Don't ask what we can do for you, but what you can do for us!
  • Anonymous
  • 2020-04-27 17:01:02
  • APPS
Compression is used

RELEASE >

ReScene version pyReScene Auto 0.7 ELOHiM File size CRC
Download
27,206
Stored files
2,780 A5E4A817
594 5B620C2D
RAR-files
e-pmssecfund.rar 15,000,000 7114CAC9
e-pmssecfund.r00 15,000,000 AD3DA7F9
e-pmssecfund.r01 15,000,000 DCE66036
e-pmssecfund.r02 15,000,000 0C265645
e-pmssecfund.r03 15,000,000 B988AFA5
e-pmssecfund.r04 15,000,000 591A29CF
e-pmssecfund.r05 15,000,000 B8C6C6BC
e-pmssecfund.r06 15,000,000 F7B31352
e-pmssecfund.r07 15,000,000 7BF82232
e-pmssecfund.r08 15,000,000 6D5521ED
e-pmssecfund.r09 15,000,000 EC568169
e-pmssecfund.r10 15,000,000 8BAE4529
e-pmssecfund.r11 15,000,000 8FCD6D80
e-pmssecfund.r12 15,000,000 6A24AD33
e-pmssecfund.r13 15,000,000 87D387E6
e-pmssecfund.r14 15,000,000 74B944C6
e-pmssecfund.r15 15,000,000 7FBCB63B
e-pmssecfund.r16 15,000,000 79AE0C82
e-pmssecfund.r17 15,000,000 E099FE83
e-pmssecfund.r18 15,000,000 BDB08F57
e-pmssecfund.r19 15,000,000 1B150533
e-pmssecfund.r20 13,807,188 371C87D0

Total size: 328,807,188
Archived files
01. Course Overview\01. Course Overview.mp4 3,900,128 2AA0EFEB
01. Course Overview\01. Course Overview.srt 2,716 9F5D848C
02. Understanding the Complexities of Microservices Security\01. Course Introduction.mp4 9,530,343 DEBE0373
02. Understanding the Complexities of Microservices Security\01. Course Introduction.srt 7,511 7CB5234D
02. Understanding the Complexities of Microservices Security\02. Microservices Security Challenges.mp4 13,456,812 BEE06AB5
02. Understanding the Complexities of Microservices Security\02. Microservices Security Challenges.srt 11,098 24F35D22
02. Understanding the Complexities of Microservices Security\03. Module Wrap Up.mp4 1,828,592 2F8E1F93
02. Understanding the Complexities of Microservices Security\03. Module Wrap Up.srt 1,814 846952F6
03. Securing the Perimeter around Your Microservices\01. Module Introduction.mp4 879,912 D62B1165
03. Securing the Perimeter around Your Microservices\01. Module Introduction.srt 805 B9C1F7B7
03. Securing the Perimeter around Your Microservices\02. Challenges with Edge Security.mp4 6,627,106 64794339
03. Securing the Perimeter around Your Microservices\02. Challenges with Edge Security.srt 6,242 35480F60
03. Securing the Perimeter around Your Microservices\03. API Gateway. Exposing Your API Securely.mp4 6,576,910 0435D2B2
03. Securing the Perimeter around Your Microservices\03. API Gateway. Exposing Your API Securely.srt 4,682 739446C4
03. Securing the Perimeter around Your Microservices\04. Should You Consider Basic Authentication.mp4 4,530,399 05E42D7B
03. Securing the Perimeter around Your Microservices\04. Should You Consider Basic Authentication.srt 3,894 3F9115EA
03. Securing the Perimeter around Your Microservices\05. Authenticating Clients with Certificates.mp4 5,887,545 742D9674
03. Securing the Perimeter around Your Microservices\05. Authenticating Clients with Certificates.srt 4,101 10708B15
03. Securing the Perimeter around Your Microservices\06. Introducing Tokens.mp4 4,880,397 4EFBE707
03. Securing the Perimeter around Your Microservices\06. Introducing Tokens.srt 4,262 724272E7
03. Securing the Perimeter around Your Microservices\07. Leveraging a Security Token Service.mp4 9,299,156 18D73A3C
03. Securing the Perimeter around Your Microservices\07. Leveraging a Security Token Service.srt 7,111 F79D46B1
03. Securing the Perimeter around Your Microservices\08. By-references vs. By-value Tokens.mp4 13,984,962 2D87CC51
03. Securing the Perimeter around Your Microservices\08. By-references vs. By-value Tokens.srt 8,135 65BB5BBA
