Providing info to the public and those not-l33t-enough sceners ;)
  • U: Anonymous
  • D: 2020-12-19 04:10:52
  • C: Unknown

RELEASE >

ReScene version pyReScene Auto 0.7 QUiD File size CRC
Download
15,207
Stored files
1,045 B5746B9C
1,088 4EE2D44C
RAR-files
linkedin.learning.etical.hacking.cloud.computing-quid.rar 15,000,000 0BA08C78
linkedin.learning.etical.hacking.cloud.computing-quid.r00 15,000,000 C2940503
linkedin.learning.etical.hacking.cloud.computing-quid.r01 15,000,000 30CFF40C
linkedin.learning.etical.hacking.cloud.computing-quid.r02 15,000,000 B4AD682F
linkedin.learning.etical.hacking.cloud.computing-quid.r03 15,000,000 C0407D8D
linkedin.learning.etical.hacking.cloud.computing-quid.r04 15,000,000 336954C1
linkedin.learning.etical.hacking.cloud.computing-quid.r05 15,000,000 6F1D80DF
linkedin.learning.etical.hacking.cloud.computing-quid.r06 15,000,000 4C58126D
linkedin.learning.etical.hacking.cloud.computing-quid.r07 15,000,000 1D15165A
linkedin.learning.etical.hacking.cloud.computing-quid.r08 15,000,000 8AA04B08
linkedin.learning.etical.hacking.cloud.computing-quid.r09 15,000,000 31ABC2C9
linkedin.learning.etical.hacking.cloud.computing-quid.r10 15,000,000 ACB575F0
linkedin.learning.etical.hacking.cloud.computing-quid.r11 15,000,000 29FBC9E3
linkedin.learning.etical.hacking.cloud.computing-quid.r12 15,000,000 A5A0DD22
linkedin.learning.etical.hacking.cloud.computing-quid.r13 15,000,000 0F0B3E28
linkedin.learning.etical.hacking.cloud.computing-quid.r14 12,711,001 ADDE486D

Total size: 237,711,001
Archived files
Ethical Hacking_ Cloud Computing\05 Hardening the Cloud\004 Force HTTPS for cloud-hosted web applications.mp4 [9d044d6976c76900] 17,647,964 C93ACA85
Ethical Hacking_ Cloud Computing\05 Hardening the Cloud\008 Pen testing and the cloud.mp4 [9996986fd7c83138] 16,709,633 65A2403F
Ethical Hacking_ Cloud Computing\05 Hardening the Cloud\003 Encryption and the cloud-en.srt 5,547 E7788352
Ethical Hacking_ Cloud Computing\05 Hardening the Cloud\006 Cloud artificial intelligence and machine learning.mp4 [d603b86565414c38] 4,913,499 D03610FF
Ethical Hacking_ Cloud Computing\05 Hardening the Cloud\007 Cloud DDoS protection.mp4 [cf2b065068f135a2] 4,772,528 E1E0CA80
Ethical Hacking_ Cloud Computing\05 Hardening the Cloud\001 Cloud auditing.mp4 [a3ef3a1ab676884a] 13,811,031 2F458121
Ethical Hacking_ Cloud Computing\05 Hardening the Cloud\008 Pen testing and the cloud-en.srt 12,276 EEFB7581
Ethical Hacking_ Cloud Computing\05 Hardening the Cloud\005 Deploying a cloud jump box.mp4 [bb272b95bd30f355] 11,701,254 F9C2410F
Ethical Hacking_ Cloud Computing\05 Hardening the Cloud\007 Cloud DDoS protection-en.srt 3,797 F7F6958C
Ethical Hacking_ Cloud Computing\05 Hardening the Cloud\002 Enable cloud alert notification.mp4 [ec7cfc5f6846d75a] 11,632,472 22664718
Ethical Hacking_ Cloud Computing\05 Hardening the Cloud\006 Cloud artificial intelligence and machine learning-en.srt 5,018 F23F33F4
