种子简介
种子名称:
Lynda - Cybersecurity with Cloud Computing
文件类型:
视频
文件数目:
37个文件
文件大小:
354.32 MB
收录时间:
2018-8-21 19:19
已经下载:
3次
资源热度:
122
最近下载:
2024-10-31 00:58
下载BT种子文件
下载Torrent文件(.torrent)
立即下载
磁力链接下载
magnet:?xt=urn:btih:704041b351bce1b7bbe8f520156861512afbc54e&dn=Lynda - Cybersecurity with Cloud Computing
复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。
喜欢这个种子的人也喜欢
种子包含的文件
Lynda - Cybersecurity with Cloud Computing.torrent
00. Introduction/00_01 - Welcome.mp416.62MB
00. Introduction/00_02 - What you should know.mp4841.01KB
00. Introduction/00_03 - Reference sites.mp415.86MB
00. Introduction/00_04 - Using the exercise files.mp4272.32KB
01. Cloud Fundamentals/01_01 - Defining the essential characteristics of cloud.mp415.11MB
01. Cloud Fundamentals/01_02 - Understanding infrastructure as a service.mp411.35MB
01. Cloud Fundamentals/01_03 - Unraveling platform as a service.mp46.5MB
01. Cloud Fundamentals/01_04 - Comprehending software as a service.mp48.16MB
01. Cloud Fundamentals/01_05 - Discovering deployment models.mp410.88MB
01. Cloud Fundamentals/01_06 - Identifying cloud incidents.mp414.49MB
01. Cloud Fundamentals/01_07 - Dissecting the anatomy of a service failure.mp48.43MB
01. Cloud Fundamentals/01_08 - Deciphering the anatomy of a business failure.mp47.92MB
01. Cloud Fundamentals/01_09 - Defining trust models for cloud.mp413.32MB
02. Cloud Security Guidance/02_01 - Identifying governance and risk.mp45.21MB
02. Cloud Security Guidance/02_02 - Complying with legal and audit requrements.mp412.5MB
02. Cloud Security Guidance/02_03 - Managing information and data security.mp414.83MB
02. Cloud Security Guidance/02_04 - Providing portability and interoperability.mp47.17MB
02. Cloud Security Guidance/02_05 - Comparing traditional IT, BCP, and DR.mp411.4MB
02. Cloud Security Guidance/02_06 - Understanding data center operations.mp45.13MB
02. Cloud Security Guidance/02_07 - Managing incident response.mp412.33MB
02. Cloud Security Guidance/02_08 - Maximizing application security.mp411.72MB
02. Cloud Security Guidance/02_09 - Testing and monitoring applications.mp48.89MB
02. Cloud Security Guidance/02_10 - Managing encryption and keys.mp410.31MB
02. Cloud Security Guidance/02_11 - Verifying identity in the cloud.mp412.47MB
02. Cloud Security Guidance/02_12 - Controlling cloud access.mp411.89MB
02. Cloud Security Guidance/02_13 - Implementing virtualization.mp412.29MB
02. Cloud Security Guidance/02_14 - Providing security as a service.mp43.7MB
02. Cloud Security Guidance/02_15 - Challenge Cloud security knowledge.mp41.81MB
02. Cloud Security Guidance/02_16 - Solution Cloud security knowledge.mp413.18MB
03. Architecting Security/03_01 - Introducing SABSA.mp414.64MB
03. Architecting Security/03_02 - Using Fast Tracker.mp411.44MB
03. Architecting Security/03_03 - Defining SABSA attributes.mp49.4MB
03. Architecting Security/03_04 - Diving deeper into Fast Tracker.mp48.4MB
03. Architecting Security/03_05 - Introducing cloud attribute taxonomy.mp414.8MB
03. Architecting Security/03_06 - Challenge Case study risk.mp42.29MB
03. Architecting Security/03_07 - Solution Case study risk.mp45.42MB
03. Architecting Security/04_01 - Next steps.mp43.39MB