RAR-files |
linkedin.learning.learning.cloud.computing.cloud.security-xqzt.rar |
50,000,000 |
C558419B |
linkedin.learning.learning.cloud.computing.cloud.security-xqzt.r00 |
50,000,000 |
A5004EED |
linkedin.learning.learning.cloud.computing.cloud.security-xqzt.r01 |
44,696,420 |
85EFDAEC |
|
Total size: |
144,696,420 |
|
|
Archived
files |
01.01-understanding_cloud_security.mkv
[556709358574dede]
|
2,639,394 |
783B4A69 |
01.02-what_you_should_know.mkv
[f183ea862dd08100]
|
1,093,610 |
B726D6B4 |
02.01-business_case_for_cloud_security.mkv
[f64c0e25e0414ee6]
|
6,189,814 |
DC9C00DA |
02.02-breach_scenarios_and_attack_vectors.mkv
[6968cc61125e32f]
|
6,062,016 |
1F6FBB9E |
02.03-infrastructure-level_cloud_security.mkv
[77d478658f00eefa]
|
3,216,760 |
7A37F85E |
02.04-application-level_cloud_security.mkv
[dec4616ce7ca07ab]
|
16,199,214 |
73905DEE |
02.05-data-level_cloud_security.mkv
[4398d141d9711ed0]
|
9,769,994 |
00B2D101 |
02.06-rise_of_identity_and_access_management.mkv
[9b768d8f10378b78]
|
5,575,777 |
0EEC3955 |
02.07-compliance_and_security.mkv
[d5030ebbf3906b0a]
|
6,098,190 |
E781C6FF |
03.01-aws_cloud_security_services.mkv
[fab3c7780bac48e6]
|
4,635,570 |
A3D32715 |
03.02-microsoft_cloud_security_services.mkv
[8e7618d9d0e4731]
|
2,795,076 |
0F9CABE3 |
03.03-third-party_services.mkv
[bb03e19d0148691c]
|
9,126,127 |
2DFF732A |
03.04-cloud_encryption_services.mkv
[a717ef777f135e0f]
|
7,886,106 |
50D1F113 |
03.05-encryption_at_rest.mkv
[343f9df3bb516e92]
|
6,093,307 |
E3F80B06 |
03.06-encryption_in_flight.mkv
[82995dd678e9ed0e]
|
5,620,691 |
57C5088D |
03.07-security_as_code.mkv
[250592f2a54a32e9]
|
4,445,599 |
5D403EF8 |
03.08-security_management_services.mkv
[64a35b8019ae8abd]
|
6,380,589 |
8D252365 |
04.01-cloud_security_in_healthcare.mkv
[af280df9236e998c]
|
7,016,513 |
792753E8 |
04.02-cloud_security_in_finance.mkv
[a55f04b46eaa32ed]
|
3,787,890 |
EE24FFFB |
04.03-cloud_security_in_retail.mkv
[6811293084de8b9d]
|
4,381,220 |
2EA94B68 |
04.04-cloud_security_in_manufacturing.mkv
[133b40394f46a723]
|
4,661,607 |
FEA67046 |
05.01-understanding_your_security_requirements.mkv
[a66de5188cd1eeb0]
|
4,431,571 |
F335A341 |
05.02-selecting_cloud_security_services.mkv
[ecbb8b045ebcd2cb]
|
6,580,047 |
8D3A80B1 |
05.03-architecture_guidelines_and_hierarchy.mkv
[b7d3fd15279278c5]
|
3,214,014 |
EED87616 |
05.04-reference_security_architecture.mkv
[c6dc27f16c836559]
|
3,693,587 |
42A401CA |
06.01-more_about_cloud_security.mkv
[7fe2a471f57cb402]
|
3,099,906 |
2BCAC982 |
|
Total size: |
144,694,189 |
|
|