17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
TORRENT DETAILS
[ CourseWikia.com ] PluralSight - Security Best Practices In Google Cloud
TORRENT SUMMARY
Status:
All the torrents in this section have been verified by our verification system
This self-paced training course gives participants broad study of security controls and techniques on Google Cloud.
This self-paced training course gives participants broad study of security controls and techniques on Google Cloud. Through recorded lectures, nstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution, including Cloud Storage access control technologies, Security Keys, Customer-Supplied Encryption Keys, API access controls, scoping, shielded VMs, encryption, and signed URLs. It also covers securing Kubernetes environments.
If You Need More Stuff, kindly Visit and Support Us -->> https://FreeCourseWeb.com
Get More Tutorials and Support Us -->> https://DevCourseWeb.com
We upload these learning materials for the people from all over the world, who have the talent and motivation to sharpen their skills/ knowledge but do not have the financial support to afford the materials. If you like this content and if you are truly in a position that you can actually buy the materials, then Please, we repeat, Please, Support Authors. They Deserve it! Because always remember, without "Them", you and we won't be here having this conversation. Think about it! Peace...
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/01. Shielded VMs.mp4
7.7 MB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/01. Shielded VMs.vtt
4.1 KB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/02. Compute Engine best practices.mp4
5.1 MB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/02. Compute Engine best practices.vtt
5.3 KB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/03. Organization policy controls.mp4
3.6 MB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/03. Organization policy controls.vtt
3 KB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/04. What Certificate Authority Service provides.mp4
3.3 MB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/04. What Certificate Authority Service provides.vtt
2.8 KB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/06. OS Login.mp4
3.8 MB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/06. OS Login.vtt
3.5 KB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/07. Pluralsight - Getting Started with GCP and Qwiklabs.mp4
9.6 MB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/07. Pluralsight - Getting Started with GCP and Qwiklabs.vtt
5.7 KB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/08. Connecting to virtual machines.mp4
6 MB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/08. Connecting to virtual machines.vtt
5.2 KB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/09. Confidential VMs.mp4
3.4 MB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/09. Confidential VMs.vtt
2.9 KB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/10. Module review.mp4
4.8 MB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/10. Module review.vtt
4.1 KB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/11. Lab Intro - Configuring, Using, and Auditing VM Service Accounts and Scope.mp4
517.9 KB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/11. Lab Intro - Configuring, Using, and Auditing VM Service Accounts and Scope.vtt
629 B
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/12. Certificate Authority Service.mp4
3.8 MB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/12. Certificate Authority Service.vtt
2.9 KB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/13. Module overview.mp4
1.7 MB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/13. Module overview.vtt
874 B
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/14. Service accounts, IAM roles, and API scopes.mp4
7.2 MB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/14. Service accounts, IAM roles, and API scopes.vtt
6.2 KB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/15. Connecting to VMs without external IPs.mp4
3.9 MB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/15. Connecting to VMs without external IPs.vtt
3.2 KB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/01. BigQuery IAM roles and authorized views.mp4
5 MB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/01. BigQuery IAM roles and authorized views.vtt
2.9 KB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/02. Lab Intro - Creating a BigQuery Authorized View.mp4
396.6 KB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/02. Lab Intro - Creating a BigQuery Authorized View.vtt
565 B
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/03. Module review.mp4
3 MB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/03. Module review.vtt
3 KB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/06. Encrypting with CMEK and CSEK.mp4
12.7 MB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/06. Encrypting with CMEK and CSEK.vtt
11.2 KB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/07. Storage best practices.mp4
4.4 MB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/07. Storage best practices.vtt
4.2 KB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/08. Lab Intro - Using Customer-Managed Encryption Keys with Cloud Storage and Clou.mp4
661.1 KB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/08. Lab Intro - Using Customer-Managed Encryption Keys with Cloud Storage and Clou.vtt
877 B
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/09. Demo - Using and Verifying Keys in Cloud HSM.mp4
11.4 MB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/09. Demo - Using and Verifying Keys in Cloud HSM.vtt
