[ CourseWikia.Com ] PluralSight - Security Best Practices In Google Cloud

Torrent Details


[ CourseWikia.com ] PluralSight - Security Best Practices in Google Cloud

NAME
[ CourseWikia.com ] PluralSight - Security Best Practices in Google Cloud.torrent
CATEGORY
Other
INFOHASH
fa7ef5656b98843fd7b1d3dbca4a188a95547bc8
SIZE
215 MB in 90 files
ADDED
Uploaded on 27-06-2023 by our crawler pet called "Spidey".
SWARM
0 seeders & 1 peers
RATING
No votes yet.

Please login to vote for this torrent.


Description

[ CourseWikia.com ] Security Best Practices in Google Cloud



If You Need More Stuff, kindly Visit and Support Us -->> https://CourseWikia.com







Released 6/2023

MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch

Level: Beginner | Genre: eLearning | Language: English + vtt | Duration: 2h | Size: 215 MB



This self-paced training course gives participants broad study of security controls and techniques on Google Cloud.



This self-paced training course gives participants broad study of security controls and techniques on Google Cloud. Through recorded lectures, nstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution, including Cloud Storage access control technologies, Security Keys, Customer-Supplied Encryption Keys, API access controls, scoping, shielded VMs, encryption, and signed URLs. It also covers securing Kubernetes environments.



If You Need More Stuff, kindly Visit and Support Us -->> https://FreeCourseWeb.com



Get More Tutorials and Support Us -->> https://DevCourseWeb.com



We upload these learning materials for the people from all over the world, who have the talent and motivation to sharpen their skills/ knowledge but do not have the financial support to afford the materials. If you like this content and if you are truly in a position that you can actually buy the materials, then Please, we repeat, Please, Support Authors. They Deserve it! Because always remember, without "Them", you and we won't be here having this conversation. Think about it! Peace...



