Magnetic link has been copied to the cutting board

Name [ FreeCourseWeb.com ] Linkedin - CCSP Cert Prep - 5 Cloud Security Operations (2022)

File Type video

Size 570.94MB

UpdateDate 2024-8-25

hash *****C406F5C92DDCD1EE245E8056E6F05845C7

Hot 4

Files Get Bonus Downloads Here.url | 183B ~Get Your Files Here !/01 - Introduction/01 - Cloud security operations.mp4 | 20.72MB ~Get Your Files Here !/01 - Introduction/01 - Cloud security operations.srt | 2.38KB ~Get Your Files Here !/01 - Introduction/02 - What you need to know.mp4 | 1.21MB ~Get Your Files Here !/01 - Introduction/02 - What you need to know.srt | 1.25KB ~Get Your Files Here !/01 - Introduction/03 - Study resources.mp4 | 6.92MB ~Get Your Files Here !/01 - Introduction/03 - Study resources.srt | 3.18KB ~Get Your Files Here !/02 - 1. Physical and Logical Infrastructure/01 - Hardware security configuration.mp4 | 16.53MB ~Get Your Files Here !/02 - 1. Physical and Logical Infrastructure/01 - Hardware security configuration.srt | 6.90KB ~Get Your Files Here !/02 - 1. Physical and Logical Infrastructure/02 - Hardware security modules.mp4 | 10.61MB ~Get Your Files Here !/02 - 1. Physical and Logical Infrastructure/02 - Hardware security modules.srt | 5.19KB ~Get Your Files Here !/02 - 1. Physical and Logical Infrastructure/03 - Virtualization security configuration.mp4 | 12.54MB ~Get Your Files Here !/02 - 1. Physical and Logical Infrastructure/03 - Virtualization security configuration.srt | 5.68KB ~Get Your Files Here !/03 - 2. Secure Infrastructure Operations/01 - Securing local and remote access.mp4 | 14.19MB ~Get Your Files Here !/03 - 2. Secure Infrastructure Operations/01 - Securing local and remote access.srt | 9.18KB ~Get Your Files Here !/03 - 2. Secure Infrastructure Operations/02 - Security zones.mp4 | 11.44MB ~Get Your Files Here !/03 - 2. Secure Infrastructure Operations/02 - Security zones.srt | 7.09KB ~Get Your Files Here !/03 - 2. Secure Infrastructure Operations/03 - Building lines of communication.mp4 | 11.95MB ~Get Your Files Here !/03 - 2. Secure Infrastructure Operations/03 - Building lines of communication.srt | 5.17KB ~Get Your Files Here !/04 - 3. Network Operations/01 - TCPIP networking.mp4 | 13.95MB ~Get Your Files Here !/04 - 3. Network Operations/01 - TCPIP networking.srt | 8.82KB ~Get Your Files Here !/04 - 3. Network Operations/02 - IP addressing and DHCP.mp4 | 10.75MB ~Get Your Files Here !/04 - 3. Network Operations/02 - IP addressing and DHCP.srt | 6.75KB ~Get Your Files Here !/04 - 3. Network Operations/03 - DNS.mp4 | 12.43MB ~Get Your Files Here !/04 - 3. Network Operations/03 - DNS.srt | 7.45KB ~Get Your Files Here !/04 - 3. Network Operations/04 - Network ports.mp4 | 10.96MB ~Get Your Files Here !/04 - 3. Network Operations/04 - Network ports.srt | 5.61KB ~Get Your Files Here !/04 - 3. Network Operations/05 - ICMP.mp4 | 10.71MB ~Get Your Files Here !/04 - 3. Network Operations/05 - ICMP.srt | 6.05KB ~Get Your Files Here !/04 - 3. Network Operations/06 - Public and private addressing.mp4 | 16.89MB ~Get Your Files Here !/04 - 3. Network Operations/06 - Public and private addressing.srt | 10.57KB ~Get Your Files Here !/04 - 3. Network Operations/07 - Subnetting.mp4 | 7.00MB ~Get Your Files Here !/04 - 3. Network Operations/07 - Subnetting.srt | 5.08KB ~Get Your Files Here !