FileMood

Download LA390

LA390

Name

LA390

 DOWNLOAD Copy Link

Total Size

8.1 GB

Total Files

125

Hash

523BF9CA78559EFA83925965A713EA3E1DA377C9

/

001 - About the Author.mp4

14.5 MB

002 - About the Course.mp4

16.4 MB

003 - Course Prerequisites.mp4

16.1 MB

004 - Roles, Characteristics and Building Block Technologies.mp4

108.7 MB

005 - Cloud Computing Activities and Service Categories.mp4

174.8 MB

006 - Cloud Deployment Models.mp4

94.7 MB

007 - Cloud Shared Considerations.mp4

77.7 MB

008 - Impact of Related Technologies.mp4

89.9 MB

009 - Lab Preparation Video (Important).mp4

18.6 MB

010 - Cryptography and Key Management.mp4

87.0 MB

011 - Data and Media Sanitization.mp4

37.1 MB

012 - Access Control.mp4

68.3 MB

013 - Network Security and Virtualization Security.mp4

94.8 MB

014 - Common Threats.mp4

144.6 MB

015 - Secure Cloud Data Lifecycle.mp4

49.5 MB

016 - Cloud-Based Disaster Recovery (DR) and Business Continuity (BC).mp4

102.3 MB

017 - Cost-Benefit Analysis.mp4

70.0 MB

018 - Functional Security Requirements.mp4

44.0 MB

019 - Security Considerations for Different Cloud Categories.mp4

62.6 MB

020 - Verification Against Criteria.mp4

140.1 MB

021 - System and Subsystem Product Certifications.mp4

57.3 MB

022 - Cloud Data Lifecycle Phases.mp4

70.9 MB

023 - Data Dispersion.mp4

52.5 MB

024 - Storage Types.mp4

54.0 MB

025 - Threats to Storage Types.mp4

78.3 MB

026 - Encryption and Key Management.mp4

145.3 MB

027 - Hashing, Masking, and Obfuscation.mp4

52.7 MB

028 - Tokenization.mp4

49.3 MB

029 - Data Loss Prevention (DLP).mp4

87.6 MB

030 - Data De-identification.mp4

40.5 MB

031 - Structured and Unstructured Data.mp4

56.2 MB

032 - Mapping, Labeling, and Sensitive Data.mp4

42.7 MB

033 - IRM Objectives and Tools.mp4

93.3 MB

034 - Data Retention Policies.mp4

56.4 MB

035 - Data Deletion Procedures and Mechanisms.mp4

39.9 MB

036 - Data Archival Procedures and Mechanisms.mp4

68.0 MB

037 - Legal Hold.mp4

26.4 MB

038 - Definition of Event Sources and Requirements.mp4

88.6 MB

039 - Logging, Storage, and Analysis of Data Events.mp4

73.3 MB

040 - Chain of Custody and Non-Repudiation.mp4

47.0 MB

041 - Physical Environment.mp4

79.2 MB

042 - Network and Communications.mp4

56.9 MB

043 - Compute and Virtualization.mp4

103.1 MB

044 - Storage and Management Plane.mp4

84.6 MB

045 - Logical Design.mp4

108.8 MB

046 - Physical Design.mp4

99.0 MB

047 - Environmental Design.mp4

154.1 MB

048 - Risk Assessment and Analysis.mp4

92.7 MB

049 - Cloud Vulnerabilities, Risks, Threats, and Attacks.mp4

66.5 MB

050 - Countermeasure Strategies.mp4

56.5 MB

051 - Physical and Environmental Protection.mp4

39.6 MB

052 - System and Communication Protection.mp4

73.3 MB

053 - Identification, Authentication, and Authorization in Cloud Infrastructure.mp4

