RAR-files |
lynda.cybersecurity.awareness.breaking.down.cloud.security-apollo.rar |
50,000,000 |
6F35D145 |
lynda.cybersecurity.awareness.breaking.down.cloud.security-apollo.r00 |
50,000,000 |
75499FBF |
lynda.cybersecurity.awareness.breaking.down.cloud.security-apollo.r01 |
50,000,000 |
38850C74 |
lynda.cybersecurity.awareness.breaking.down.cloud.security-apollo.r02 |
18,832,260 |
585C3311 |
|
Total size: |
168,832,260 |
|
|
Archived
files |
01. Overview - 42s.mp4 |
1,457,591 |
426DCB35 |
02. Agenda for the course - 111s.mp4 |
3,197,912 |
0B0E73E9 |
03. Components of a cloud computing platform - 123s.mp4 |
4,198,029 |
365F7176 |
04. Security and virtualization - 79s.mp4 |
2,447,816 |
6D9CDE8E |
05. Review 5-4-3 cloud characteristics - 317s.mp4 |
10,919,260 |
C3E05A42 |
06. NIST guidelines on cloud security - 94s.mp4 |
2,824,365 |
8CE8C3AA |
07. Cloud security provider security breaches - 105s.mp4 |
3,471,620 |
A9A0C3ED |
08. Shared responsibility model - 103s.mp4 |
3,070,702 |
C625FD6A |
09. CSP compliance standards - 496s.mp4 |
18,607,974 |
E8C5A029 |
10. US federal cloud security requirements - 239s.mp4 |
7,521,306 |
EB3293B1 |
11. Cloud Security Alliance - 145s.mp4 |
4,773,962 |
89F02C32 |
12. Cloud service vulnerabilities - 267s.mp4 |
8,170,885 |
4B11EC04 |
13. CSP availability requirements - 110s.mp4 |
3,678,468 |
D213B558 |
14. AWS security settings and best practices - 1367s.mp4 |
42,085,773 |
249B2323 |
15. Other CSP security models - 409s.mp4 |
12,404,064 |
281EFDCE |
16. Cloud storage security - 234s.mp4 |
7,342,178 |
88069D0D |
17. Software containers used in cloud systems - 386s.mp4 |
12,015,605 |
D3ECBB9E |
18. Cloud security augmentation options - 410s.mp4 |
12,456,497 |
2B4C73BF |
19. Security solutions leveraging the cloud - 359s.mp4 |
12,526,342 |
103C62E0 |
20. Cloud security certifications - 459s.mp4 |
15,425,380 |
627A64E2 |
21. Conclusions about cloud security - 234s.mp4 |
7,753,030 |
EFA6B080 |
22. Common questions - 436s.mp4 |
12,572,856 |
DA56F5CB |
|
Total size: |
208,921,615 |
|
|