zhongziso
搜索
zhongziso
首页
首页
功能
磁力转BT
BT转磁力
关于
使用教程
免责声明
磁力助手
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing
magnet:?xt=urn:btih:e08ac682e1bc2501bb047a3bb873f7ed8874e428&dn=[FreeCoursesOnline.Us] ethical-hacking-cloud-computing
磁力链接详情
文件列表详情
e08ac682e1bc2501bb047a3bb873f7ed8874e428
infohash:
41
文件数量
483.49 MB
文件大小
2018-1-13 22:06
创建日期
2024-11-11 03:35
最后访问
相关分词
FreeCoursesOnline
Us
ethical-hacking-cloud-computing
00.Cloud-Computing-Concepts/00.Overview.mp4 4.69 MB
00.Cloud-Computing-Concepts/01.From-On-premise-to-Cloud.mp4 58.53 MB
00.Cloud-Computing-Concepts/02.The-Characteristics-of-a-Cloud-Service.mp4 9.31 MB
00.Cloud-Computing-Concepts/03.Understanding-IaaS-PaaS-and-SaaS.mp4 13.06 MB
00.Cloud-Computing-Concepts/04.Cloud-Deployment-Models.mp4 5.69 MB
00.Cloud-Computing-Concepts/05.The-NIST-Cloud-Computing-Reference-Architecture.mp4 7.86 MB
00.Cloud-Computing-Concepts/06.The-Promise-of-the-Cloud.mp4 3.62 MB
00.Cloud-Computing-Concepts/07.Is-the-Cloud-Secure.mp4 6.68 MB
00.Cloud-Computing-Concepts/08.Summary.mp4 3.41 MB
01.Organizational-Security-Considerations/00.Overview.mp4 3.69 MB
01.Organizational-Security-Considerations/01.Everything-Old-Is-New-Again.mp4 3.09 MB
01.Organizational-Security-Considerations/02.Data-Sovereignty.mp4 27.57 MB
01.Organizational-Security-Considerations/03.Compliance-Assessments.mp4 19.32 MB
01.Organizational-Security-Considerations/04.Client-driven-Penetration-Tests.mp4 12.6 MB
01.Organizational-Security-Considerations/05.Commercial-Considerations.mp4 2.7 MB
01.Organizational-Security-Considerations/06.Shadow-IT.mp4 7.76 MB
01.Organizational-Security-Considerations/07.Summary.mp4 4.85 MB
02.Cloud-Computing-Risks/00.Overview.mp4 3.32 MB
02.Cloud-Computing-Risks/01.Compromise-of-Administration-Facilities.mp4 26.29 MB
02.Cloud-Computing-Risks/02.Service-Hijacking-via-Social-Engineering.mp4 12.62 MB
02.Cloud-Computing-Risks/03.Economic-Denial-of-Sustainability-EDoS.mp4 15.74 MB
02.Cloud-Computing-Risks/04.Hypervisor-Breakouts.mp4 13.32 MB
02.Cloud-Computing-Risks/05.Malicious-Cloud-Uses.mp4 9.54 MB
02.Cloud-Computing-Risks/06.Other-Potential-Risks.mp4 24.46 MB
02.Cloud-Computing-Risks/07.Summary.mp4 2.83 MB
03.Cloud-Computing-Security-Strengths/00.Overview.mp4 3.92 MB
03.Cloud-Computing-Security-Strengths/01.DDoS-Prevention.mp4 26.4 MB
03.Cloud-Computing-Security-Strengths/02.Server-Administration-as-a-Service.mp4 27.5 MB
03.Cloud-Computing-Security-Strengths/03.Account-Management-as-a-Service.mp4 12.13 MB
03.Cloud-Computing-Security-Strengths/04.VNet-on-Demand.mp4 4.57 MB
03.Cloud-Computing-Security-Strengths/05.Key-Vaults.mp4 8.51 MB
03.Cloud-Computing-Security-Strengths/06.Auditability.mp4 12.48 MB
03.Cloud-Computing-Security-Strengths/07.Summary.mp4 4.94 MB
04.Hardening-the-Cloud/00.Overview.mp4 3.21 MB
04.Hardening-the-Cloud/01.Securing-the-Administration-Portal.mp4 15.55 MB
04.Hardening-the-Cloud/02.Hardening-the-Configuration.mp4 15.32 MB
04.Hardening-the-Cloud/03.Data-Replication-and-Redundancy.mp4 8.23 MB
04.Hardening-the-Cloud/04.Securing-the-Transport-Layer.mp4 6.98 MB
04.Hardening-the-Cloud/05.SQL-Injection-Alerts-in-Azure.mp4 13.31 MB
04.Hardening-the-Cloud/06.Security-as-a-Service.mp4 15.23 MB
04.Hardening-the-Cloud/07.Summary.mp4 2.67 MB
其他位置