Ethical Hacking_ Cloud Computing\05 Hardening the Cloud\004 Force HTTPS for cloud-hosted web applications.mp4
[9d044d6976c76900]
|
17,647,964 |
C93ACA85 |
Ethical Hacking_ Cloud Computing\05 Hardening the Cloud\008 Pen testing and the cloud.mp4
[9996986fd7c83138]
|
16,709,633 |
65A2403F |
Ethical Hacking_ Cloud Computing\05 Hardening the Cloud\003 Encryption and the cloud-en.srt |
5,547 |
E7788352 |
Ethical Hacking_ Cloud Computing\05 Hardening the Cloud\006 Cloud artificial intelligence and machine learning.mp4
[d603b86565414c38]
|
4,913,499 |
D03610FF |
Ethical Hacking_ Cloud Computing\05 Hardening the Cloud\007 Cloud DDoS protection.mp4
[cf2b065068f135a2]
|
4,772,528 |
E1E0CA80 |
Ethical Hacking_ Cloud Computing\05 Hardening the Cloud\001 Cloud auditing.mp4
[a3ef3a1ab676884a]
|
13,811,031 |
2F458121 |
Ethical Hacking_ Cloud Computing\05 Hardening the Cloud\008 Pen testing and the cloud-en.srt |
12,276 |
EEFB7581 |
Ethical Hacking_ Cloud Computing\05 Hardening the Cloud\005 Deploying a cloud jump box.mp4
[bb272b95bd30f355]
|
11,701,254 |
F9C2410F |
Ethical Hacking_ Cloud Computing\05 Hardening the Cloud\007 Cloud DDoS protection-en.srt |
3,797 |
F7F6958C |
Ethical Hacking_ Cloud Computing\05 Hardening the Cloud\002 Enable cloud alert notification.mp4
[ec7cfc5f6846d75a]
|
11,632,472 |
22664718 |
Ethical Hacking_ Cloud Computing\05 Hardening the Cloud\006 Cloud artificial intelligence and machine learning-en.srt |
5,018 |
F23F33F4 |
Ethical Hacking_ Cloud Computing\05 Hardening the Cloud\005 Deploying a cloud jump box-en.srt |
8,935 |
B5FAD17D |
Ethical Hacking_ Cloud Computing\05 Hardening the Cloud\009 Cloud security tools-en.srt |
7,871 |
E4142C75 |
Ethical Hacking_ Cloud Computing\05 Hardening the Cloud\004 Force HTTPS for cloud-hosted web applications-en.srt |
12,386 |
693A42E8 |
Ethical Hacking_ Cloud Computing\05 Hardening the Cloud\001 Cloud auditing-en.srt |
10,955 |
957C9ED3 |
Ethical Hacking_ Cloud Computing\05 Hardening the Cloud\009 Cloud security tools.mp4
[165a5dd8c93ee78b]
|
10,947,754 |
E972866E |
Ethical Hacking_ Cloud Computing\05 Hardening the Cloud\002 Enable cloud alert notification-en.srt |
10,541 |
5F36AE7E |
Ethical Hacking_ Cloud Computing\05 Hardening the Cloud\003 Encryption and the cloud.mp4
[d7876e9d5136d583]
|
6,817,284 |
C5CBA893 |
Ethical Hacking_ Cloud Computing\03 Cloud Identity Management\003 Enable MFA for cloud users-en.srt |
6,965 |
C56CED0E |
Ethical Hacking_ Cloud Computing\03 Cloud Identity Management\002 Create cloud users and groups.mp4
[b3a6f3d22d663f6a]
|
9,346,223 |
6C4D6FF8 |
Ethical Hacking_ Cloud Computing\03 Cloud Identity Management\001 Cloud identity management-en.srt |
7,508 |
D049DE58 |
Ethical Hacking_ Cloud Computing\03 Cloud Identity Management\004 Cloud resource permissions_ RBAC and policies.mp4
[86ca19d3539da972]
|
12,994,219 |
9CEF97FC |
Ethical Hacking_ Cloud Computing\03 Cloud Identity Management\002 Create cloud users and groups-en.srt |
7,432 |
81A2438F |
Ethical Hacking_ Cloud Computing\03 Cloud Identity Management\004 Cloud resource permissions_ RBAC and policies-en.srt |
10,971 |
48B5EECA |
Ethical Hacking_ Cloud Computing\03 Cloud Identity Management\003 Enable MFA for cloud users.mp4
[fea3f85ecb2e2708]
|
10,897,242 |
5EDF83CE |
Ethical Hacking_ Cloud Computing\03 Cloud Identity Management\001 Cloud identity management.mp4
[3a84b6e8d60ae13e]
|
7,052,123 |
C5258E0E |
Ethical Hacking_ Cloud Computing\01 Introduction\001 Get prepped for ethical hacking cloud computing certification.mp4
[5a0091ec06e8e03d]
|
4,227,586 |
DF5AB264 |
Ethical Hacking_ Cloud Computing\01 Introduction\002 What you should know-en.srt |
2,775 |
F4AE1CF3 |
Ethical Hacking_ Cloud Computing\01 Introduction\001 Get prepped for ethical hacking cloud computing certification-en.srt |
2,062 |
5AB4AED4 |