45.7 MB

054 - Audit Mechanisms.mp4

69.1 MB

055 - Risks Related to the Cloud Environment.mp4

80.8 MB

056 - Business Requirements.mp4

76.1 MB

057 - Business Continuity_Disaster Recovery Strategy.mp4

60.0 MB

058 - Creating a BCDR Plan.mp4

155.1 MB

059 - Testing a BCDR Plan.mp4

121.4 MB

060 - Cloud Development Basics.mp4

38.3 MB

061 - Common Pitfalls and Vulnerabilities.mp4

41.7 MB

062 - Business Requirements and Phases_Methodologies.mp4

117.2 MB

063 - Avoid Common Vulnerabilities During Development.mp4

70.6 MB

064 - Cloud-Specific Risks and Quality Assurance.mp4

55.2 MB

065 - Threat Modeling and Configuration Management.mp4

53.8 MB

066 - Functional Testing and Security Testing Methodologies.mp4

85.8 MB

067 - Approved APIs and Third-Party Software.mp4

51.5 MB

068 - Supplemental Security Components.mp4

42.6 MB

069 - Cryptography.mp4

77.0 MB

070 - Sandboxing and Application Virtualization.mp4

35.4 MB

071 - Federated Identity and Identity Providers.mp4

41.1 MB

072 - Single Sign-On (SSO) and Multi-Factor Authentication (MFA).mp4

56.2 MB

073 - Cloud Access Security Broker (CASB).mp4

36.2 MB

074 - Hardware-Specific Security Configuration Requirements.mp4

34.7 MB

075 - Virtualization Management Toolsets.mp4

58.7 MB

076 - Configure Access Control for Local and Remote Access.mp4

72.4 MB

077 - Secure Network Configuration.mp4

105.0 MB

078 - Operating System (OS) Hardening through the Application of Baselines.mp4

43.9 MB

079 - Stand-Alone Hosts.mp4

40.9 MB

080 - Availability of Clustered Hosts and Guest OSs.mp4

95.2 MB

081 - Access Controls for Remote Access.mp4

45.8 MB

082 - Patch Management.mp4

123.1 MB

083 - Performance, Capacity, and Hardware Monitoring.mp4

48.5 MB

084 - Backup and Restore Functions.mp4

50.8 MB

085 - Network Security Controls and Management Plane.mp4

81.8 MB

086 - Change and Continuity Management.mp4

74.0 MB

087 - Information Security and Incident Management.mp4

35.4 MB

088 - Problem and Deployment Management.mp4

38.5 MB

089 - Additional Operational Management.mp4

67.7 MB

090 - Forensic Data Collection Methodologies.mp4

132.9 MB

091 - Evidence Management.mp4

27.7 MB

092 - Managing Communications.mp4

71.0 MB

093 - Security Operations Center (SOC) and Monitoring Security Controls.mp4

38.9 MB

094 - Log Capture and Analysis.mp4

43.8 MB

095 - Incident Management.mp4

61.8 MB

096 - Conflicting International Legislation.mp4

49.1 MB

097 - Legal Risks Specific to Cloud Computing.mp4

20.0 MB

098 - Legal Frameworks and Guidelines.mp4

145.0 MB

099 - eDiscovery.mp4

38.2 MB

100 - Forensics Requirements.mp4

30.0 MB

101 - Contractual vs. Regulated Private Data.mp4

56.7 MB

102 - Country-Specific Legislation Related to Private Data.mp4

91.6 MB

103 - Jurisdictional Differences and Standard Privacy Requirements.mp4

52.8 MB

104 - Audit Controls and Requirements.mp4

57.4 MB

105 - Assurance Challenges of Virtualization and Cloud.mp4

43.9 MB

106 - Types of Audit Reports.mp4

54.1 MB

107 - Restrictions of Audit Scope Statements.mp4

52.8 MB

108 - Gap Analysis and Audit Planning.mp4

57.6 MB

109 - Internal Security Management System (ISMS).mp4

43.9 MB

110 - Policies and Involvement of Relevant Stakeholders.mp4

73.6 MB

111 - Specialized Compliance Requirements for Highly Regulated Industries.mp4

26.5 MB

112 - Impact of Distributed Information Technology (IT) Model.mp4

34.0 MB

113 - Assess Providers' Risk Management Programs.mp4

60.3 MB

114 - Data Owner_Controller vs. Data Custodian_Processor.mp4

28.6 MB

115 - Regulatory Transparency Requirements.mp4

22.1 MB

116 - Risk Treatment and Frameworks.mp4

75.2 MB

117 - Metrics for Risk Management.mp4

45.7 MB

118 - Assessment of Risk Environment.mp4

33.0 MB

119 - Business Requirements.mp4

35.2 MB

120 - Vendor Management.mp4

63.6 MB

121 - Contract Management.mp4

41.9 MB

122 - Supply Chain Management.mp4

38.9 MB

123 - How to Prepare for the Exam.mp4

36.6 MB

124 - Get Recognized.mp4

12.8 MB

125 - What's Next After Certification.mp4

22.5 MB

 

Total files 125


Copyright © 2024 FileMood.com