[ ] Linkedin - CCSK Cert Prep - 6 Cloud Security Operations
- 收录时间:2023-06-09 22:09:24
- 文件大小:217MB
- 下载次数:1
- 最近下载:2023-06-09 22:09:24
- 磁力链接:
-
文件列表
- ~Get Your Files Here !/[2] 1. Cloud Adoption/[4] OWASP Top 10.mp4 35MB
- ~Get Your Files Here !/[3] 2. Cloud Security Services/[1] IT security mechanisms.mp4 20MB
- ~Get Your Files Here !/[4] 3. PKI, Network Monitoring, and Hardening/[2] Deploying a private CA and certificates.mp4 19MB
- ~Get Your Files Here !/[2] 1. Cloud Adoption/[1] Evaluating cloud providers.mp4 19MB
- ~Get Your Files Here !/[3] 2. Cloud Security Services/[4] Deploying Azure Firewall.mp4 18MB
- ~Get Your Files Here !/[4] 3. PKI, Network Monitoring, and Hardening/[3] Network flow logs.mp4 17MB
- ~Get Your Files Here !/[3] 2. Cloud Security Services/[2] Security as a service (SECaaS).mp4 14MB
- ~Get Your Files Here !/[2] 1. Cloud Adoption/[2] IT auditing in the cloud.mp4 13MB
- ~Get Your Files Here !/[4] 3. PKI, Network Monitoring, and Hardening/[1] PKI.mp4 13MB
- ~Get Your Files Here !/[3] 2. Cloud Security Services/[3] Denial-of-service attack mitigation.mp4 11MB
- ~Get Your Files Here !/[2] 1. Cloud Adoption/[3] Cloud adoption and migration.mp4 11MB
- ~Get Your Files Here !/[4] 3. PKI, Network Monitoring, and Hardening/[4] Securing the management and data planes.mp4 11MB
- ~Get Your Files Here !/[3] 2. Cloud Security Services/[5] The incident response lifecycle.mp4 8MB
- ~Get Your Files Here !/[1] Introduction/[1] Security operations in the cloud.mp4 5MB
- ~Get Your Files Here !/[1] Introduction/[2] What you should know.mp4 2MB
- ~Get Your Files Here !/[5] Conclusion/[1] Next steps.mp4 1MB
- ~Get Your Files Here !/[1] Introduction/[1] Security operations in the cloud.mp4.jpg 194KB
- ~Get Your Files Here !/[3] 2. Cloud Security Services/[1] IT security mechanisms.srt 18KB
- ~Get Your Files Here !/[4] 3. PKI, Network Monitoring, and Hardening/[2] Deploying a private CA and certificates.srt 14KB
- ~Get Your Files Here !/[3] 2. Cloud Security Services/[4] Deploying Azure Firewall.srt 13KB
- ~Get Your Files Here !/[2] 1. Cloud Adoption/[4] OWASP Top 10.srt 12KB
- ~Get Your Files Here !/[4] 3. PKI, Network Monitoring, and Hardening/[3] Network flow logs.srt 11KB
- ~Get Your Files Here !/[4] 3. PKI, Network Monitoring, and Hardening/[1] PKI.srt 11KB
- ~Get Your Files Here !/[3] 2. Cloud Security Services/[3] Denial-of-service attack mitigation.srt 9KB
- ~Get Your Files Here !/[2] 1. Cloud Adoption/[1] Evaluating cloud providers.srt 8KB
- ~Get Your Files Here !/[3] 2. Cloud Security Services/[5] The incident response lifecycle.srt 8KB
- ~Get Your Files Here !/[3] 2. Cloud Security Services/[2] Security as a service (SECaaS).srt 7KB
- ~Get Your Files Here !/[2] 1. Cloud Adoption/[3] Cloud adoption and migration.srt 7KB
- ~Get Your Files Here !/[4] 3. PKI, Network Monitoring, and Hardening/[4] Securing the management and data planes.srt 7KB
- ~Get Your Files Here !/[2] 1. Cloud Adoption/[2] IT auditing in the cloud.srt 7KB
- ~Get Your Files Here !/[1] Introduction/[1] Security operations in the cloud.srt 2KB
- ~Get Your Files Here !/[1] Introduction/[2] What you should know.srt 1KB
- ~Get Your Files Here !/[5] Conclusion/[1] Next steps.srt 876B
- ~Get Your Files Here !/Bonus Resources.txt 357B
- Get Bonus Downloads Here.url 183B