Torrent details for "Modern Cloud Security Shift Left Observability and Automated D" Log in to bookmark
Controls:
×
Report Torrent
Please select a reason for reporting this torrent:
Your report will be reviewed by our moderation team.
×
Report Information
Loading report information...
This torrent has been reported 0 times.
Report Summary:
| User | Reason | Date |
|---|
Failed to load report information.
×
Success
Your report has been submitted successfully.
Checked by:
Category:
Language:
English
Total Size:
377.2 MB
Info Hash:
99E44578EC357C722A0E23AF3F31108C3A69897C
Added By:
Added:
Aug. 14, 2025, 12:22 a.m.
Stats:
|
(Last updated: Aug. 14, 2025, 12:36 a.m.)
| File | Size |
|---|---|
| Get Bonus Downloads Here.url | 180 bytes |
| 01 - Your complete guide to cloud-based cybersecurity.mp4 | 2.7 MB |
| 02 - Fundamentals of cloud computing.mp4 | 5.2 MB |
| 02 - Fundamentals of cloud computing.srt | 7.2 KB |
| 03 - The cloud security landscape.mp4 | 4.0 MB |
| 01 - Deep dive into cloud service models.mp4 | 7.4 MB |
| 02 - IaaS Benefits and security considerations.mp4 | 7.7 MB |
| 03 - PaaS Security implications.mp4 | 7.4 MB |
| 04 - SaaS Managing security in SaaS applications.mp4 | 7.6 MB |
| 05 - The shared responsibility model.mp4 | 6.4 MB |
| 06 - Distinguishing responsibilities across service models.mp4 | 8.6 MB |
| 07 - Real-world examples showing shared responsibility.mp4 | 4.4 MB |
| 01 - IAM fundamentals.mp4 | 5.8 MB |
| 01 - IAM fundamentals.srt | 4.1 KB |
| 02 - Least privilege and need-to-know principles.mp4 | 9.3 MB |
| 03 - Implementing IAM policies.mp4 | 5.2 MB |
| 04 - Monitoring and auditing IAM.mp4 | 7.2 MB |
| 05 - Responding to IAM incidents.mp4 | 6.3 MB |
| 06 - Multi-factor authentication and conditional access.mp4 | 5.9 MB |
| 01 - Data classification and governance.mp4 | 2.2 MB |
| 01 - Data classification and governance.srt | 2.9 KB |
| 02 - Establishing data governance policies.mp4 | 7.2 MB |
| 03 - Compliance considerations for data handling.mp4 | 6.4 MB |
| 04 - Encryption strategies.mp4 | 6.5 MB |
| 05 - Encryption at rest Techniques and tools.mp4 | 6.7 MB |
| 06 - Encryption in transit Securing data during transfer.mp4 | 3.6 MB |
| 07 - Designing effective backup strategies.mp4 | 5.1 MB |
| 08 - Disaster recovery planning in the cloud.mp4 | 6.5 MB |
| 09 - DLP policies to prevent unauthorized data access.mp4 | 5.6 MB |
| 10 - Monitoring and responding to DLP alerts.mp4 | 5.6 MB |
| 01 - Configure virtual private clouds.mp4 | 5.6 MB |
| 02 - Network segmentation and isolation techniques.mp4 | 9.6 MB |
| 02 - Network segmentation and isolation techniques.srt | 7.7 KB |
| 03 - Setting up security groups and firewall rules.mp4 | 4.7 MB |
| 04 - Implement intrusion detection and prevention systems.mp4 | 4.6 MB |
| 05 - Utilize security information and event management tools.mp4 | 5.3 MB |
| 06 - Establishing VPNs and secure connections.mp4 | 7.9 MB |
| 07 - Explore Direct Connect and ExpressRoute options.mp4 | 5.5 MB |
| 08 - Secure hybrid cloud connectivity.mp4 | 8.9 MB |
| 01 - Secure software development life cycle.mp4 | 10.5 MB |
| 02 - DevSecOps principles.mp4 | 7.9 MB |
| 03 - Shift left.mp4 | 5.6 MB |
| 04 - Automate security in CICD pipelines.mp4 | 8.3 MB |
| 05 - Serverless and API security.mp4 | 6.5 MB |
| 06 - Protect APIs from common attacks.mp4 | 6.2 MB |
| 07 - Implement API gateway security features.mp4 | 5.2 MB |
| 01 - Cloud governance frameworks.mp4 | 5.9 MB |
| 02 - Understand the role of governance in security.mp4 | 6.8 MB |
| 03 - Monitor and enforce compliance.mp4 | 5.5 MB |
| 04 - Data sovereignty and residency concerns.mp4 | 6.0 MB |
| 05 - Understand contracts and service level agreements.mp4 | 4.0 MB |
| 01 - Set up monitoring tools and dashboards.mp4 | 8.1 MB |
| 02 - Analyze logs for security insights.mp4 | 9.5 MB |
| 03 - Leverage security analytics.mp4 | 9.2 MB |
| 03 - Leverage security analytics.srt | 5.3 KB |
| 04 - Develop a cloud-specific incident response plan.mp4 | 5.8 MB |
| 04 - Develop a cloud-specific incident response plan.srt | 5.5 KB |
| 05 - Coordinate response efforts.mp4 | 5.1 MB |
| 06 - Post-incident analysis and improvement.mp4 | 4.8 MB |
| 01 - Role of AI in threat detection and response.mp4 | 12.4 MB |
| 02 - Explore autonomous security systems.mp4 | 5.4 MB |
| 03 - Potential risks of quantum computing to encryption.mp4 | 8.5 MB |
| 03 - Potential risks of quantum computing to encryption.srt | 8.2 KB |
| 04 - Preparing for post-quantum cryptography.mp4 | 9.5 MB |
| 05 - Strategies for edge computing security.mp4 | 5.1 MB |
| 01 - Overview of relevant certifications.mp4 | 5.8 MB |
| 02 - Next steps.mp4 | 641.7 KB |
| Bonus Resources.txt | 70 bytes |
Name
DL
Uploader
Size
S/L
Added
-
377.2 MB
[1
/
5]
2025-08-14
| Uploaded by freecoursewb | Size 377.2 MB | Health [ 1 /5 ] | Added 2025-08-14 |
-
801.5 MB
[2
/
7]
2025-10-23
| Uploaded by freecoursewb | Size 801.5 MB | Health [ 2 /7 ] | Added 2025-10-23 |
NOTE
SOURCE: Modern Cloud Security Shift Left Observability and Automated D
-----------------------------------------------------------------------------------
COVER

-----------------------------------------------------------------------------------
MEDIAINFO
None
×