8.6 KB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/11. Lab Intro - Using Customer-Supplied Encryption Keys with Cloud Storage.mp4
506.1 KB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/11. Lab Intro - Using Customer-Supplied Encryption Keys with Cloud Storage.vtt
724 B
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/12. Cloud HSM.mp4
6.1 MB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/12. Cloud HSM.vtt
5.4 KB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/13. Cloud Storage IAM permissions and ACLs.mp4
5.8 MB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/13. Cloud Storage IAM permissions and ACLs.vtt
3.4 KB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/14. Signed URLs and policy documents.mp4
6.2 MB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/14. Signed URLs and policy documents.vtt
5 KB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/15. Module overview.mp4
7.7 MB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/15. Module overview.vtt
2.1 KB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/16. Auditing cloud data.mp4
3.4 MB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/16. Auditing cloud data.vtt
2.4 KB
~Get Your Files Here !/04. Application Security - Techniques and Best Practices/01. Types of application security vulnerabilities.mp4
5.6 MB
~Get Your Files Here !/04. Application Security - Techniques and Best Practices/01. Types of application security vulnerabilities.vtt
5.6 KB
~Get Your Files Here !/04. Application Security - Techniques and Best Practices/02. Lab Intro - Configuring and Using Credentials with Secret Manager.mp4
218.8 KB
~Get Your Files Here !/04. Application Security - Techniques and Best Practices/02. Lab Intro - Configuring and Using Credentials with Secret Manager.vtt
293 B
~Get Your Files Here !/04. Application Security - Techniques and Best Practices/05. Lab Intro - Identify Application Vulnerabilities with Security Command Center.mp4
391.5 KB
~Get Your Files Here !/04. Application Security - Techniques and Best Practices/05. Lab Intro - Identify Application Vulnerabilities with Security Command Center.vtt
467 B
~Get Your Files Here !/04. Application Security - Techniques and Best Practices/06. Web Security Scanner.mp4
7.3 MB
~Get Your Files Here !/04. Application Security - Techniques and Best Practices/06. Web Security Scanner.vtt
7.4 KB
~Get Your Files Here !/04. Application Security - Techniques and Best Practices/08. Threat - Identity and Oauth phishing.mp4
3.9 MB
~Get Your Files Here !/04. Application Security - Techniques and Best Practices/08. Threat - Identity and Oauth phishing.vtt
4.2 KB
~Get Your Files Here !/04. Application Security - Techniques and Best Practices/09. Module overview.mp4
4.1 MB
~Get Your Files Here !/04. Application Security - Techniques and Best Practices/09. Module overview.vtt
1.3 KB
~Get Your Files Here !/04. Application Security - Techniques and Best Practices/10. Lab Intro - Securing Compute Engine Applications with BeyondCorp Enterprise.mp4
339.7 KB
~Get Your Files Here !/04. Application Security - Techniques and Best Practices/10. Lab Intro - Securing Compute Engine Applications with BeyondCorp Enterprise.vtt
366 B
~Get Your Files Here !/04. Application Security - Techniques and Best Practices/11. Module review.mp4
4.2 MB
~Get Your Files Here !/04. Application Security - Techniques and Best Practices/11. Module review.vtt
4.2 KB
~Get Your Files Here !/04. Application Security - Techniques and Best Practices/12. Secret Manager.mp4
10.5 MB
~Get Your Files Here !/04. Application Security - Techniques and Best Practices/12. Secret Manager.vtt
9.7 KB
~Get Your Files Here !/04. Application Security - Techniques and Best Practices/13. Identity-Aware Proxy (IAP).mp4
7.8 MB
~Get Your Files Here !/04. Application Security - Techniques and Best Practices/13. Identity-Aware Proxy (IAP).vtt
6.2 KB
~Get Your Files Here !/5. Securing Google Kubernetes Engine - Techniques and Best Practices/1. Monitoring and logging.mp4
4 MB
~Get Your Files Here !/5. Securing Google Kubernetes Engine - Techniques and Best Practices/1. Monitoring and logging.vtt
3.7 KB
~Get Your Files Here !/5. Securing Google Kubernetes Engine - Techniques and Best Practices/2. Authentication and authorization.mp4
3.6 MB
~Get Your Files Here !/5. Securing Google Kubernetes Engine - Techniques and Best Practices/2. Authentication and authorization.vtt
3.5 KB
~Get Your Files Here !/5. Securing Google Kubernetes Engine - Techniques and Best Practices/3. Module review.mp4
1.9 MB
~Get Your Files Here !/5. Securing Google Kubernetes Engine - Techniques and Best Practices/3. Module review.vtt
1.9 KB
~Get Your Files Here !/5. Securing Google Kubernetes Engine - Techniques and Best Practices/4. Introduction to KubernetesGKE.mp4
5.7 MB
~Get Your Files Here !/5. Securing Google Kubernetes Engine - Techniques and Best Practices/4. Introduction to KubernetesGKE.vtt
6.2 KB
~Get Your Files Here !/5. Securing Google Kubernetes Engine - Techniques and Best Practices/5. Hardening your clusters.mp4
12.5 MB
~Get Your Files Here !/5. Securing Google Kubernetes Engine - Techniques and Best Practices/5. Hardening your clusters.vtt
12.3 KB
~Get Your Files Here !/5. Securing Google Kubernetes Engine - Techniques and Best Practices/6. Securing your workloads.mp4
7 MB
~Get Your Files Here !/5. Securing Google Kubernetes Engine - Techniques and Best Practices/6. Securing your workloads.vtt
5.5 KB
~Get Your Files Here !/5. Securing Google Kubernetes Engine - Techniques and Best Practices/7. Module overview.mp4
3.6 MB
~Get Your Files Here !/5. Securing Google Kubernetes Engine - Techniques and Best Practices/7. Module overview.vtt