Ethical Hacking_ Cloud Computing\01 Introduction\002 What you should know.mp4
[ad56499a9daef5ec]
|
2,816,177 |
F8A0EB7B |
Ethical Hacking_ Cloud Computing\04 Cloud High Availability\004 Cloud data residency-en.srt |
5,954 |
49AA4CE2 |
Ethical Hacking_ Cloud Computing\04 Cloud High Availability\007 Configure cloud load balancing.mp4
[af5e8dd893c15174]
|
8,141,655 |
D434DA51 |
Ethical Hacking_ Cloud Computing\04 Cloud High Availability\006 Cloud virtual machine replication-en.srt |
4,273 |
4699ABBE |
Ethical Hacking_ Cloud Computing\04 Cloud High Availability\001 Cloud service high availability-en.srt |
8,439 |
A17CE3AB |
Ethical Hacking_ Cloud Computing\04 Cloud High Availability\002 Cloud security recommendation tools.mp4
[886b7c23c18eb528]
|
8,203,435 |
1DABA320 |
Ethical Hacking_ Cloud Computing\04 Cloud High Availability\007 Configure cloud load balancing-en.srt |
7,836 |
66FB19FB |
Ethical Hacking_ Cloud Computing\04 Cloud High Availability\001 Cloud service high availability.mp4
[95078c7f8a43d725]
|
7,597,405 |
E613D11E |
Ethical Hacking_ Cloud Computing\04 Cloud High Availability\003 Deploying cloud firewall solutions-en.srt |
10,476 |
71AFE032 |
Ethical Hacking_ Cloud Computing\04 Cloud High Availability\005 Cloud storage replication.mp4
[614de2a345066dbf]
|
4,644,182 |
3B10C317 |
Ethical Hacking_ Cloud Computing\04 Cloud High Availability\002 Cloud security recommendation tools-en.srt |
6,700 |
7DC544E8 |
Ethical Hacking_ Cloud Computing\04 Cloud High Availability\006 Cloud virtual machine replication.mp4
[27623099e3a19a72]
|
5,728,088 |
91866C99 |
Ethical Hacking_ Cloud Computing\04 Cloud High Availability\003 Deploying cloud firewall solutions.mp4
[7779f5ed044269e3]
|
11,985,583 |
8EFBA4EF |
Ethical Hacking_ Cloud Computing\04 Cloud High Availability\005 Cloud storage replication-en.srt |
3,790 |
17E51970 |
Ethical Hacking_ Cloud Computing\04 Cloud High Availability\004 Cloud data residency.mp4
[393c844b0625587b]
|
5,849,432 |
E90B8451 |
Ethical Hacking_ Cloud Computing\06 Conclusion\001 Next steps.mp4
[f8703c78975fb6f8]
|
2,435,421 |
63A14A9C |
Ethical Hacking_ Cloud Computing\06 Conclusion\001 Next steps-en.srt |
2,306 |
5D7E72E3 |
Ethical Hacking_ Cloud Computing\Ethical Hacking_ Cloud Computing-description.txt |
0 |
00000000 |
Ethical Hacking_ Cloud Computing\02 Cloud Overview\004 Common cloud computing threats-en.srt |
12,227 |
C1401F96 |
Ethical Hacking_ Cloud Computing\02 Cloud Overview\003 Cloud services and the hacking process.mp4
[a541adfc111fd24f]
|
8,585,906 |
8EFA3967 |
Ethical Hacking_ Cloud Computing\02 Cloud Overview\002 Cloud deployment and service models.mp4
[ec1a0b84d623fcee]
|
6,128,982 |
5D3824A2 |
Ethical Hacking_ Cloud Computing\02 Cloud Overview\001 Cloud computing characteristics and security.mp4
[3eb1799d9dffb16a]
|
9,765,207 |
63140EDF |
Ethical Hacking_ Cloud Computing\02 Cloud Overview\002 Cloud deployment and service models-en.srt |
6,952 |
23398F60 |
Ethical Hacking_ Cloud Computing\02 Cloud Overview\004 Common cloud computing threats.mp4
[ed04c23d4ceb114a]
|
12,144,812 |
F0F60796 |
Ethical Hacking_ Cloud Computing\02 Cloud Overview\003 Cloud services and the hacking process-en.srt |
8,952 |
BA8D9F79 |
Ethical Hacking_ Cloud Computing\02 Cloud Overview\001 Cloud computing characteristics and security-en.srt |
10,778 |
1F292F05 |
Ethical Hacking_ Cloud Computing\05 Hardening the Cloud |
0 |
00000000 |
Ethical Hacking_ Cloud Computing\03 Cloud Identity Management |
0 |
00000000 |
Ethical Hacking_ Cloud Computing\01 Introduction |
0 |
00000000 |
Ethical Hacking_ Cloud Computing\04 Cloud High Availability |
0 |
00000000 |
Ethical Hacking_ Cloud Computing\06 Conclusion |
0 |
00000000 |
Ethical Hacking_ Cloud Computing\02 Cloud Overview |
0 |
00000000 |
Ethical Hacking_ Cloud Computing |
0 |
00000000 |
|
Total size: |
237,700,819 |
|