03. Securing the Perimeter around Your Microservices\09. Json Web Tokens.mp4 4,981,265 3E58B84B
03. Securing the Perimeter around Your Microservices\09. Json Web Tokens.srt 4,587 B51843CB
03. Securing the Perimeter around Your Microservices\10. Delegated Authorization with OAuth2.mp4 12,964,301 6E814A4C
03. Securing the Perimeter around Your Microservices\10. Delegated Authorization with OAuth2.srt 9,884 D20DA3CA
03. Securing the Perimeter around Your Microservices\11. The Reasons for OpenID Connect.mp4 13,446,980 36E6271D
03. Securing the Perimeter around Your Microservices\11. The Reasons for OpenID Connect.srt 11,922 B459A34F
03. Securing the Perimeter around Your Microservices\12. Options for an API Gateway and Authorization Server.mp4 5,292,296 F5FAC72E
03. Securing the Perimeter around Your Microservices\12. Options for an API Gateway and Authorization Server.srt 5,146 5964F4D2
03. Securing the Perimeter around Your Microservices\13. Module Wrap Up.mp4 4,829,462 B6E8A719
03. Securing the Perimeter around Your Microservices\13. Module Wrap Up.srt 2,972 2451D99C
04. Securing the Communication between Your Microservices\01. Module Introduction.mp4 7,283,509 0222E774
04. Securing the Communication between Your Microservices\01. Module Introduction.srt 6,593 CBD999C7
04. Securing the Communication between Your Microservices\02. Mutual Transport Layer Security.mp4 9,495,476 767F9943
04. Securing the Communication between Your Microservices\02. Mutual Transport Layer Security.srt 8,631 636ABF1B
04. Securing the Communication between Your Microservices\03. A Closer Look at the Trust Bootstrap Problem.mp4 5,130,509 68B6B4E8
04. Securing the Communication between Your Microservices\03. A Closer Look at the Trust Bootstrap Problem.srt 4,285 CA0193DD
04. Securing the Communication between Your Microservices\04. Introducing the Demo.mp4 12,281,367 23A34CE1
04. Securing the Communication between Your Microservices\04. Introducing the Demo.srt 7,552 6C74C586
04. Securing the Communication between Your Microservices\05. Using Tokens.mp4 12,171,292 325B87C0
04. Securing the Communication between Your Microservices\05. Using Tokens.srt 6,573 F5AD7445
04. Securing the Communication between Your Microservices\06. OAuth2 Token Exchange.mp4 5,372,006 0E7C391B
04. Securing the Communication between Your Microservices\06. OAuth2 Token Exchange.srt 4,411 E733D1F7
04. Securing the Communication between Your Microservices\07. Sharing User Context between Your Microservices.mp4 10,650,956 A572CD52
04. Securing the Communication between Your Microservices\07. Sharing User Context between Your Microservices.srt 6,374 A12EBC79
04. Securing the Communication between Your Microservices\08. Non-repudiation with Self-issued and Nested JWTs.mp4 3,504,222 96D07103
04. Securing the Communication between Your Microservices\08. Non-repudiation with Self-issued and Nested JWTs.srt 3,077 97865331
04. Securing the Communication between Your Microservices\09. Service to Service with OAuth2 Client Credentials Flow.mp4 6,961,556 7BBF9346
04. Securing the Communication between Your Microservices\09. Service to Service with OAuth2 Client Credentials Flow.srt 4,053 26CCA581
04. Securing the Communication between Your Microservices\10. Scope Based Authorization with OAuth2.mp4 6,161,211 F1D90FD3
04. Securing the Communication between Your Microservices\10. Scope Based Authorization with OAuth2.srt 5,292 1B7CEB34
04. Securing the Communication between Your Microservices\11. Claims Based Access Control.mp4 2,791,393 462CE3AF
04. Securing the Communication between Your Microservices\11. Claims Based Access Control.srt 2,802 5EAB12DC