Ethical Hacking_ Cloud Computing\05 Hardening the Cloud\005 Deploying a cloud jump box-en.srt 8,935 B5FAD17D
Ethical Hacking_ Cloud Computing\05 Hardening the Cloud\009 Cloud security tools-en.srt 7,871 E4142C75
Ethical Hacking_ Cloud Computing\05 Hardening the Cloud\004 Force HTTPS for cloud-hosted web applications-en.srt 12,386 693A42E8
Ethical Hacking_ Cloud Computing\05 Hardening the Cloud\001 Cloud auditing-en.srt 10,955 957C9ED3
Ethical Hacking_ Cloud Computing\05 Hardening the Cloud\009 Cloud security tools.mp4 [165a5dd8c93ee78b] 10,947,754 E972866E
Ethical Hacking_ Cloud Computing\05 Hardening the Cloud\002 Enable cloud alert notification-en.srt 10,541 5F36AE7E
Ethical Hacking_ Cloud Computing\05 Hardening the Cloud\003 Encryption and the cloud.mp4 [d7876e9d5136d583] 6,817,284 C5CBA893
Ethical Hacking_ Cloud Computing\03 Cloud Identity Management\003 Enable MFA for cloud users-en.srt 6,965 C56CED0E
Ethical Hacking_ Cloud Computing\03 Cloud Identity Management\002 Create cloud users and groups.mp4 [b3a6f3d22d663f6a] 9,346,223 6C4D6FF8
Ethical Hacking_ Cloud Computing\03 Cloud Identity Management\001 Cloud identity management-en.srt 7,508 D049DE58
Ethical Hacking_ Cloud Computing\03 Cloud Identity Management\004 Cloud resource permissions_ RBAC and policies.mp4 [86ca19d3539da972] 12,994,219 9CEF97FC
Ethical Hacking_ Cloud Computing\03 Cloud Identity Management\002 Create cloud users and groups-en.srt 7,432 81A2438F
Ethical Hacking_ Cloud Computing\03 Cloud Identity Management\004 Cloud resource permissions_ RBAC and policies-en.srt 10,971 48B5EECA
Ethical Hacking_ Cloud Computing\03 Cloud Identity Management\003 Enable MFA for cloud users.mp4 [fea3f85ecb2e2708] 10,897,242 5EDF83CE
Ethical Hacking_ Cloud Computing\03 Cloud Identity Management\001 Cloud identity management.mp4 [3a84b6e8d60ae13e] 7,052,123 C5258E0E
Ethical Hacking_ Cloud Computing\01 Introduction\001 Get prepped for ethical hacking cloud computing certification.mp4 [5a0091ec06e8e03d] 4,227,586 DF5AB264
Ethical Hacking_ Cloud Computing\01 Introduction\002 What you should know-en.srt 2,775 F4AE1CF3
Ethical Hacking_ Cloud Computing\01 Introduction\001 Get prepped for ethical hacking cloud computing certification-en.srt 2,062 5AB4AED4
Ethical Hacking_ Cloud Computing\01 Introduction\002 What you should know.mp4 [ad56499a9daef5ec] 2,816,177 F8A0EB7B
Ethical Hacking_ Cloud Computing\04 Cloud High Availability\004 Cloud data residency-en.srt 5,954 49AA4CE2
Ethical Hacking_ Cloud Computing\04 Cloud High Availability\007 Configure cloud load balancing.mp4 [af5e8dd893c15174] 8,141,655 D434DA51
Ethical Hacking_ Cloud Computing\04 Cloud High Availability\006 Cloud virtual machine replication-en.srt 4,273 4699ABBE
Ethical Hacking_ Cloud Computing\04 Cloud High Availability\001 Cloud service high availability-en.srt 8,439 A17CE3AB
Ethical Hacking_ Cloud Computing\04 Cloud High Availability\002 Cloud security recommendation tools.mp4 [886b7c23c18eb528] 8,203,435 1DABA320
