RAR-files |
bif-la_course_302.rar |
50,000,000 |
718C038A |
bif-la_course_302.r00 |
50,000,000 |
643AEB81 |
bif-la_course_302.r01 |
50,000,000 |
9EDDCE3C |
bif-la_course_302.r02 |
50,000,000 |
E165D735 |
bif-la_course_302.r03 |
50,000,000 |
60399DFC |
bif-la_course_302.r04 |
50,000,000 |
12CBB1EB |
bif-la_course_302.r05 |
50,000,000 |
55E155D6 |
bif-la_course_302.r06 |
50,000,000 |
5BEEFBB8 |
bif-la_course_302.r07 |
50,000,000 |
8CE89E09 |
bif-la_course_302.r08 |
50,000,000 |
4699116B |
bif-la_course_302.r09 |
50,000,000 |
CFFD104B |
bif-la_course_302.r10 |
50,000,000 |
DE60C030 |
bif-la_course_302.r11 |
50,000,000 |
C69BB97A |
bif-la_course_302.r12 |
50,000,000 |
C8C6FDFF |
bif-la_course_302.r13 |
50,000,000 |
C6C0E169 |
bif-la_course_302.r14 |
50,000,000 |
F6D39B5F |
bif-la_course_302.r15 |
50,000,000 |
FFF7D066 |
bif-la_course_302.r16 |
50,000,000 |
80932D8D |
bif-la_course_302.r17 |
50,000,000 |
8DE05287 |
bif-la_course_302.r18 |
50,000,000 |
01AD2750 |
bif-la_course_302.r19 |
50,000,000 |
09580FD4 |
bif-la_course_302.r20 |
50,000,000 |
E6AC2FBE |
bif-la_course_302.r21 |
50,000,000 |
F9563C3A |
bif-la_course_302.r22 |
50,000,000 |
DA5A25B2 |
bif-la_course_302.r23 |
50,000,000 |
D8D4D02E |
bif-la_course_302.r24 |
50,000,000 |
4890BABB |
bif-la_course_302.r25 |
50,000,000 |
9C012775 |
bif-la_course_302.r26 |
50,000,000 |
CE0A0FF4 |
bif-la_course_302.r27 |
50,000,000 |
12C12C9A |
bif-la_course_302.r28 |
50,000,000 |
7B81A5CF |
bif-la_course_302.r29 |
50,000,000 |
D79EA987 |
bif-la_course_302.r30 |
50,000,000 |
BFC33834 |
bif-la_course_302.r31 |
50,000,000 |
D79B5A3D |
bif-la_course_302.r32 |
50,000,000 |
79B4D96F |
bif-la_course_302.r33 |
50,000,000 |
BE700E07 |
bif-la_course_302.r34 |
50,000,000 |
061FC53E |
bif-la_course_302.r35 |
50,000,000 |
29C74E62 |
bif-la_course_302.r36 |
50,000,000 |
15CA8BC9 |
bif-la_course_302.r37 |
1,489,436 |
DF2BD37F |
|
Total size: |
1,901,489,436 |
|
|
Archived
files |
Linux Academy Kubernetes Security\01.Introduction\01.01.Introduction to the Course Author.mp4
[2fa970188460e300]
|
7,495,372 |
D249F1B5 |
Linux Academy Kubernetes Security\01.Introduction\01.02.Introduction to this Course.mp4
[15c402ea9e4141fc]
|
98,826,336 |
6A770FF8 |
Linux Academy Kubernetes Security\02.Setting Up a Kubernetes Playground\02.01.Preparing The Playground Servers.mp4
[69efa3c7d08c06ea]
|
23,452,060 |
557325D4 |
Linux Academy Kubernetes Security\02.Setting Up a Kubernetes Playground\02.02.Setting up the Master Node.mp4
[d5a1ca5e65a92fc3]
|
136,701,568 |
A3CA39B3 |
Linux Academy Kubernetes Security\02.Setting Up a Kubernetes Playground\02.03.Setting up the Worker Nodes.mp4
[fec7cf3ab90b95ac]
|
60,677,564 |
AE834041 |
Linux Academy Kubernetes Security\02.Setting Up a Kubernetes Playground\02.04.Validating the Cluster.mp4
[2bcb2bccdb4b536a]
|
37,671,440 |
FE6C6417 |
Linux Academy Kubernetes Security\03.Kubernetes Security Principles and Concepts\03.01.Kubernetes Architecture.mp4
[20bb9f535b6b90a0]
|
114,519,636 |
A2882EC1 |
Linux Academy Kubernetes Security\03.Kubernetes Security Principles and Concepts\03.02.Kubernetes Attack Surface.mp4
[41eeefde10a20d1c]
|
126,756,932 |
65D83ED3 |
Linux Academy Kubernetes Security\03.Kubernetes Security Principles and Concepts\03.03.The Principle of Least Privilege.mp4
[7cb216ad773bd62b]
|
59,660,672 |
5A7A85F5 |
Linux Academy Kubernetes Security\03.Kubernetes Security Principles and Concepts\03.04.Security Boundaries.mp4
[84900c71fe87f1c0]
|
69,096,392 |
65C250D2 |
Linux Academy Kubernetes Security\04.Securing a Cluster\04.01.Using TLS (Transport Layer Security) to Secure Nodes and Processes.mp4
[1102f17c8687fe9e]
|
66,008,868 |
FBE863FF |
Linux Academy Kubernetes Security\04.Securing a Cluster\04.02.Using Firewalls and VPN (Virtual Private Networks).mp4
[fcd327c89e4991a1]
|
31,135,244 |
9076E5D4 |
Linux Academy Kubernetes Security\04.Securing a Cluster\04.03.Setup kube-bench to Harden a Cluster.mp4
