FileMood

Download CDR024

CDR024

Name

CDR024

 DOWNLOAD Copy Link

Total Size

175.9 MB

Total Files

131

Hash

86808AA2AEE984E27C02E63A0C2341C44D23A753

/.../01_welcome-to-the-course/

01_01_welcome-and-getting-started-guide_instructions.html

2.5 KB

/.../02_how-to-use-qwiklabs/

02_01_getting-started-with-google-cloud-platform-and-qwiklabs.en.srt

5.2 KB

02_01_getting-started-with-google-cloud-platform-and-qwiklabs.en.txt

3.1 KB

02_01_getting-started-with-google-cloud-platform-and-qwiklabs.mp4

5.9 MB

/.../01_module-overview/

01_01_module-6-overview.en.srt

1.4 KB

01_01_module-6-overview.en.txt

0.9 KB

01_01_module-6-overview.mp4

2.4 MB

/.../02_service-accounts-iam-roles-and-api-scopes/

02_01_compute-engine-identity-and-api-access.en.srt

2.8 KB

02_01_compute-engine-identity-and-api-access.en.txt

1.8 KB

02_01_compute-engine-identity-and-api-access.mp4

2.3 MB

02_02_vm-and-api-scopes.en.srt

3.0 KB

02_02_vm-and-api-scopes.en.txt

2.0 KB

02_02_vm-and-api-scopes.mp4

4.9 MB

/.../03_managing-vm-logins/

03_01_connecting-to-virtual-machines.en.srt

7.9 KB

03_01_connecting-to-virtual-machines.en.txt

5.0 KB

03_01_connecting-to-virtual-machines.mp4

9.1 MB

/.../04_organization-policy-controls/

04_01_organization-policy-service.en.srt

2.3 KB

04_01_organization-policy-service.en.txt

1.5 KB

04_01_organization-policy-service.mp4

2.7 MB

04_02_organization-policy-constraints.en.srt

2.4 KB

04_02_organization-policy-constraints.en.txt

1.6 KB

04_02_organization-policy-constraints.mp4

3.2 MB

/.../05_compute-engine-best-practices/

05_01_compute-engine-security.en.srt

5.4 KB

05_01_compute-engine-security.en.txt

3.4 KB

05_01_compute-engine-security.mp4

8.5 MB

/.../06_encrypting-disks-with-csek/

06_01_encryption-overview.en.srt

4.6 KB

06_01_encryption-overview.en.txt

2.8 KB

06_01_encryption-overview.mp4

5.9 MB

06_02_customer-supplied-and-managed-keys.en.srt

2.6 KB

06_02_customer-supplied-and-managed-keys.en.txt

1.7 KB

06_02_customer-supplied-and-managed-keys.mp4

2.4 MB

/.../07_module-review/

07_01_module-6-review.en.srt

3.9 KB

07_01_module-6-review.en.txt

2.5 KB

07_01_module-6-review.mp4

3.7 MB

/.../01_module-overview/

01_01_module-7-overview.en.srt

2.0 KB

01_01_module-7-overview.en.txt

1.3 KB

01_01_module-7-overview.mp4

3.2 MB

/.../02_cloud-storage-iam-permissions-and-acls/

02_01_cloud-storage-permissions-and-roles.en.srt

3.5 KB

02_01_cloud-storage-permissions-and-roles.en.txt

2.2 KB

02_01_cloud-storage-permissions-and-roles.mp4

4.0 MB

/.../03_auditing-cloud-data/

03_01_auditing-storage-buckets.en.srt

2.3 KB

03_01_auditing-storage-buckets.en.txt

1.5 KB

03_01_auditing-storage-buckets.mp4

2.4 MB

/.../04_signed-urls-and-policy-documents/

04_01_signed-urls-and-signed-policy-documents.en.srt

5.0 KB

04_01_signed-urls-and-signed-policy-documents.en.txt

3.2 KB

04_01_signed-urls-and-signed-policy-documents.mp4

7.2 MB

/.../05_encrypting-with-cmek-and-csek/

05_01_encryption-csek-cmek-review.en.srt

2.9 KB

05_01_encryption-csek-cmek-review.en.txt

1.7 KB

05_01_encryption-csek-cmek-review.mp4

2.8 MB

/.../06_bigquery-iam-roles-and-authorized-views/

06_01_bigquery-iam-roles-and-authorized-views.en.srt

2.7 KB

06_01_bigquery-iam-roles-and-authorized-views.en.txt

1.7 KB

06_01_bigquery-iam-roles-and-authorized-views.mp4

3.2 MB

/.../07_storage-best-practices/

07_01_cloud-storage-best-practices.en.srt

2.9 KB

07_01_cloud-storage-best-practices.en.txt

1.8 KB

07_01_cloud-storage-best-practices.mp4

4.9 MB

07_02_big-query-storage-best-practices.en.srt

1.4 KB

07_02_big-query-storage-best-practices.en.txt

0.9 KB

07_02_big-query-storage-best-practices.mp4

2.3 MB

/.../08_module-review/

08_01_module-7-review.en.srt

3.2 KB

08_01_module-7-review.en.txt

2.0 KB

08_01_module-7-review.mp4

3.3 MB

/.../01_module-overview/

01_01_module-8-overview.en.srt

1.0 KB

01_01_module-8-overview.en.txt

0.7 KB

