Udemy - Ultimate CCSP Certified Cloud Security Professional Training

0dayddl

U P L O A D E R
537368816_que-es-udemy-analisis-opiniones.jpg

7.62 GB | 19min 10s | mp4 | 1280X720 | 16:9
Genre:eLearning |Language:English


Files Included :
1 -CCSP Course Introduction.mp4 (34.49 MB)
2 -How to get the most out of this course.mp4 (34.11 MB)
3 -About Trainer.mp4 (11.56 MB)
1 -Design a secure data centre and Datacenter Tiers Obj 3 2.mp4 (38.5 MB)
2 -Physical and environmental protection Obj 3 4.mp4 (139.54 MB)
3 -Physical Access Control.mp4 (127.83 MB)
1 -Application Development Key Concepts Obj 4 1.mp4 (32.32 MB)
2 -Software Development Methodologies Obj 4 2.mp4 (91.49 MB)
3 -OWASP Top 10 Obj 4 3.mp4 (45.07 MB)
4 -CWE - Common Weak Enumeration Obj 4 3.mp4 (18.62 MB)
5 -Threat modeling - STIRDE, DREAD, PASTA Obj 4 3.mp4 (36.16 MB)
6 -Secure Coding 101 Obj 4 3.mp4 (96.02 MB)
7 -Version Control System Obj 4 3.mp4 (54.45 MB)
1 -Software Testing Obj 4 4.mp4 (59.66 MB)
2 -Test Case and Abuse Case Obj 4 4.mp4 (25.32 MB)
3 -Software Security Testing Obj 4 4.mp4 (57.39 MB)
4 -Release management Obj 5 3.mp4 (79.65 MB)
5 -QA & QC Obj 4 4.mp4 (45.15 MB)
6 -Penetration Testing Obj 4 4.mp4 (65.56 MB)
7 -DevOps.mp4 (47.2 MB)
8 -DevOps security Obj 1 4.mp4 (53.42 MB)
9 -Third-party software management Obj 4 5.mp4 (61.58 MB)
1 -Identity and access control Obj 1 3.mp4 (44.55 MB)
2 -Privileged Access Management Obj 1 3.mp4 (24.84 MB)
3 -Authorization Models and RBAC.mp4 (102.52 MB)
4 -Single sign-on (SSO) & RSO & MTLS Obj 4 7.mp4 (12.8 MB)
5 -Key Access Control Concepts.mp4 (25.5 MB)
6 -Federated identity and IdP, OpenID, SAML, Auth Protocols Obj 4 7.mp4 (22.85 MB)
7 -MFA and Biometric Authentication Obj 4 7.mp4 (41.57 MB)
8 -SASE & CASB Obj 4 7.mp4 (58.57 MB)
1 -What is Load Balancer.mp4 (14.16 MB)
2 -Domain Name System DNS & Security Extensions (DNSSEC) and Securing DNS.mp4 (56.55 MB)
3 -Network Availability - Single Home, Multi Home, and Understand CDN.mp4 (42.25 MB)
4 -Databases.mp4 (76.66 MB)
5 -Database Security Obj 4 6.mp4 (72.13 MB)
1 -Securing Servers, Applications and Backup Policies.mp4 (48.46 MB)
2 -Firewalls, DMZ & HoneyPots and HoneyNets.mp4 (74.36 MB)
3 -IPS & IDS.mp4 (39.24 MB)
4 -Virtual private network (VPN).mp4 (59 MB)
5 -VLANs and Segmentation.mp4 (59.75 MB)
6 -Web application firewall (WAF) Obj 4 6.mp4 (26.59 MB)
7 -Proxy and Web Filtering.mp4 (60.11 MB)
8 -Sandboxing Obj 4 6.mp4 (24.05 MB)
9 -Network Security Practices and Policies.mp4 (51.04 MB)
1 -Change Management.mp4 (68.64 MB)
2 -Configuration management Obj 5 3.mp4 (54.73 MB)
3 -Patch Management and Vulnerability Management Obj 1 3.mp4 (65.99 MB)
4 -Performance Monitoring and KPI.mp4 (87.64 MB)
5 -Key Performance Indicators.mp4 (26.15 MB)
1 -Incident management.mp4 (45.11 MB)
2 -Incident Response Plan.mp4 (68.25 MB)
3 -Log Management Obj 2 8.mp4 (50.13 MB)
4 -Forensic data collection methodologies Obj 5 4.mp4 (48.24 MB)
5 -Security operations center (SOC).mp4 (43.14 MB)
6 -SIEM.mp4 (58.2 MB)
1 -Laws, Regulations, Act.mp4 (26.84 MB)
