Search Torrents
|
Browse Torrents
|
48 Hour Uploads
|
TV shows
|
Music
|
Top 100
Audio
Video
Applications
Games
Porn
Other
All
Music
Audio books
Sound clips
FLAC
Other
Movies
Movies DVDR
Music videos
Movie clips
TV shows
Handheld
HD - Movies
HD - TV shows
3D
Other
Windows
Mac
UNIX
Handheld
IOS (iPad/iPhone)
Android
Other OS
PC
Mac
PSx
XBOX360
Wii
Handheld
IOS (iPad/iPhone)
Android
Other
Movies
Movies DVDR
Pictures
Games
HD - Movies
Movie clips
Other
E-books
Comics
Pictures
Covers
Physibles
Other
Details for:
Lynda - Cybersecurity with Cloud Computing
lynda cybersecurity cloud computing
Type:
Other
Files:
39
Size:
354.4 MB
Uploaded On:
July 16, 2017, 5:29 p.m.
Added By:
sumi
Seeders:
3
Leechers:
0
Info Hash:
704041B351BCE1B7BBE8F520156861512AFBC54E
Get This Torrent
How do you keep your organization's files, applications, and accounts safe on the cloud? It starts with a considered design approach. In these videos, Malcolm Shore outlines the major cloud security risks, some of which have resulted in service disruptions at companies like Azure, Dropbox, Google, and Amazon, and shows how to plan for and minimize risk when it comes to your own cloud deployments. He introduces concepts such as software as a service (SaaS) and infrastructure as a service, and the differences between public and private clouds. Then, after reviewing the cloud security best practices from the Cloud Security Alliance and the European Network and Information Security Agency (ENISA), Malcolm shows how to use SABSA, a popular security requirements mapping approach, to figure out the business requirements for a successful and secure cloud deployment of your own. Topics include: Essential cloud concepts: infrastructure, deployment models, and more Defining trust models for clouds Identifying governance and risk Complying with legal and audit requirements Managing incident response Maximizing application security Managing encryption and keys Implementing virtualization Introducing SABSA and the cloud attribute taxonomy
Get This Torrent
00. Introduction/00_01 - Welcome.mp4
16.6 MB
00. Introduction/00_02 - What you should know.mp4
841.0 KB
00. Introduction/00_03 - Reference sites.mp4
15.9 MB
00. Introduction/00_04 - Using the exercise files.mp4
272.3 KB
01. Cloud Fundamentals/01_01 - Defining the essential characteristics of cloud.mp4
15.1 MB
01. Cloud Fundamentals/01_02 - Understanding infrastructure as a service.mp4
11.4 MB
01. Cloud Fundamentals/01_03 - Unraveling platform as a service.mp4
6.5 MB
01. Cloud Fundamentals/01_04 - Comprehending software as a service.mp4
8.2 MB
01. Cloud Fundamentals/01_05 - Discovering deployment models.mp4
10.9 MB
01. Cloud Fundamentals/01_06 - Identifying cloud incidents.mp4
14.5 MB
01. Cloud Fundamentals/01_07 - Dissecting the anatomy of a service failure.mp4
8.4 MB
01. Cloud Fundamentals/01_08 - Deciphering the anatomy of a business failure.mp4
7.9 MB
01. Cloud Fundamentals/01_09 - Defining trust models for cloud.mp4
13.3 MB
02. Cloud Security Guidance/02_01 - Identifying governance and risk.mp4
5.2 MB
02. Cloud Security Guidance/02_02 - Complying with legal and audit requrements.mp4
12.5 MB
02. Cloud Security Guidance/02_03 - Managing information and data security.mp4
14.8 MB
02. Cloud Security Guidance/02_04 - Providing portability and interoperability.mp4
7.2 MB
02. Cloud Security Guidance/02_05 - Comparing traditional IT, BCP, and DR.mp4
11.4 MB
02. Cloud Security Guidance/02_06 - Understanding data center operations.mp4
5.1 MB
02. Cloud Security Guidance/02_07 - Managing incident response.mp4
12.3 MB
02. Cloud Security Guidance/02_08 - Maximizing application security.mp4
11.7 MB
02. Cloud Security Guidance/02_09 - Testing and monitoring applications.mp4
8.9 MB
02. Cloud Security Guidance/02_10 - Managing encryption and keys.mp4
10.3 MB
02. Cloud Security Guidance/02_11 - Verifying identity in the cloud.mp4
12.5 MB
02. Cloud Security Guidance/02_12 - Controlling cloud access.mp4
11.9 MB
02. Cloud Security Guidance/02_13 - Implementing virtualization.mp4
12.3 MB
02. Cloud Security Guidance/02_14 - Providing security as a service.mp4
3.7 MB
02. Cloud Security Guidance/02_15 - Challenge Cloud security knowledge.mp4
1.8 MB
02. Cloud Security Guidance/02_16 - Solution Cloud security knowledge.mp4
13.2 MB
03. Architecting Security/03_01 - Introducing SABSA.mp4
14.6 MB
03. Architecting Security/03_02 - Using Fast Tracker.mp4
11.4 MB
03. Architecting Security/03_03 - Defining SABSA attributes.mp4
9.4 MB
03. Architecting Security/03_04 - Diving deeper into Fast Tracker.mp4
8.4 MB
03. Architecting Security/03_05 - Introducing cloud attribute taxonomy.mp4
14.8 MB
03. Architecting Security/03_06 - Challenge Case study risk.mp4
2.3 MB
03. Architecting Security/03_07 - Solution Case study risk.mp4
5.4 MB
03. Architecting Security/04_01 - Next steps.mp4
3.4 MB
Ex_Files_Cyber.zip
33.0 KB
Torrent Downloaded From Katcr.co - Kickasstorrents.txt
52 bytes
Similar Posts:
Category
Name
Uploaded
Other
Lynda - Foundations of Cybersecurity
Feb. 4, 2023, 12:02 p.m.
Other
Lynda - Cybersecurity Foundations
Feb. 3, 2023, 4:54 p.m.
Other
Lynda - Cybersecurity for IT Professionals
Feb. 3, 2023, 4:54 p.m.
Other
Lynda - Cybersecurity with Cloud Computing
Feb. 3, 2023, 4:54 p.m.