Modern Cloud Security - Shift-Left, Observability and Automated D...
- Category Other
- Type Tutorials
- Language English
- Total size 377.2 MB
- Uploaded By freecoursewb
- Downloads 143
- Last checked 8 hours ago
- Date uploaded 5 months ago
- Seeders 6
- Leechers 1
Infohash : 99E44578EC357C722A0E23AF3F31108C3A69897C
Modern Cloud Security: Shift-Left, Observability & Automated Defense
https://WebToolTip.com
Released 08/2025
With Laurentiu Gabriel Raducu
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Skill level: Intermediate | Genre: eLearning | Language: English + subtitle | Duration: 3h 35m 30s | Size: 377 MB
Learn about the key challenges of securing cloud infrastructures.
Course details
Cloud computing has changed the way organizations operate, but with its advantages come unique security challenges. This course provides a comprehensive guide to cloud security, equipping you with the knowledge and skills needed to safeguard cloud environments effectively. Explore key concepts such as threat modeling, compliance frameworks, and secure architecture design, along with hands-on strategies for mitigating risks and managing vulnerabilities. The course delves into tools and techniques for monitoring and incident response, empowering you to handle real-world security challenges with confidence.
Files:
[ WebToolTip.com ] Modern Cloud Security - Shift-Left, Observability and Automated Defense- Get Bonus Downloads Here.url (0.2 KB) ~Get Your Files Here ! 01 - Introduction
- 01 - Your complete guide to cloud-based cybersecurity.mp4 (2.7 MB)
- 02 - Fundamentals of cloud computing.mp4 (5.2 MB)
- 02 - Fundamentals of cloud computing.srt (7.2 KB)
- 03 - The cloud security landscape.mp4 (4.0 MB)
- 01 - Deep dive into cloud service models.mp4 (7.4 MB)
- 02 - IaaS Benefits and security considerations.mp4 (7.7 MB)
- 03 - PaaS Security implications.mp4 (7.4 MB)
- 04 - SaaS Managing security in SaaS applications.mp4 (7.6 MB)
- 05 - The shared responsibility model.mp4 (6.4 MB)
- 06 - Distinguishing responsibilities across service models.mp4 (8.6 MB)
- 07 - Real-world examples showing shared responsibility.mp4 (4.4 MB)
- 01 - IAM fundamentals.mp4 (5.8 MB)
- 01 - IAM fundamentals.srt (4.1 KB)
- 02 - Least privilege and need-to-know principles.mp4 (9.3 MB)
- 03 - Implementing IAM policies.mp4 (5.2 MB)
- 04 - Monitoring and auditing IAM.mp4 (7.2 MB)
- 05 - Responding to IAM incidents.mp4 (6.3 MB)
- 06 - Multi-factor authentication and conditional access.mp4 (5.9 MB)
- 01 - Data classification and governance.mp4 (2.2 MB)
- 01 - Data classification and governance.srt (2.9 KB)
- 02 - Establishing data governance policies.mp4 (7.2 MB)
- 03 - Compliance considerations for data handling.mp4 (6.4 MB)
- 04 - Encryption strategies.mp4 (6.5 MB)
- 05 - Encryption at rest Techniques and tools.mp4 (6.7 MB)
- 06 - Encryption in transit Securing data during transfer.mp4 (3.6 MB)
- 07 - Designing effective backup strategies.mp4 (5.1 MB)
- 08 - Disaster recovery planning in the cloud.mp4 (6.5 MB)
- 09 - DLP policies to prevent unauthorized data access.mp4 (5.6 MB)
- 10 - Monitoring and responding to DLP alerts.mp4 (5.6 MB)
- 01 - Configure virtual private clouds.mp4 (5.6 MB)
- 02 - Network segmentation and isolation techniques.mp4 (9.6 MB)
- 02 - Network segmentation and isolation techniques.srt (7.7 KB)
- 03 - Setting up security groups and firewall rules.mp4 (4.7 MB)
- 04 - Implement intrusion detection and prevention systems.mp4 (4.6 MB)
- 05 - Utilize security information and event management tools.mp4 (5.3 MB)
- 06 - Establishing VPNs and secure connections.mp4 (7.9 MB)
- 07 - Explore Direct Connect and ExpressRoute options.mp4 (5.5 MB)
- 08 - Secure hybrid cloud connectivity.mp4 (8.9 MB)
- 01 - Secure software development life cycle.mp4 (10.5 MB)
- 02 - DevSecOps principles.mp4 (7.9 MB)
- 03 - Shift left.mp4 (5.6 MB)
- 04 - Automate security in CICD pipelines.mp4 (8.3 MB)
- 05 - Serverless and API security.mp4 (6.5 MB)
- 06 - Protect APIs from common attacks.mp4 (6.2 MB)
- 07 - Implement API gateway security features.mp4 (5.2 MB)
- 01 - Cloud governance frameworks.mp4 (5.9 MB)
- 02 - Understand the role of governance in security.mp4 (6.8 MB)
- 03 - Monitor and enforce compliance.mp4 (5.5 MB)
- 04 - Data sovereignty and residency concerns.mp4 (6.0 MB)
- 05 - Understand contracts and service level agreements.mp4 (4.0 MB)
- 01 - Set up monitoring tools and dashboards.mp4 (8.1 MB)
- 02 - Analyze logs for security insights.mp4 (9.5 MB)
- 03 - Leverage security analytics.mp4 (9.2 MB)
- 03 - Leverage security analytics.srt (5.3 KB)
- 04 - Develop a cloud-specific incident response plan.mp4 (5.8 MB)
- 04 - Develop a cloud-specific incident response plan.srt (5.5 KB)
- 05 - Coordinate response efforts.mp4 (5.1 MB)
- 06 - Post-incident analysis and improvement.mp4 (4.8 MB)
- 01 - Role of AI in threat detection and response.mp4 (12.4 MB)
- 02 - Explore autonomous security systems.mp4 (5.4 MB)
- 03 - Potential risks of quantum computing to encryption.mp4 (8.5 MB)
- 03 - Potential risks of quantum computing to encryption.srt (8.2 KB)
- 04 - Preparing for post-quantum cryptography.mp4 (9.5 MB)
- 05 - Strategies for edge computing security.mp4 (5.1 MB)
- 01 - Overview of relevant certifications.mp4 (5.8 MB)
- 02 - Next steps.mp4 (641.7 KB)
- Bonus Resources.txt (0.1 KB)
There are currently no comments. Feel free to leave one :)
Code:
- udp://tracker.torrent.eu.org:451/announce
- udp://tracker.tiny-vps.com:6969/announce
- http://tracker.foreverpirates.co:80/announce
- udp://tracker.cyberia.is:6969/announce
- udp://exodus.desync.com:6969/announce
- udp://explodie.org:6969/announce
- udp://tracker.opentrackr.org:1337/announce
- udp://9.rarbg.to:2780/announce
- udp://tracker.internetwarriors.net:1337/announce
- udp://ipv4.tracker.harry.lu:80/announce
- udp://open.stealth.si:80/announce
- udp://9.rarbg.to:2900/announce
- udp://9.rarbg.me:2720/announce
- udp://opentor.org:2710/announce