2 -US Federal Laws 1.mp4 (68.47 MB)
3 -US Federal Laws 2.mp4 (61.99 MB)
4 -Understand the PII & PHI.mp4 (10.93 MB)
5 -Privacy Regulations.mp4 (64.7 MB)
6 -The EU-U S Data Privacy Framework (DPF), and Privacy Shield.mp4 (63.57 MB)
7 -The Privacy Policy.mp4 (34.67 MB)
8 -Privacy Controls, Privacy Impact Assessments and E-Discovery, and Data Flow.mp4 (62.52 MB)
1 -Policies.mp4 (17.14 MB)
2 -Standards.mp4 (18.47 MB)
3 -Procedures and Guidelines.mp4 (20.21 MB)
4 -Cloud Related Policies and Understand Data Residency and Sovereignty.mp4 (35.43 MB)
1 -Introduction to Cloud computing Obj 1 1.mp4 (75.38 MB)
10 -Understand CapEX & OpEX.mp4 (48.73 MB)
2 -Cloud Computing Shared Responsibility Matrix and Shared Considerations Obj1 1-2.mp4 (58.12 MB)
3 -Cloud deployment models - Private, Public, Hybrid Obj 1 2.mp4 (47.7 MB)
4 -Benefits of Cloud Computing and Economy of Scale Obj 1 2.mp4 (44.79 MB)
5 -Fault Domain, Availability Domain and Region in Cloud Computing.mp4 (64.81 MB)
6 -Cloud Native Architecture.mp4 (51.86 MB)
7 -Understand the Multi-tenancy Resource Sharing.mp4 (37.43 MB)
8 -Infrastructure as Code & Infrastructure as Code (IaC) strategy Obj 1 3.mp4 (31.23 MB)
9 -API and API Gateway Obj 4 5.mp4 (50.97 MB)
1 -Risk Management Overview Obj 3 3.mp4 (49.04 MB)
2 -Risk Identification Obj 3 3.mp4 (33.49 MB)
3 -Risk Analysis Obj 3 3.mp4 (54.09 MB)
4 -Risk Evaluation and Treatment Obj 3 3.mp4 (75.07 MB)
5 -Risk Monitoring and Reporting.mp4 (52.39 MB)
6 -COSO ERM.mp4 (45 MB)
7 -ISO 31000 & 27005.mp4 (41.4 MB)
8 -NIST RMF.mp4 (32.66 MB)
1 -Information System Auditing Overview.mp4 (39.68 MB)
2 -Internal and external audit controls.mp4 (10.53 MB)
3 -Audit planning.mp4 (78.22 MB)
4 -Legal Impact on Audit Engagement.mp4 (28.18 MB)
5 -SSAE & ISAE.mp4 (37.17 MB)
6 -SOC Audit Report.mp4 (107.86 MB)
1 -Vendor management.mp4 (116.29 MB)
2 -SoW, RFI, RFB, RFP, Bidding Process.mp4 (43.14 MB)
3 -SLA, OLA and Overview of IT Infrastructure Library Services.mp4 (23.3 MB)
4 -Supply-chain management.mp4 (47.79 MB)
1 -Industrial Control System - ICS and Operational Technology.mp4 (134.27 MB)
2 -Artificial Intelligence and Machine Learning.mp4 (89.12 MB)
3 -Types of AI, Narrow, General.mp4 (35.48 MB)
4 -Cryptography Advancements and Block Chain and Impact of Quantum Computing.mp4 (68.13 MB)
1 -Virtualization Obj 1 3.mp4 (60.99 MB)
2 -Virtualization Security Obj 1 3.mp4 (61.26 MB)
3 -Containers Obj 1 3.mp4 (44.28 MB)
4 -Containers Security Threats and Best Practices Obj 1 3.mp4 (37.76 MB)
5 -Docker Overview, Threats, Best Practices Obj 1 3.mp4 (55.19 MB)
6 -Kubernetes Overview, Threats, Best Practices Obj 1 3.mp4 (54.8 MB)
7 -Serverless Computing and Microservices technology Obj 1 3.mp4 (77.55 MB)
8 -SDN - Software Defined Networks Obj 1 3.mp4 (118.75 MB)
9 -NFV - Network Function Virtualization Obj 1 3.mp4 (75.54 MB)
1 -Common threats and Vulnerabilities on Cloud Computing Obj 1 3 & 3 3.mp4 (47.8 MB)
2 -Security Vulnerabilities.mp4 (38.42 MB)
3 -Vulnerability Related Terms, CVE, CVSS.mp4 (26.17 MB)