04. Securing the Communication between Your Microservices\12. Authorization as a Service.mp4 7,122,805 8BB6D308
04. Securing the Communication between Your Microservices\12. Authorization as a Service.srt 4,764 5E6E3112
04. Securing the Communication between Your Microservices\13. Module Wrap Up.mp4 3,225,454 EAF66FEB
04. Securing the Communication between Your Microservices\13. Module Wrap Up.srt 3,358 9A11B1DC
05. Securing the Communication between Your Microservices and Public Clients\01. Module Introduction.mp4 4,708,844 B8AACB75
05. Securing the Communication between Your Microservices and Public Clients\01. Module Introduction.srt 3,513 10417073
05. Securing the Communication between Your Microservices and Public Clients\02. Challenges with Public Clients.mp4 10,380,364 C5050986
05. Securing the Communication between Your Microservices and Public Clients\02. Challenges with Public Clients.srt 5,020 981236A6
05. Securing the Communication between Your Microservices and Public Clients\03. Authorization Code Flow with PKCE by OAuth2 Clients.mp4 2,794,779 C472A8AE
05. Securing the Communication between Your Microservices and Public Clients\03. Authorization Code Flow with PKCE by OAuth2 Clients.srt 2,443 0993190A
05. Securing the Communication between Your Microservices and Public Clients\04. Handling of the Access Token.mp4 8,244,695 2F2E2C42
05. Securing the Communication between Your Microservices and Public Clients\04. Handling of the Access Token.srt 5,093 275CFFFD
05. Securing the Communication between Your Microservices and Public Clients\05. Understanding Cross-origin Resource Sharing.mp4 6,816,483 BC6BA258
05. Securing the Communication between Your Microservices and Public Clients\05. Understanding Cross-origin Resource Sharing.srt 3,374 1979D03E
05. Securing the Communication between Your Microservices and Public Clients\06. Module Wrap Up.mp4 2,703,758 7177B60A
05. Securing the Communication between Your Microservices and Public Clients\06. Module Wrap Up.srt 2,583 578268AF
06. Defense in Depth- Leveraging Security Patterns in Your Microservices Architecture\01. Module Introduction.mp4 1,187,873 C1F324AA
06. Defense in Depth- Leveraging Security Patterns in Your Microservices Architecture\01. Module Introduction.srt 1,113 6F657FFA
06. Defense in Depth- Leveraging Security Patterns in Your Microservices Architecture\02. Challenges with JWT.mp4 4,495,889 16721EBA
06. Defense in Depth- Leveraging Security Patterns in Your Microservices Architecture\02. Challenges with JWT.srt 3,257 AC99C7C1
06. Defense in Depth- Leveraging Security Patterns in Your Microservices Architecture\03. Short-lived Access Tokens with Refresh Tokens.mp4 8,084,037 E36B6F45
06. Defense in Depth- Leveraging Security Patterns in Your Microservices Architecture\03. Short-lived Access Tokens with Refresh Tokens.srt 6,171 56F2B7A7
06. Defense in Depth- Leveraging Security Patterns in Your Microservices Architecture\04. Handling Long-lived Tokens.mp4 8,973,422 DB7400DA
06. Defense in Depth- Leveraging Security Patterns in Your Microservices Architecture\04. Handling Long-lived Tokens.srt 6,462 A9CB5F76
06. Defense in Depth- Leveraging Security Patterns in Your Microservices Architecture\05. A Closer Look at Authentication as a Microservice.mp4 7,225,374 47BC4F9B
06. Defense in Depth- Leveraging Security Patterns in Your Microservices Architecture\05. A Closer Look at Authentication as a Microservice.srt 5,072 D11F9ADB
06. Defense in Depth- Leveraging Security Patterns in Your Microservices Architecture\06. Securing Reactive Microservices.mp4 6,937,645 0F28806A
06. Defense in Depth- Leveraging Security Patterns in Your Microservices Architecture\06. Securing Reactive Microservices.srt 6,522 5657F5EA