[6eeb8c8d43af4a98]
|
41,301,908 |
1D8771CA |
Linux Academy Kubernetes Security\04.Securing a Cluster\04.04.Kubelet Security.mp4
[4b9e5451a959065c]
|
157,537,796 |
DB3F5EEC |
Linux Academy Kubernetes Security\04.Securing a Cluster\04.05.Securing etcd Key Value Datastore.mp4
[c82c5c7ce7fe0630]
|
42,666,412 |
007FBD2F |
Linux Academy Kubernetes Security\04.Securing a Cluster\04.06.Deploying the Kubernetes Web UI (Dashboard) v2.0 Beta.mp4
[a2336c26c3211bfc]
|
69,644,224 |
FEA006F6 |
Linux Academy Kubernetes Security\05.Authentication, Authorization and Admission\05.01.The 3 A's of Kubernetes Security.mp4
[9d07d269c680b126]
|
28,057,496 |
17E51E3C |
Linux Academy Kubernetes Security\05.Authentication, Authorization and Admission\05.02.Authentication.mp4
[146196a5d399bc3f]
|
80,513,632 |
55737ADE |
Linux Academy Kubernetes Security\05.Authentication, Authorization and Admission\05.03.Authentication Exercise.mp4
[d16c14152dc5d7ba]
|
93,227,508 |
AD9F62EA |
Linux Academy Kubernetes Security\05.Authentication, Authorization and Admission\05.04.Authorization and RBAC.mp4
[c37489a9ee0cfd37]
|
77,105,568 |
CAB13204 |
Linux Academy Kubernetes Security\05.Authentication, Authorization and Admission\05.05.Authorization Exercise.mp4
[db4aad02caedd7]
|
50,630,468 |
3F67F5F2 |
Linux Academy Kubernetes Security\05.Authentication, Authorization and Admission\05.06.Admission Controllers.mp4
[8f6fa821b6a7c832]
|
104,029,424 |
B435463B |
Linux Academy Kubernetes Security\06.Securing Pods\06.01.Security Contexts.mp4
[14d3336b1d98b77]
|
52,003,432 |
7DCEC8DD |
Linux Academy Kubernetes Security\06.Securing Pods\06.02.Pod Security Policies.mp4
[50aa8894bacd650f]
|
43,273,464 |
3AFBED46 |
Linux Academy Kubernetes Security\06.Securing Pods\06.03.Establishing an Immutable Cluster Architecture.mp4
[6bc25a3e0d806163]
|
43,028,876 |
08B16003 |
Linux Academy Kubernetes Security\07.Securing Containers\07.01.Third-Party CICD Tools.mp4
[7d874d6bcb2b2107]
|
54,819,672 |
DE22F4BD |
Linux Academy Kubernetes Security\07.Securing Containers\07.02.Network Policies.mp4
[caa47c64a2235b4d]
|
64,578,188 |
570869AF |
Linux Academy Kubernetes Security\07.Securing Containers\07.03.Managing Secrets.mp4
[d7757ebf0bf36ca8]
|
21,014,076 |
30837562 |
Linux Academy Kubernetes Security\08.Summation\08.01.Conclusion and Next Steps.mp4
[41eeac6158255a49]
|
45,790,408 |
6E52A7EF |
Linux Academy Kubernetes Security\Files\302-kubernetessecuritydashboardsetup_1558387085.pdf |
50,390 |
80D0B195 |
Linux Academy Kubernetes Security\Files\302-kubernetessecurityplaygroundsetup_1558375244.pdf |
59,678 |
90A123C5 |
Linux Academy Kubernetes Security\Files\kubernetes-security_1556115056.pdf |
15,142 |
D5BDEB4E |
Linux Academy Kubernetes Security\Files\KubernetesSecurityAuthenticationExerciseCommandsSummary_1554233971.pdf |
43,052 |
57AB1D34 |
Linux Academy Kubernetes Security\Files\KubernetesSecurityAuthorizationExerciseCommandsSummary_1554233959.pdf |
42,180 |
C350BA9C |
Linux Academy Kubernetes Security\Files\KubernetesSecurityContextExerciseCommandSummary_1554233979.pdf |
41,604 |
44C10624 |
Linux Academy Kubernetes Security\01.Introduction |
0 |
00000000 |
Linux Academy Kubernetes Security\02.Setting Up a Kubernetes Playground |
0 |
00000000 |
Linux Academy Kubernetes Security\03.Kubernetes Security Principles and Concepts |
0 |
00000000 |
Linux Academy Kubernetes Security\04.Securing a Cluster |
0 |
00000000 |
Linux Academy Kubernetes Security\05.Authentication, Authorization and Admission |
0 |
00000000 |
Linux Academy Kubernetes Security\06.Securing Pods |
0 |
00000000 |
Linux Academy Kubernetes Security\07.Securing Containers |
0 |
00000000 |
Linux Academy Kubernetes Security\08.Summation |
0 |
00000000 |
Linux Academy Kubernetes Security\Files |
0 |
00000000 |
Linux Academy Kubernetes Security |
0 |
00000000 |
|
Total size: |
1,901,476,682 |
|
|