., suspicious logging activity, apps outages, TLS failure, user deleted)

8. Advancing Google Workspace adoption and collaboration

8.1 Building business solutions and processes. Examples include:

  • Creating simple processes using Apps Script

  • Creating team project sites

8.2 Staying up-to-date with Google Workspace. Examples include:

  • Using Google and partner support channels

  • Accessing and interpreting Google Workspace roadmap

  • Staying aware of new features and functionality in Google Workspace

1 Object management

1.1 Manage user life cycles with provisioning and deprovisioning processes. Considerations include:

1.2 Configure shared drives. Considerations include:

1.3 Manage calendar resources.

1.4 Configure and manage Google Groups for Business. Considerations include:

2 Service configuration

2.1 Implement and manage Workspace configurations based on corporate policies. Considerations include:

2.2 Demonstrate how to set up and configure google mail. Considerations include:

3 Troubleshooting

3.1 Troubleshoot user reports of mail delivery problems.

3.2 Collect log files or reports needed to engage with support.

3.3 Classify and mitigate basic email attacks. Considerations include:

3.4 Troubleshoot workspace access and performance.

4 Data Access and Authentication

4.1 Configure policies for all devices (mobile, desktop, CrOS, Meet, browser). Considerations include:

4.2 Configure and implement data governance policies.

4.3 Describe how to manage third-party applications. Considerations include: 

4.4 Configure user authentication. Considerations include:

5 Support business initiatives

5.1 Use Vault to assist legal teams.

5.2 Interpret reports for the business. Considerations Include:

5.3 Describe how to import and export data

Section 1: Object management

1.1 Manage user lifecycles with provisioning and deprovisioning processes. Considerations include:

  • Adding users (e.g., individual, bulk, automated)

  • Removing users (e.g., suspending, deleting, recovering)

  • Editing user attributes (e.g., renaming, passwords, aliases)

  • Creating administrative roles (e.g., default roles, custom roles)

1.2 Configure shared drives. Considerations include:

  • Transferring user data from one user to another

1.3 Manage calendar resources

1.4 Configure and manage Google Groups for Business. Considerations include:

  • Configuring Google Groups

  • Adding users to groups

  • Implications of current Google Workspace APIs to development efforts

  • Using Apps Script to automate tasks

Section 2: Service configuration

2.1 Implement and manage Google Workspace configurations based on corporate policies. Considerations include:

  • Managing company profile settings

  • Modifying OU policies

  • Managing rollout of new Google functionality to end users

  • Troubleshooting Google Workspace services (e.g., performance issues for services suite, apps for OUs)

2.2 Demonstrate how to set up and configure Gmail. Considerations include:

  • Enabling email delegation for an OU

  • Managing Gmail archives

Section 3: Troubleshooting

3.1 Troubleshoot user reports of mail delivery problems

3.2 Collect log files or reports needed to engage with support

3.3 Classify and mitigate basic email attacks. Considerations Include:

  • Configuring attachment compliance

  • Configuring blocked senders

  • Configuring email allowlist

  • Configuring objectionable content

  • Configuring phishing settings

  • Configuring spam settings

  • Managing admin quarantine

  • Configuring Secure Transport compliance

  • Configuring safety settings

3.4 Troubleshoot workspace access and performance

Section 4: Data access and authentication

4.1 Configure policies for all devices (mobile, desktop, Chrome OS, Meet, Chrome Browser). Considerations include:

  • Company-owned vs. personal devices

  • Configuring personal device settings (e.g., password, Android, iOS, advanced, device approvals, app management, insights

4.2 Configure and implement data governance policies

4.3 Describe how to manage third-party applications. Considerations include: 

  • Configuring third-party SSO for Google Workspace

  • Integrating with third-party for provisioning

  • Integrating third-party marketplace apps to specific OUs in Google Workspace

  • Granting API access to applications that need access

  • Revoking third-party author access

  • Removing connected applications and sites

4.4 Configure user authentication. Considerations include:

  • Basic user security controls (e.g., password length enforcement and 2-Step Verification)

  • Security aspects of identity, perimeter security, and data protection

Section 5: Support business initiatives

5.1 Use Vault to assist legal teams. Considerations Include:

  • Setting retention rules (e.g., Setting retention rules, placing legal holds, searching your domain’s data by user account, OU, date, or keyword, exporting data for additional processing and review, auditing reports)

  • Holding and exporting data

  • Running Vault audit reports

5.2 Interpret reports for the business. Considerations Include:

  • Scanning email with Data Loss Prevention (DLP)

  • Managing content compliance rules

  • Configuring security and data region

  • Monitoring security health check

  • Configuring security settings

  • Creating security records

  • Designing security integration and addressing objections

5.3 Describe how to import and export data

Jaki jest mój cel?

Moim celem jest zdać egzamin. Najważniejsza jest jednak droga. Ilość nowej wiedzy, którą przyswoimy przy okazji przygotowań. 

Aktualizacja – 02.2022

Cel zrealizowany!
 
 
Inne wpisy
19 lipca 2023
Znasz osobę w swoim zespole, która wydaje się być dobra we wszystkim? Mam na myśli dosłowną definicję słowa "dobry". Nie mistrzowski. Dobry.
1 lipca 2023
Ależ ten czas mija! Pod koniec roku 2020 po raz pierwszy napotkałem na AppSheet. Uwierzcie lub nie, ale wtedy poczułem, że to będzie dla mnie coś dużego.
19 czerwca 2023
Co-mentoring lub mentoring odwrócony to świetny sposób na rozwój umiejętności i zdobycie nowej perspektywy na prowadzenie biznesu w dobie nowoczesnych technologii.
17 czerwca 2023
Drugi kurs dla praktyków (szczególnie dla PM-ów, analityków biznesowych, studentów czy deweloperów) składający się z 8 modułów kończący się egzaminem.
17 czerwca 2023
Rynek chmury rozwija się w niezwykłym tempie. Wiele osób (w tym ja) widzi ogromny potencjał w działaniu cloud-native. Również w sferze Hardware!