06. Defense in Depth- Leveraging Security Patterns in Your Microservices Architecture\07. Module Wrap Up.mp4 1,889,738 E1A2135B
06. Defense in Depth- Leveraging Security Patterns in Your Microservices Architecture\07. Module Wrap Up.srt 1,565 33680F5C
07. Monitoring and Throttling Your Microservices\01. Module Introduction.mp4 2,807,010 1E7E4A0D
07. Monitoring and Throttling Your Microservices\01. Module Introduction.srt 1,824 5FEB850E
07. Monitoring and Throttling Your Microservices\02. Auditing Sensitive Events.mp4 9,853,139 E284F2C8
07. Monitoring and Throttling Your Microservices\02. Auditing Sensitive Events.srt 9,081 6BCED6B3
07. Monitoring and Throttling Your Microservices\03. Proactively Monitoring Your Microservices.mp4 5,989,588 92A8C62D
07. Monitoring and Throttling Your Microservices\03. Proactively Monitoring Your Microservices.srt 5,475 8B4F2AE4
07. Monitoring and Throttling Your Microservices\04. Throttling Your Microservices.mp4 9,079,276 0C397405
07. Monitoring and Throttling Your Microservices\04. Throttling Your Microservices.srt 8,076 035CB762
07. Monitoring and Throttling Your Microservices\05. Resiliency Questions You Need to Ask Yourself.mp4 2,876,118 8086B367
07. Monitoring and Throttling Your Microservices\05. Resiliency Questions You Need to Ask Yourself.srt 2,429 102CDEBF
07. Monitoring and Throttling Your Microservices\06. Module Wrap Up.mp4 1,111,810 1C044533
07. Monitoring and Throttling Your Microservices\06. Module Wrap Up.srt 1,129 8601089A
08. Decoupling Security from Your Microservices with Service Mesh\01. Module Introduction.mp4 5,099,327 9D50AE30
08. Decoupling Security from Your Microservices with Service Mesh\01. Module Introduction.srt 4,334 FF3EB39E
08. Decoupling Security from Your Microservices with Service Mesh\02. Service Mesh with Istio.mp4 8,545,923 20CC5C81
08. Decoupling Security from Your Microservices with Service Mesh\02. Service Mesh with Istio.srt 8,095 31C9DCC6
08. Decoupling Security from Your Microservices with Service Mesh\03. Module Wrap Up.mp4 8,327,670 BA7D635A
08. Decoupling Security from Your Microservices with Service Mesh\03. Module Wrap Up.srt 4,681 3CC548BF
09. Securely Developing and Deploying Your Microservices\01. Module Introduction.mp4 1,445,414 D0095EE8
09. Securely Developing and Deploying Your Microservices\01. Module Introduction.srt 1,254 260CAFA6
09. Securely Developing and Deploying Your Microservices\02. Don't Re-invent the Wheel.mp4 5,396,205 91546B98
09. Securely Developing and Deploying Your Microservices\02. Don't Re-invent the Wheel.srt 3,796 C61CCA65
09. Securely Developing and Deploying Your Microservices\03. Keep It Simple and Automate.mp4 1,884,410 E28F1862
09. Securely Developing and Deploying Your Microservices\03. Keep It Simple and Automate.srt 1,779 AA7BD1D5
09. Securely Developing and Deploying Your Microservices\04. If You Do Only One Thing Then Do Patching.mp4 2,803,111 89A63652
09. Securely Developing and Deploying Your Microservices\04. If You Do Only One Thing Then Do Patching.srt 2,663 CDEC9EF2
09. Securely Developing and Deploying Your Microservices\05. Obscure Everything but Don't Rely on Obscurity.mp4 3,191,305 10A4678B
09. Securely Developing and Deploying Your Microservices\05. Obscure Everything but Don't Rely on Obscurity.srt 3,440 614A10D0
09. Securely Developing and Deploying Your Microservices\06. Effective Secret Management.mp4 5,055,170 9535EF58
09. Securely Developing and Deploying Your Microservices\06. Effective Secret Management.srt 4,064 97272847
09. Securely Developing and Deploying Your Microservices\07. Secure Your Containers.mp4 6,921,614 73AE6A41