01_01_module-8-overview.mp4

1.5 MB

/.../02_how-ddos-attacks-work/

02_01_ddos-attack-overview.en.srt

1.8 KB

02_01_ddos-attack-overview.en.txt

1.1 KB

02_01_ddos-attack-overview.mp4

2.3 MB

/.../03_gcp-mitigations/

03_01_ddos-mitigation-and-prevention-on-gcp.en.srt

7.5 KB

03_01_ddos-mitigation-and-prevention-on-gcp.en.txt

4.7 KB

03_01_ddos-mitigation-and-prevention-on-gcp.mp4

8.1 MB

03_02_using-cloud-armor.en.srt

2.0 KB

03_02_using-cloud-armor.en.txt

1.3 KB

03_02_using-cloud-armor.mp4

2.8 MB

/.../04_types-of-complementary-partner-products/

04_01_security-partner-products.en.srt

1.7 KB

04_01_security-partner-products.en.txt

1.1 KB

04_01_security-partner-products.mp4

1.8 MB

04_02_infrastructure-data-protection-logging-and-compliance-partners.en.srt

1.6 KB

04_02_infrastructure-data-protection-logging-and-compliance-partners.en.txt

1.0 KB

04_02_infrastructure-data-protection-logging-and-compliance-partners.mp4

1.3 MB

/.../05_module-review/

05_01_module-8-review.en.srt

2.6 KB

05_01_module-8-review.en.txt

1.6 KB

05_01_module-8-review.mp4

2.7 MB

/.../01_module-overview/

01_01_module-9-overview.en.srt

1.2 KB

01_01_module-9-overview.en.txt

0.8 KB

01_01_module-9-overview.mp4

1.9 MB

/.../02_types-of-application-security-vulnerabilities/

02_01_application-vulnerabilities.en.srt

5.3 KB

02_01_application-vulnerabilities.en.txt

3.4 KB

02_01_application-vulnerabilities.mp4

7.9 MB

/.../03_cloud-security-scanner/

03_01_how-cloud-security-scanner-works.en.srt

4.2 KB

03_01_how-cloud-security-scanner-works.en.txt

2.7 KB

03_01_how-cloud-security-scanner-works.mp4

6.4 MB

03_02_avoiding-unwanted-impact.en.srt

2.2 KB

03_02_avoiding-unwanted-impact.en.txt

1.4 KB

03_02_avoiding-unwanted-impact.mp4

3.5 MB

/.../04_threat-identity-and-oauth-phishing/

04_01_types-of-phishing-attacks.en.srt

4.4 KB

04_01_types-of-phishing-attacks.en.txt

2.8 KB

04_01_types-of-phishing-attacks.mp4

6.5 MB

/.../05_cloud-identity-aware-proxy/

05_01_cloud-identity-aware-proxy-cloud-iap.en.srt

2.6 KB

05_01_cloud-identity-aware-proxy-cloud-iap.en.txt

1.6 KB

05_01_cloud-identity-aware-proxy-cloud-iap.mp4

4.1 MB

/.../06_module-review/

06_01_module-9-review.en.srt

4.2 KB

06_01_module-9-review.en.txt

2.7 KB

06_01_module-9-review.mp4

4.2 MB

/.../01_module-overview/

01_01_module-10-overview.en.srt

1.2 KB

01_01_module-10-overview.en.txt

0.8 KB

01_01_module-10-overview.mp4

1.8 MB

/.../02_threat-ransomware/

02_01_what-is-ransomware.en.srt

1.2 KB

02_01_what-is-ransomware.en.txt

0.8 KB

02_01_what-is-ransomware.mp4

2.1 MB

/.../03_ransomware-mitigations/

03_01_mitigating-the-threat-of-ransomware.en.srt

5.1 KB

03_01_mitigating-the-threat-of-ransomware.en.txt

3.2 KB

03_01_mitigating-the-threat-of-ransomware.mp4

7.5 MB

/.../04_threats-data-misuse-privacy-violations-sensitive-content/

04_01_misuse-of-data-and-content.en.srt

2.9 KB

04_01_misuse-of-data-and-content.en.txt

1.8 KB

04_01_misuse-of-data-and-content.mp4

4.1 MB

/.../05_content-related-mitigations/

05_01_threat-mitigation-strategies-for-content.en.srt

4.0 KB

05_01_threat-mitigation-strategies-for-content.en.txt

2.6 KB

05_01_threat-mitigation-strategies-for-content.mp4

5.2 MB

/.../06_module-review/

06_01_module-10-review.en.srt

3.2 KB

06_01_module-10-review.en.txt

1.9 KB

06_01_module-10-review.mp4

3.0 MB

/.../01_module-6-slides/

01_01__Module_6-SecuringComputeEngine.pdf

3.7 MB

01_01__resources.html

1.1 KB

/.../02_module-7-slides/

02_01__Module_7-SecuringCloudData.pdf

3.3 MB

02_01__resources.html

1.1 KB

/.../03_module-8-slides/

03_01__Module_8-ProtectingAgainstDDOS.pdf

2.0 MB

03_01__resources.html

1.1 KB

/.../04_module-9-slides/

04_01__Module_9-ApplicationSecurity.pdf

2.1 MB

04_01__resources.html

1.1 KB

/.../05_module-10-slides/

05_01__Module_10-ContentRelatedVulnerabilities.pdf

1.6 MB

05_01__resources.html

1.1 KB

 

Total files 131


Copyright © 2024 FileMood.com