TorBT - Torrents and Magnet Links Search Engine

[ FreeCourseWeb.com ] Udemy - Google Cloud Security Best Practices

File Name
Size
Get Bonus Downloads Here.url
183 B
~Get Your Files Here !/1 - Introduction/1 -Shared Responsibility Model in Google Cloud Platform (GCP).mp4
19 MB
~Get Your Files Here !/1 - Introduction/2 -Overview of GCP Security Services.mp4
29 MB
~Get Your Files Here !/1 - Introduction/3 -Security Foundations Identity, Network, Data, and Operations.mp4
28 MB
~Get Your Files Here !/1 - Introduction/4 -Key principles Least privilege, defense in depth, and zero trust.mp4
25 MB
~Get Your Files Here !/10 - Enable VPC Flow Logs for Subnets/1 -Enable VPC Flow Logs for Subnets.mp4
34 MB
~Get Your Files Here !/10 - Enable VPC Flow Logs for Subnets/2 - Implementation Steps.html
1.9 kB
~Get Your Files Here !/11 - Block Project-Wide SSH Keys/1 -Block Project-Wide SSH Keys.mp4
27 MB
~Get Your Files Here !/11 - Block Project-Wide SSH Keys/2 - Implementation Steps.html
2.0 kB
~Get Your Files Here !/12 - Disabling Serial Port Access for VM Instances/1 -Disabling Serial Port Access for VM Instances.mp4
24 MB
~Get Your Files Here !/12 - Disabling Serial Port Access for VM Instances/2 - Implementation Steps.html
2.2 kB
~Get Your Files Here !/13 - Avoid Using Default Service Accounts/1 -Avoid Using Default Service Accounts.mp4
26 MB
~Get Your Files Here !/13 - Avoid Using Default Service Accounts/2 - Implementation Steps.html
2.5 kB
~Get Your Files Here !/14 - Limiting API Access for Service Accounts/1 -Limiting API Access for Service Accounts.mp4
30 MB
~Get Your Files Here !/14 - Limiting API Access for Service Accounts/2 - Implementation Steps.html
2.4 kB
~Get Your Files Here !/15 - Enabling OS Login for VM Instances/1 -Enabling OS Login for VM Instances.mp4
28 MB
~Get Your Files Here !/15 - Enabling OS Login for VM Instances/2 - Implementation Steps.html
1.9 kB
~Get Your Files Here !/16 - Enabling Cloud Audit Logging/1 -Enabling Cloud Audit Logging.mp4
27 MB
~Get Your Files Here !/16 - Enabling Cloud Audit Logging/2 - Implementation Steps.html
2.6 kB
~Get Your Files Here !/17 - Configuring Log Sinks for All Log Entries/1 -Configuring Log Sinks for All Log Entries.mp4
29 MB
~Get Your Files Here !/17 - Configuring Log Sinks for All Log Entries/2 - Implementation Steps.html
2.3 kB
~Get Your Files Here !/18 - Setting Retention Policies on Log Buckets/1 -Setting Retention Policies on Log Buckets.mp4
24 MB
~Get Your Files Here !/18 - Setting Retention Policies on Log Buckets/2 - Implementation Steps.html
1.8 kB
~Get Your Files Here !/19 - Enforcing HTTPS for App Engine Applications/1 -Enforcing HTTPS for App Engine Applications.mp4
28 MB
~Get Your Files Here !/19 - Enforcing HTTPS for App Engine Applications/2 - Implementation Steps.html
2.2 kB
~Get Your Files Here !/2 - Ensure that IAM policies do not grant access to personal email accounts/1 -Ensure that IAM policies do not grant access to personal email accounts.mp4
20 MB
~Get Your Files Here !/2 - Ensure that IAM policies do not grant access to personal email accounts/2 - Implementation Steps.html
2.3 kB
~Get Your Files Here !/20 - Require SSL for Cloud SQL Connections/1 -Require SSL for Cloud SQL Connections.mp4
23 MB
~Get Your Files Here !/20 - Require SSL for Cloud SQL Connections/2 - Implementation Steps.html
2.3 kB
~Get Your Files Here !/21 - Restricting Public IP Access to Cloud SQL Instances/1 -Restricting Public IP Access to Cloud SQL Instances.mp4
26 MB
~Get Your Files Here !/21 - Restricting Public IP Access to Cloud SQL Instances/2 - Implementation Steps.html
2.6 kB
~Get Your Files Here !/22 - Enabling Automated Backups for Cloud SQL/1 -Enabling Automated Backups for Cloud SQL.mp4
23 MB
~Get Your Files Here !/22 - Enabling Automated Backups for Cloud SQL/2 - Implementation Steps.html
2.8 kB
~Get Your Files Here !/23 - Preventing Public Access to BigQuery Datasets/1 -Preventing Public Access to BigQuery Datasets.mp4
27 MB
~Get Your Files Here !/23 - Preventing Public Access to BigQuery Datasets/2 - Implementation Steps.html
2.4 kB
~Get Your Files Here !/24 - Disabling IP Forwarding on VM Instances/1 -Disabling IP Forwarding on VM Instances.mp4
20 MB
~Get Your Files Here !/24 - Disabling IP Forwarding on VM Instances/2 - Implementation Steps.html
2.2 kB
~Get Your Files Here !/3 - Enable Multi-Factor Authentication (MFA) for All User Accounts/1 -Enable Multi-Factor Authentication (MFA) for All User Accounts.mp4
19 MB
~Get Your Files Here !/3 - Enable Multi-Factor Authentication (MFA) for All User Accounts/2 - Implementation Steps.html
4.0 kB
~Get Your Files Here !/4 - Enforcing Security Key Usage for Admin Accounts/1 -Enforcing Security Key Usage for Admin Accounts.mp4
16 MB
~Get Your Files Here !/4 - Enforcing Security Key Usage for Admin Accounts/2 - Implementation Steps.html
7.9 kB
~Get Your Files Here !/5 - Preventing the Use of User-Managed Service Account Keys/1 -Preventing the Use of User-Managed Service Account Keys.mp4
15 MB
~Get Your Files Here !/5 - Preventing the Use of User-Managed Service Account Keys/2 - Implementation Steps.html
3.3 kB
~Get Your Files Here !/6 - Restricting Service Account Permissions/1 -Restricting Service Account Permissions.mp4
11 MB
~Get Your Files Here !/6 - Restricting Service Account Permissions/2 - Implementation Steps.html
4.7 kB
~Get Your Files Here !/7 - Rotate KMS Encryption Keys Regularly/1 -Rotate KMS Encryption Keys Regularly.mp4
12 MB
~Get Your Files Here !/7 - Rotate KMS Encryption Keys Regularly/2 - Implementation Steps.html
2.6 kB
~Get Your Files Here !/8 - Preventing Public Access to Cloud Storage Buckets/1 -Preventing Public Access to Cloud Storage Buckets.mp4
13 MB
~Get Your Files Here !/8 - Preventing Public Access to Cloud Storage Buckets/2 - Implementation Steps.html
3.7 kB
~Get Your Files Here !/9 - Enable Uniform Bucket-Level Access/1 -Enable Uniform Bucket-Level Access.mp4
19 MB
~Get Your Files Here !/9 - Enable Uniform Bucket-Level Access/2 - Implementation Steps.html
4.4 kB
~Get Your Files Here !/Bonus Resources.txt
70 B