4 -Advanced Persistent Threats.mp4 (36.69 MB)
5 -DOS & DDOS Attacks.mp4 (43.8 MB)
6 -Understand Security Controls.mp4 (53.27 MB)
7 -Best Practices in Control Selection, Design, Operations Obj 1 4.mp4 (25.5 MB)
8 -Defence in Depth Concept.mp4 (40.95 MB)
9 -Zero Trust vs Trust but Verify.mp4 (21.45 MB)
1 -Business impact analysis (BIA) Obj 1 4.mp4 (80.92 MB)
2 -RPO & RTO Obj 3 5.mp4 (60.14 MB)
3 -BCP Testing Obj 3 5.mp4 (30.43 MB)
1 -Security Standards and Frameworks.mp4 (55.57 MB)
2 -ISOIEC 27017 Obj 1 5.mp4 (37.38 MB)
3 -CSA - STAR Registry and CCM, CAIQ.mp4 (64.41 MB)
4 -PCI-DSS v4 0 Overview Obj 1 5.mp4 (21.99 MB)
5 -PCI-DSS v4 0 1 - Requirements Deep Dive.mp4 (48.75 MB)
6 -Federal Information Processing Standard (FIPS) 140-3 Obj 1 5.mp4 (55.32 MB)
7 -Common Criteria (CC) and Security Evaluation Models Obj 1 5.mp4 (36 MB)
8 -Gap analysis.mp4 (35.97 MB)
1 -Data lifecycle Obj 2 1.mp4 (15.96 MB)
2 -Data Storage and Retention and Archiving Obj 2 2.mp4 (29.9 MB)
3 -Common threats on Cloud Storage - Malware.mp4 (80.88 MB)
4 -Data dispersion in the Cloud and Data Flow Obj 2 1.mp4 (37.36 MB)
5 -Cloud Storage Services.mp4 (44.59 MB)
6 -Data Disposal Obj 2 2.mp4 (24.98 MB)
7 -Storage Redundancy Through RAID.mp4 (32.21 MB)
8 -Data Roles (Owner, Custodian, User).mp4 (24.77 MB)
9 -Data Protection Policies, Encryption and Classification Obj 3 4.mp4 (55.15 MB)
1 -Encryption 101 Obj 2 3.mp4 (100.29 MB)
2 -Symmetric Encryption.mp4 (87.41 MB)
3 -Asymmetric Encryption.mp4 (71.4 MB)
4 -Public Key Infrastructure.mp4 (84.82 MB)
5 -Digital Certificates.mp4 (38.45 MB)
6 -Hashing Obj 2 3.mp4 (104.38 MB)
7 -Digital Signature and Non-Repudiation Obj 2 8.mp4 (30.92 MB)
1 -Secrets and Key Management Obj 2 3.mp4 (39.04 MB)
2 -Data obfuscation & Tokenization Obj 2 3.mp4 (34.64 MB)
3 -Data Discovery and Governance Tools Obj 2 4.mp4 (33.45 MB)
4 -Data Classification Obj 2 5.mp4 (76.11 MB)
5 -Data loss prevention (DLP) Obj 2 3.mp4 (50.93 MB)
6 -Information Rights Management (IRM) & Digital Rights Management Obj 2 6.mp4 (40.13 MB)
7 -DRM tool Usage and Examples.mp4 (45.56 MB)
8 -Intellectual Properties.mp4 (21.33 MB)
]
Screenshot
28VVK5WN_o.jpg


Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
 
Kommentar

In der Börse ist nur das Erstellen von Download-Angeboten erlaubt! Ignorierst du das, wird dein Beitrag ohne Vorwarnung gelöscht. Ein Eintrag ist offline? Dann nutze bitte den Link  Offline melden . Möchtest du stattdessen etwas zu einem Download schreiben, dann nutze den Link  Kommentieren . Beide Links findest du immer unter jedem Eintrag/Download.

Data-Load.me | Data-Load.ing | Data-Load.to | Data-Load.in

Auf Data-Load.me findest du Links zu kostenlosen Downloads für Filme, Serien, Dokumentationen, Anime, Animation & Zeichentrick, Audio / Musik, Software und Dokumente / Ebooks / Zeitschriften. Wir sind deine Boerse für kostenlose Downloads!

Ist Data-Load legal?

Data-Load ist nicht illegal. Es werden keine zum Download angebotene Inhalte auf den Servern von Data-Load gespeichert.
Oben Unten