zhongziso种子搜
首页
功能
磁力转BT
BT转磁力
使用教程
免责声明
关于
zhongziso
搜索
Lynda - Cybersecurity with Cloud Computing
magnet:?xt=urn:btih:704041b351bce1b7bbe8f520156861512afbc54e&dn=Lynda - Cybersecurity with Cloud Computing
磁力链接详情
Hash值:
704041b351bce1b7bbe8f520156861512afbc54e
点击数:
121
文件大小:
354.32 MB
文件数量:
37
创建日期:
2018-8-21 19:19
最后访问:
2024-10-21 04:24
访问标签:
Lynda
-
Cybersecurity
with
Cloud
Computing
文件列表详情
00. Introduction/00_01 - Welcome.mp4 16.62 MB
00. Introduction/00_02 - What you should know.mp4 841.01 KB
00. Introduction/00_03 - Reference sites.mp4 15.86 MB
00. Introduction/00_04 - Using the exercise files.mp4 272.32 KB
01. Cloud Fundamentals/01_01 - Defining the essential characteristics of cloud.mp4 15.11 MB
01. Cloud Fundamentals/01_02 - Understanding infrastructure as a service.mp4 11.35 MB
01. Cloud Fundamentals/01_03 - Unraveling platform as a service.mp4 6.5 MB
01. Cloud Fundamentals/01_04 - Comprehending software as a service.mp4 8.16 MB
01. Cloud Fundamentals/01_05 - Discovering deployment models.mp4 10.88 MB
01. Cloud Fundamentals/01_06 - Identifying cloud incidents.mp4 14.49 MB
01. Cloud Fundamentals/01_07 - Dissecting the anatomy of a service failure.mp4 8.43 MB
01. Cloud Fundamentals/01_08 - Deciphering the anatomy of a business failure.mp4 7.92 MB
01. Cloud Fundamentals/01_09 - Defining trust models for cloud.mp4 13.32 MB
02. Cloud Security Guidance/02_01 - Identifying governance and risk.mp4 5.21 MB
02. Cloud Security Guidance/02_02 - Complying with legal and audit requrements.mp4 12.5 MB
02. Cloud Security Guidance/02_03 - Managing information and data security.mp4 14.83 MB
02. Cloud Security Guidance/02_04 - Providing portability and interoperability.mp4 7.17 MB
02. Cloud Security Guidance/02_05 - Comparing traditional IT, BCP, and DR.mp4 11.4 MB
02. Cloud Security Guidance/02_06 - Understanding data center operations.mp4 5.13 MB
02. Cloud Security Guidance/02_07 - Managing incident response.mp4 12.33 MB
02. Cloud Security Guidance/02_08 - Maximizing application security.mp4 11.72 MB
02. Cloud Security Guidance/02_09 - Testing and monitoring applications.mp4 8.89 MB
02. Cloud Security Guidance/02_10 - Managing encryption and keys.mp4 10.31 MB
02. Cloud Security Guidance/02_11 - Verifying identity in the cloud.mp4 12.47 MB
02. Cloud Security Guidance/02_12 - Controlling cloud access.mp4 11.89 MB
02. Cloud Security Guidance/02_13 - Implementing virtualization.mp4 12.29 MB
02. Cloud Security Guidance/02_14 - Providing security as a service.mp4 3.7 MB
02. Cloud Security Guidance/02_15 - Challenge Cloud security knowledge.mp4 1.81 MB
02. Cloud Security Guidance/02_16 - Solution Cloud security knowledge.mp4 13.18 MB
03. Architecting Security/03_01 - Introducing SABSA.mp4 14.64 MB
03. Architecting Security/03_02 - Using Fast Tracker.mp4 11.44 MB
03. Architecting Security/03_03 - Defining SABSA attributes.mp4 9.4 MB
03. Architecting Security/03_04 - Diving deeper into Fast Tracker.mp4 8.4 MB
03. Architecting Security/03_05 - Introducing cloud attribute taxonomy.mp4 14.8 MB
03. Architecting Security/03_06 - Challenge Case study risk.mp4 2.29 MB
03. Architecting Security/03_07 - Solution Case study risk.mp4 5.42 MB
03. Architecting Security/04_01 - Next steps.mp4 3.39 MB
其他位置