Image error



Image error

Discussion

Comments 0

Post Your Comment

Files in this torrent

FILENAMESIZE
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/01. Shielded VMs.mp47.7 MB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/01. Shielded VMs.vtt4.1 KB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/02. Compute Engine best practices.mp45.1 MB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/02. Compute Engine best practices.vtt5.3 KB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/03. Organization policy controls.mp43.6 MB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/03. Organization policy controls.vtt3 KB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/04. What Certificate Authority Service provides.mp43.3 MB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/04. What Certificate Authority Service provides.vtt2.8 KB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/06. OS Login.mp43.8 MB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/06. OS Login.vtt3.5 KB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/07. Pluralsight - Getting Started with GCP and Qwiklabs.mp49.6 MB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/07. Pluralsight - Getting Started with GCP and Qwiklabs.vtt5.7 KB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/08. Connecting to virtual machines.mp46 MB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/08. Connecting to virtual machines.vtt5.2 KB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/09. Confidential VMs.mp43.4 MB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/09. Confidential VMs.vtt2.9 KB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/10. Module review.mp44.8 MB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/10. Module review.vtt4.1 KB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/11. Lab Intro - Configuring, Using, and Auditing VM Service Accounts and Scope.mp4517.9 KB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/11. Lab Intro - Configuring, Using, and Auditing VM Service Accounts and Scope.vtt629 B
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/12. Certificate Authority Service.mp43.8 MB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/12. Certificate Authority Service.vtt2.9 KB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/13. Module overview.mp41.7 MB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/13. Module overview.vtt874 B
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/14. Service accounts, IAM roles, and API scopes.mp47.2 MB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/14. Service accounts, IAM roles, and API scopes.vtt6.2 KB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/15. Connecting to VMs without external IPs.mp43.9 MB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/15. Connecting to VMs without external IPs.vtt3.2 KB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/01. BigQuery IAM roles and authorized views.mp45 MB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/01. BigQuery IAM roles and authorized views.vtt2.9 KB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/02. Lab Intro - Creating a BigQuery Authorized View.mp4396.6 KB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/02. Lab Intro - Creating a BigQuery Authorized View.vtt565 B
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/03. Module review.mp43 MB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/03. Module review.vtt3 KB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/06. Encrypting with CMEK and CSEK.mp412.7 MB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/06. Encrypting with CMEK and CSEK.vtt11.2 KB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/07. Storage best practices.mp44.4 MB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/07. Storage best practices.vtt4.2 KB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/08. Lab Intro - Using Customer-Managed Encryption Keys with Cloud Storage and Clou.mp4661.1 KB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/08. Lab Intro - Using Customer-Managed Encryption Keys with Cloud Storage and Clou.vtt877 B
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/09. Demo - Using and Verifying Keys in Cloud HSM.mp411.4 MB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/09. Demo - Using and Verifying Keys in Cloud HSM.vtt8.6 KB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/11. Lab Intro - Using Customer-Supplied Encryption Keys with Cloud Storage.mp4506.1 KB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/11. Lab Intro - Using Customer-Supplied Encryption Keys with Cloud Storage.vtt724 B
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/12. Cloud HSM.mp46.1 MB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/12. Cloud HSM.vtt5.4 KB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/13. Cloud Storage IAM permissions and ACLs.mp45.8 MB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/13. Cloud Storage IAM permissions and ACLs.vtt3.4 KB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/14. Signed URLs and policy documents.mp46.2 MB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/14. Signed URLs and policy documents.vtt5 KB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/15. Module overview.mp47.7 MB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/15. Module overview.vtt2.1 KB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/16. Auditing cloud data.mp43.4 MB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/16. Auditing cloud data.vtt2.4 KB
~Get Your Files Here !/04. Application Security - Techniques and Best Practices/01. Types of application security vulnerabilities.mp45.6 MB
~Get Your Files Here !/04. Application Security - Techniques and Best Practices/01. Types of application security vulnerabilities.vtt5.6 KB
~Get Your Files Here !/04. Application Security - Techniques and Best Practices/02. Lab Intro - Configuring and Using Credentials with Secret Manager.mp4218.8 KB
~Get Your Files Here !/04. Application Security - Techniques and Best Practices/02. Lab Intro - Configuring and Using Credentials with Secret Manager.vtt293 B
~Get Your Files Here !/04. Application Security - Techniques and Best Practices/05. Lab Intro - Identify Application Vulnerabilities with Security Command Center.mp4391.5 KB
~Get Your Files Here !/04. Application Security - Techniques and Best Practices/05. Lab Intro - Identify Application Vulnerabilities with Security Command Center.vtt467 B
~Get Your Files Here !/04. Application Security - Techniques and Best Practices/06. Web Security Scanner.mp47.3 MB
~Get Your Files Here !/04. Application Security - Techniques and Best Practices/06. Web Security Scanner.vtt7.4 KB
~Get Your Files Here !/04. Application Security - Techniques and Best Practices/08. Threat - Identity and Oauth phishing.mp43.9 MB
~Get Your Files Here !/04. Application Security - Techniques and Best Practices/08. Threat - Identity and Oauth phishing.vtt4.2 KB
~Get Your Files Here !/04. Application Security - Techniques and Best Practices/09. Module overview.mp44.1 MB
~Get Your Files Here !/04. Application Security - Techniques and Best Practices/09. Module overview.vtt1.3 KB
~Get Your Files Here !/04. Application Security - Techniques and Best Practices/10. Lab Intro - Securing Compute Engine Applications with BeyondCorp Enterprise.mp4339.7 KB
~Get Your Files Here !/04. Application Security - Techniques and Best Practices/10. Lab Intro - Securing Compute Engine Applications with BeyondCorp Enterprise.vtt366 B
~Get Your Files Here !/04. Application Security - Techniques and Best Practices/11. Module review.mp44.2 MB
~Get Your Files Here !/04. Application Security - Techniques and Best Practices/11. Module review.vtt4.2 KB
~Get Your Files Here !/04. Application Security - Techniques and Best Practices/12. Secret Manager.mp410.5 MB
~Get Your Files Here !/04. Application Security - Techniques and Best Practices/12. Secret Manager.vtt9.7 KB
~Get Your Files Here !/04. Application Security - Techniques and Best Practices/13. Identity-Aware Proxy (IAP).mp47.8 MB
~Get Your Files Here !/04. Application Security - Techniques and Best Practices/13. Identity-Aware Proxy (IAP).vtt6.2 KB
~Get Your Files Here !/5. Securing Google Kubernetes Engine - Techniques and Best Practices/1. Monitoring and logging.mp44 MB
~Get Your Files Here !/5. Securing Google Kubernetes Engine - Techniques and Best Practices/1. Monitoring and logging.vtt3.7 KB
~Get Your Files Here !/5. Securing Google Kubernetes Engine - Techniques and Best Practices/2. Authentication and authorization.mp43.6 MB
~Get Your Files Here !/5. Securing Google Kubernetes Engine - Techniques and Best Practices/2. Authentication and authorization.vtt3.5 KB
~Get Your Files Here !/5. Securing Google Kubernetes Engine - Techniques and Best Practices/3. Module review.mp41.9 MB
~Get Your Files Here !/5. Securing Google Kubernetes Engine - Techniques and Best Practices/3. Module review.vtt1.9 KB
~Get Your Files Here !/5. Securing Google Kubernetes Engine - Techniques and Best Practices/4. Introduction to KubernetesGKE.mp45.7 MB
~Get Your Files Here !/5. Securing Google Kubernetes Engine - Techniques and Best Practices/4. Introduction to KubernetesGKE.vtt6.2 KB
~Get Your Files Here !/5. Securing Google Kubernetes Engine - Techniques and Best Practices/5. Hardening your clusters.mp412.5 MB
~Get Your Files Here !/5. Securing Google Kubernetes Engine - Techniques and Best Practices/5. Hardening your clusters.vtt12.3 KB
~Get Your Files Here !/5. Securing Google Kubernetes Engine - Techniques and Best Practices/6. Securing your workloads.mp47 MB
~Get Your Files Here !/5. Securing Google Kubernetes Engine - Techniques and Best Practices/6. Securing your workloads.vtt5.5 KB
~Get Your Files Here !/5. Securing Google Kubernetes Engine - Techniques and Best Practices/7. Module overview.mp43.6 MB
~Get Your Files Here !/5. Securing Google Kubernetes Engine - Techniques and Best Practices/7. Module overview.vtt1.1 KB
~Get Your Files Here !/Bonus Resources.txt386 B
~Get Your Files Here !/playlist.m3u5.4 KB

Alternative Torrents for 'CourseWikia.com PluralSight Security Best Practices Google Cloud'.

There are no alternative torrents found.