/04 - 3. Network Operations/08 - VLANs and network segmentation.mp4 | 3.73MB ~Get Your Files Here !/04 - 3. Network Operations/08 - VLANs and network segmentation.srt | 2.91KB ~Get Your Files Here !/05 - 4. Network Security/01 - Firewalls.mp4 | 18.28MB ~Get Your Files Here !/05 - 4. Network Security/01 - Firewalls.srt | 11.87KB ~Get Your Files Here !/05 - 4. Network Security/02 - Network security groups.mp4 | 8.80MB ~Get Your Files Here !/05 - 4. Network Security/02 - Network security groups.srt | 5.26KB ~Get Your Files Here !/05 - 4. Network Security/03 - VPNs and VPN concentrators.mp4 | 12.90MB ~Get Your Files Here !/05 - 4. Network Security/03 - VPNs and VPN concentrators.srt | 8.31KB ~Get Your Files Here !/05 - 4. Network Security/04 - Network intrusion detection and prevention.mp4 | 14.58MB ~Get Your Files Here !/05 - 4. Network Security/04 - Network intrusion detection and prevention.srt | 9.31KB ~Get Your Files Here !/05 - 4. Network Security/05 - Zero trust networking.mp4 | 15.14MB ~Get Your Files Here !/05 - 4. Network Security/05 - Zero trust networking.srt | 7.93KB ~Get Your Files Here !/06 - 5. Security Baselines and Standards/01 - Developing security baselines.mp4 | 11.83MB ~Get Your Files Here !/06 - 5. Security Baselines and Standards/01 - Developing security baselines.srt | 7.41KB ~Get Your Files Here !/06 - 5. Security Baselines and Standards/02 - Leveraging industry standards.mp4 | 27.59MB ~Get Your Files Here !/06 - 5. Security Baselines and Standards/02 - Leveraging industry standards.srt | 6.48KB ~Get Your Files Here !/06 - 5. Security Baselines and Standards/03 - Customizing security standards.mp4 | 6.99MB ~Get Your Files Here !/06 - 5. Security Baselines and Standards/03 - Customizing security standards.srt | 3.63KB ~Get Your Files Here !/06 - 5. Security Baselines and Standards/04 - Host availability.mp4 | 11.01MB ~Get Your Files Here !/06 - 5. Security Baselines and Standards/04 - Host availability.srt | 5.67KB ~Get Your Files Here !/07 - 6. Monitoring/01 - Performance and capacity monitoring.mp4 | 13.49MB ~Get Your Files Here !/07 - 6. Monitoring/01 - Performance and capacity monitoring.srt | 5.89KB ~Get Your Files Here !/07 - 6. Monitoring/02 - Managing an SOC.mp4 | 7.66MB ~Get Your Files Here !/07 - 6. Monitoring/02 - Managing an SOC.srt | 3.22KB ~Get Your Files Here !/07 - 6. Monitoring/03 - The ITIL model.mp4 | 7.92MB ~Get Your Files Here !/07 - 6. Monitoring/03 - The ITIL model.srt | 4.78KB ~Get Your Files Here !/08 - 7. Threat and Vulnerability Management/01 - What is vulnerability management.mp4 | 14.63MB ~Get Your Files Here !/08 - 7. Threat and Vulnerability Management/01 - What is vulnerability management.srt | 9.39KB ~Get Your Files Here !/08 - 7. Threat and Vulnerability Management/02 - Analyzing scan reports.mp4 | 11.84MB ~Get Your Files Here !/08 - 7. Threat and Vulnerability Management/02 - Analyzing scan reports.srt | 10.07KB ~Get Your Files Here !/08 - 7. Threat and Vulnerability Management/03 - Correlating scan results.mp4 | 6.55MB ~Get Your Files Here !/08 - 7. Threat and Vulnerability Management/03 - Correlating scan results.srt | 4.40KB ~Get Your Files Here !/08 - 7. Threat and Vulnerability Management/04 - Penetration testing.mp4 | 15.28MB ~Get Your Files Here !/08 - 7. Threat and Vulnerability Management/04 - Penetration testing.srt | 8.68KB ~Get Your Files Here !