Ethical Hacking_ Cloud Computing\04 Cloud High Availability\007 Configure cloud load balancing-en.srt 7,836 66FB19FB
Ethical Hacking_ Cloud Computing\04 Cloud High Availability\001 Cloud service high availability.mp4 [95078c7f8a43d725] 7,597,405 E613D11E
Ethical Hacking_ Cloud Computing\04 Cloud High Availability\003 Deploying cloud firewall solutions-en.srt 10,476 71AFE032
Ethical Hacking_ Cloud Computing\04 Cloud High Availability\005 Cloud storage replication.mp4 [614de2a345066dbf] 4,644,182 3B10C317
Ethical Hacking_ Cloud Computing\04 Cloud High Availability\002 Cloud security recommendation tools-en.srt 6,700 7DC544E8
Ethical Hacking_ Cloud Computing\04 Cloud High Availability\006 Cloud virtual machine replication.mp4 [27623099e3a19a72] 5,728,088 91866C99
Ethical Hacking_ Cloud Computing\04 Cloud High Availability\003 Deploying cloud firewall solutions.mp4 [7779f5ed044269e3] 11,985,583 8EFBA4EF
Ethical Hacking_ Cloud Computing\04 Cloud High Availability\005 Cloud storage replication-en.srt 3,790 17E51970
Ethical Hacking_ Cloud Computing\04 Cloud High Availability\004 Cloud data residency.mp4 [393c844b0625587b] 5,849,432 E90B8451
Ethical Hacking_ Cloud Computing\06 Conclusion\001 Next steps.mp4 [f8703c78975fb6f8] 2,435,421 63A14A9C
Ethical Hacking_ Cloud Computing\06 Conclusion\001 Next steps-en.srt 2,306 5D7E72E3
Ethical Hacking_ Cloud Computing\Ethical Hacking_ Cloud Computing-description.txt 0 00000000
Ethical Hacking_ Cloud Computing\02 Cloud Overview\004 Common cloud computing threats-en.srt 12,227 C1401F96
Ethical Hacking_ Cloud Computing\02 Cloud Overview\003 Cloud services and the hacking process.mp4 [a541adfc111fd24f] 8,585,906 8EFA3967
Ethical Hacking_ Cloud Computing\02 Cloud Overview\002 Cloud deployment and service models.mp4 [ec1a0b84d623fcee] 6,128,982 5D3824A2
Ethical Hacking_ Cloud Computing\02 Cloud Overview\001 Cloud computing characteristics and security.mp4 [3eb1799d9dffb16a] 9,765,207 63140EDF
Ethical Hacking_ Cloud Computing\02 Cloud Overview\002 Cloud deployment and service models-en.srt 6,952 23398F60
Ethical Hacking_ Cloud Computing\02 Cloud Overview\004 Common cloud computing threats.mp4 [ed04c23d4ceb114a] 12,144,812 F0F60796
Ethical Hacking_ Cloud Computing\02 Cloud Overview\003 Cloud services and the hacking process-en.srt 8,952 BA8D9F79
Ethical Hacking_ Cloud Computing\02 Cloud Overview\001 Cloud computing characteristics and security-en.srt 10,778 1F292F05
Ethical Hacking_ Cloud Computing\05 Hardening the Cloud 0 00000000
Ethical Hacking_ Cloud Computing\03 Cloud Identity Management 0 00000000
Ethical Hacking_ Cloud Computing\01 Introduction 0 00000000
Ethical Hacking_ Cloud Computing\04 Cloud High Availability 0 00000000
Ethical Hacking_ Cloud Computing\06 Conclusion 0 00000000
Ethical Hacking_ Cloud Computing\02 Cloud Overview 0 00000000
Ethical Hacking_ Cloud Computing 0 00000000

Total size: 237,700,819
RAR Recovery
Not Present
Labels UNKNOWN