种子简介
种子名称:
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing
文件类型:
视频
文件数目:
41个文件
文件大小:
483.49 MB
收录时间:
2018-1-13 22:06
已经下载:
3次
资源热度:
207
最近下载:
2024-11-17 19:20
下载BT种子文件
下载Torrent文件(.torrent)
立即下载
磁力链接下载
magnet:?xt=urn:btih:e08ac682e1bc2501bb047a3bb873f7ed8874e428&dn=[FreeCoursesOnline.Us] ethical-hacking-cloud-computing
复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。
喜欢这个种子的人也喜欢
种子包含的文件
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing.torrent
00.Cloud-Computing-Concepts/00.Overview.mp44.69MB
00.Cloud-Computing-Concepts/01.From-On-premise-to-Cloud.mp458.53MB
00.Cloud-Computing-Concepts/02.The-Characteristics-of-a-Cloud-Service.mp49.31MB
00.Cloud-Computing-Concepts/03.Understanding-IaaS-PaaS-and-SaaS.mp413.06MB
00.Cloud-Computing-Concepts/04.Cloud-Deployment-Models.mp45.69MB
00.Cloud-Computing-Concepts/05.The-NIST-Cloud-Computing-Reference-Architecture.mp47.86MB
00.Cloud-Computing-Concepts/06.The-Promise-of-the-Cloud.mp43.62MB
00.Cloud-Computing-Concepts/07.Is-the-Cloud-Secure.mp46.68MB
00.Cloud-Computing-Concepts/08.Summary.mp43.41MB
01.Organizational-Security-Considerations/00.Overview.mp43.69MB
01.Organizational-Security-Considerations/01.Everything-Old-Is-New-Again.mp43.09MB
01.Organizational-Security-Considerations/02.Data-Sovereignty.mp427.57MB
01.Organizational-Security-Considerations/03.Compliance-Assessments.mp419.32MB
01.Organizational-Security-Considerations/04.Client-driven-Penetration-Tests.mp412.6MB
01.Organizational-Security-Considerations/05.Commercial-Considerations.mp42.7MB
01.Organizational-Security-Considerations/06.Shadow-IT.mp47.76MB
01.Organizational-Security-Considerations/07.Summary.mp44.85MB
02.Cloud-Computing-Risks/00.Overview.mp43.32MB
02.Cloud-Computing-Risks/01.Compromise-of-Administration-Facilities.mp426.29MB
02.Cloud-Computing-Risks/02.Service-Hijacking-via-Social-Engineering.mp412.62MB
02.Cloud-Computing-Risks/03.Economic-Denial-of-Sustainability-EDoS.mp415.74MB
02.Cloud-Computing-Risks/04.Hypervisor-Breakouts.mp413.32MB
02.Cloud-Computing-Risks/05.Malicious-Cloud-Uses.mp49.54MB
02.Cloud-Computing-Risks/06.Other-Potential-Risks.mp424.46MB
02.Cloud-Computing-Risks/07.Summary.mp42.83MB
03.Cloud-Computing-Security-Strengths/00.Overview.mp43.92MB
03.Cloud-Computing-Security-Strengths/01.DDoS-Prevention.mp426.4MB
03.Cloud-Computing-Security-Strengths/02.Server-Administration-as-a-Service.mp427.5MB
03.Cloud-Computing-Security-Strengths/03.Account-Management-as-a-Service.mp412.13MB
03.Cloud-Computing-Security-Strengths/04.VNet-on-Demand.mp44.57MB
03.Cloud-Computing-Security-Strengths/05.Key-Vaults.mp48.51MB
03.Cloud-Computing-Security-Strengths/06.Auditability.mp412.48MB
03.Cloud-Computing-Security-Strengths/07.Summary.mp44.94MB
04.Hardening-the-Cloud/00.Overview.mp43.21MB
04.Hardening-the-Cloud/01.Securing-the-Administration-Portal.mp415.55MB
04.Hardening-the-Cloud/02.Hardening-the-Configuration.mp415.32MB
04.Hardening-the-Cloud/03.Data-Replication-and-Redundancy.mp48.23MB
04.Hardening-the-Cloud/04.Securing-the-Transport-Layer.mp46.98MB
04.Hardening-the-Cloud/05.SQL-Injection-Alerts-in-Azure.mp413.31MB
04.Hardening-the-Cloud/06.Security-as-a-Service.mp415.23MB
04.Hardening-the-Cloud/07.Summary.mp42.67MB