/08 - 7. Threat and Vulnerability Management/05 - Deception technologies.mp4 | 8.93MB ~Get Your Files Here !/08 - 7. Threat and Vulnerability Management/05 - Deception technologies.srt | 5.54KB ~Get Your Files Here !/09 - 8. Incident Management/01 - Building an incident response program.mp4 | 16.03MB ~Get Your Files Here !/09 - 8. Incident Management/01 - Building an incident response program.srt | 8.18KB ~Get Your Files Here !/09 - 8. Incident Management/02 - Creating an incident response team.mp4 | 10.79MB ~Get Your Files Here !/09 - 8. Incident Management/02 - Creating an incident response team.srt | 4.42KB ~Get Your Files Here !/09 - 8. Incident Management/03 - Incident communications plan.mp4 | 12.23MB ~Get Your Files Here !/09 - 8. Incident Management/03 - Incident communications plan.srt | 5.29KB ~Get Your Files Here !/09 - 8. Incident Management/04 - Incident identification.mp4 | 16.68MB ~Get Your Files Here !/09 - 8. Incident Management/04 - Incident identification.srt | 8.36KB ~Get Your Files Here !/09 - 8. Incident Management/05 - Escalation and notification.mp4 | 7.02MB ~Get Your Files Here !/09 - 8. Incident Management/05 - Escalation and notification.srt | 4.66KB ~Get Your Files Here !/09 - 8. Incident Management/06 - Mitigation.mp4 | 6.80MB ~Get Your Files Here !/09 - 8. Incident Management/06 - Mitigation.srt | 4.55KB ~Get Your Files Here !/09 - 8. Incident Management/07 - Containment techniques.mp4 | 7.42MB ~Get Your Files Here !/09 - 8. Incident Management/07 - Containment techniques.srt | 6.05KB ~Get Your Files Here !/09 - 8. Incident Management/08 - Incident eradication and recovery.mp4 | 17.46MB ~Get Your Files Here !/09 - 8. Incident Management/08 - Incident eradication and recovery.srt | 10.92KB ~Get Your Files Here !/09 - 8. Incident Management/09 - Validation.mp4 | 5.25MB ~Get Your Files Here !/09 - 8. Incident Management/09 - Validation.srt | 5.27KB ~Get Your Files Here !/09 - 8. Incident Management/10 - Post-incident activities.mp4 | 14.98MB ~Get Your Files Here !/09 - 8. Incident Management/10 - Post-incident activities.srt | 7.53KB ~Get Your Files Here !/09 - 8. Incident Management/11 - Incident response exercises.mp4 | 7.89MB ~Get Your Files Here !/09 - 8. Incident Management/11 - Incident response exercises.srt | 3.28KB ~Get Your Files Here !/10 - 9. Investigations and Forensics/01 - Conducting investigations.mp4 | 14.84MB ~Get Your Files Here !/10 - 9. Investigations and Forensics/01 - Conducting investigations.srt | 7.43KB ~Get Your Files Here !/10 - 9. Investigations and Forensics/02 - Evidence types.mp4 | 8.93MB ~Get Your Files Here !/10 - 9. Investigations and Forensics/02 - Evidence types.srt | 6.75KB ~Get Your Files Here !/10 - 9. Investigations and Forensics/03 - Digital forensics.mp4 | 10.28MB ~Get Your Files Here !/10 - 9. Investigations and Forensics/03 - Digital forensics.srt | 6.58KB ~Get Your Files Here !/10 - 9. Investigations and Forensics/04 - Chain of custody.mp4 | 6.71MB ~Get Your Files Here !/10 - 9. Investigations and Forensics/04 - Chain of custody.srt | 3.74KB ~Get Your Files Here !/11 - What's Next/01 - Continuing your CCSP certification journey.mp4 | 1.40MB ~Get Your Files Here !/11 - What's Next/01 - Continuing your CCSP certification journey.srt | 1.14KB ~Get Your Files Here !/Bonus Resources.txt | 386B

Recommend

Magnetic link has been copied to the cutting board