09. Securely Developing and Deploying Your Microservices\07. Secure Your Containers.srt 6,518 F8DAE071
09. Securely Developing and Deploying Your Microservices\08. Module Wrap Up.mp4 2,406,197 800E561C
09. Securely Developing and Deploying Your Microservices\08. Module Wrap Up.srt 2,768 D1C247A5
10. Fostering a Security Culture within Your Microservices Teams\01. Module Introduction.mp4 3,936,119 F8ECC674
10. Fostering a Security Culture within Your Microservices Teams\01. Module Introduction.srt 2,591 7BD28DC9
10. Fostering a Security Culture within Your Microservices Teams\02. Visualize Your Architecture.mp4 4,022,220 78E8DA30
10. Fostering a Security Culture within Your Microservices Teams\02. Visualize Your Architecture.srt 3,937 6A39538C
10. Fostering a Security Culture within Your Microservices Teams\03. Threat Modeling.mp4 5,553,819 8DE51A8A
10. Fostering a Security Culture within Your Microservices Teams\03. Threat Modeling.srt 5,953 5F60C044
10. Fostering a Security Culture within Your Microservices Teams\04. Performing a Risk Assessment.mp4 7,258,323 CCAC1778
10. Fostering a Security Culture within Your Microservices Teams\04. Performing a Risk Assessment.srt 7,620 8903D53D
10. Fostering a Security Culture within Your Microservices Teams\05. Conducting Training and Code Reviews.mp4 2,019,567 2C60CB23
10. Fostering a Security Culture within Your Microservices Teams\05. Conducting Training and Code Reviews.srt 1,752 EFCF18E1
10. Fostering a Security Culture within Your Microservices Teams\06. Module Wrap Up.mp4 3,770,655 6D41211C
10. Fostering a Security Culture within Your Microservices Teams\06. Module Wrap Up.srt 3,984 4CE1F917
Exercise Files\02\understanding-the-complexities-of-microservices-security-slides.pdf 3,926,156 53446108
Exercise Files\03\securing-the-perimeter-around-your-microservices-slides.pdf 2,536,615 AF59B4E9
Exercise Files\04\securing-the-communication-between-your-microservices-slides.pdf 3,282,711 7B7A7628
Exercise Files\05\securing-the-communication-between-your-microservices-and-public-clients-slides.pdf 1,032,837 57893550
Exercise Files\06\defense-in-depth-leveraging-security-patterns-in-your-microservices-architecture-slides.pdf 1,505,363 1648FD4A
Exercise Files\07\monitoring-and-throttling-your-microservices-slides.pdf 3,014,634 4D89A96B
Exercise Files\08\decoupling-security-from-your-microservices-with-service-mesh-slides.pdf 938,233 2840FEEB
Exercise Files\09\securely-developing-and-deploying-your-microservices-slides.pdf 2,377,346 6A48A0AE
Exercise Files\10\fostering-a-security-culture-within-your-microservices-teams-slides.pdf 2,303,480 9EFBA255
Exercise Files\02 0 00000000
Exercise Files\03 0 00000000
Exercise Files\04 0 00000000
Exercise Files\05 0 00000000
Exercise Files\06 0 00000000
Exercise Files\07 0 00000000
Exercise Files\08 0 00000000
Exercise Files\09 0 00000000
Exercise Files\10 0 00000000
01. Course Overview 0 00000000
02. Understanding the Complexities of Microservices Security 0 00000000
03. Securing the Perimeter around Your Microservices 0 00000000
04. Securing the Communication between Your Microservices 0 00000000
05. Securing the Communication between Your Microservices and Public Clients 0 00000000
06. Defense in Depth- Leveraging Security Patterns in Your Microservices Architecture 0 00000000
07. Monitoring and Throttling Your Microservices 0 00000000
08. Decoupling Security from Your Microservices with Service Mesh 0 00000000
09. Securely Developing and Deploying Your Microservices 0 00000000
10. Fostering a Security Culture within Your Microservices Teams 0 00000000
Exercise Files 0 00000000

Total size: 420,076,666
RAR Recovery
Not Present
Labels APPS