BITCQ

CDR024

Size: 167.7 MB
Magnet link

Name Size
CDR024/01_welcome-to-mitigating-security-vulnerabilities-on-google-cloud-platform/01_welcome-to-the-course/01_01_welcome-and-getting-started-guide_instructions.html 2 KB
CDR024/01_welcome-to-mitigating-security-vulnerabilities-on-google-cloud-platform/02_how-to-use-qwiklabs/02_01_getting-started-with-google-cloud-platform-and-qwiklabs.en.srt 5 KB
CDR024/01_welcome-to-mitigating-security-vulnerabilities-on-google-cloud-platform/02_how-to-use-qwiklabs/02_01_getting-started-with-google-cloud-platform-and-qwiklabs.en.txt 3 KB
CDR024/01_welcome-to-mitigating-security-vulnerabilities-on-google-cloud-platform/02_how-to-use-qwiklabs/02_01_getting-started-with-google-cloud-platform-and-qwiklabs.mp4 5.6 MB
CDR024/02_securing-compute-engine/01_module-overview/01_01_module-6-overview.en.srt 1 KB
CDR024/02_securing-compute-engine/01_module-overview/01_01_module-6-overview.en.txt 915 B
CDR024/02_securing-compute-engine/01_module-overview/01_01_module-6-overview.mp4 2.3 MB
CDR024/02_securing-compute-engine/02_service-accounts-iam-roles-and-api-scopes/02_01_compute-engine-identity-and-api-access.en.srt 3 KB
CDR024/02_securing-compute-engine/02_service-accounts-iam-roles-and-api-scopes/02_01_compute-engine-identity-and-api-access.en.txt 2 KB
CDR024/02_securing-compute-engine/02_service-accounts-iam-roles-and-api-scopes/02_01_compute-engine-identity-and-api-access.mp4 2.2 MB
CDR024/02_securing-compute-engine/02_service-accounts-iam-roles-and-api-scopes/02_02_vm-and-api-scopes.en.srt 3 KB
CDR024/02_securing-compute-engine/02_service-accounts-iam-roles-and-api-scopes/02_02_vm-and-api-scopes.en.txt 2 KB
CDR024/02_securing-compute-engine/02_service-accounts-iam-roles-and-api-scopes/02_02_vm-and-api-scopes.mp4 4.7 MB
CDR024/02_securing-compute-engine/03_managing-vm-logins/03_01_connecting-to-virtual-machines.en.srt 8 KB
CDR024/02_securing-compute-engine/03_managing-vm-logins/03_01_connecting-to-virtual-machines.en.txt 5 KB
CDR024/02_securing-compute-engine/03_managing-vm-logins/03_01_connecting-to-virtual-machines.mp4 8.7 MB
CDR024/02_securing-compute-engine/04_organization-policy-controls/04_01_organization-policy-service.en.srt 2 KB
CDR024/02_securing-compute-engine/04_organization-policy-controls/04_01_organization-policy-service.en.txt 1 KB
CDR024/02_securing-compute-engine/04_organization-policy-controls/04_01_organization-policy-service.mp4 2.6 MB
CDR024/02_securing-compute-engine/04_organization-policy-controls/04_02_organization-policy-constraints.en.srt 2 KB
CDR024/02_securing-compute-engine/04_organization-policy-controls/04_02_organization-policy-constraints.en.txt 2 KB
CDR024/02_securing-compute-engine/04_organization-policy-controls/04_02_organization-policy-constraints.mp4 3.1 MB
CDR024/02_securing-compute-engine/05_compute-engine-best-practices/05_01_compute-engine-security.en.srt 5 KB
CDR024/02_securing-compute-engine/05_compute-engine-best-practices/05_01_compute-engine-security.en.txt 3 KB
CDR024/02_securing-compute-engine/05_compute-engine-best-practices/05_01_compute-engine-security.mp4 8.1 MB
CDR024/02_securing-compute-engine/06_encrypting-disks-with-csek/06_01_encryption-overview.en.srt 4 KB
CDR024/02_securing-compute-engine/06_encrypting-disks-with-csek/06_01_encryption-overview.en.txt 3 KB
CDR024/02_securing-compute-engine/06_encrypting-disks-with-csek/06_01_encryption-overview.mp4 5.6 MB
CDR024/02_securing-compute-engine/06_encrypting-disks-with-csek/06_02_customer-supplied-and-managed-keys.en.srt 3 KB
CDR024/02_securing-compute-engine/06_encrypting-disks-with-csek/06_02_customer-supplied-and-managed-keys.en.txt 2 KB
CDR024/02_securing-compute-engine/06_encrypting-disks-with-csek/06_02_customer-supplied-and-managed-keys.mp4 2.3 MB
CDR024/02_securing-compute-engine/07_module-review/07_01_module-6-review.en.srt 4 KB
CDR024/02_securing-compute-engine/07_module-review/07_01_module-6-review.en.txt 2 KB
CDR024/02_securing-compute-engine/07_module-review/07_01_module-6-review.mp4 3.6 MB
CDR024/03_securing-cloud-data/01_module-overview/01_01_module-7-overview.en.srt 2 KB
CDR024/03_securing-cloud-data/01_module-overview/01_01_module-7-overview.en.txt 1 KB
CDR024/03_securing-cloud-data/01_module-overview/01_01_module-7-overview.mp4 3 MB
CDR024/03_securing-cloud-data/02_cloud-storage-iam-permissions-and-acls/02_01_cloud-storage-permissions-and-roles.en.srt 3 KB
CDR024/03_securing-cloud-data/02_cloud-storage-iam-permissions-and-acls/02_01_cloud-storage-permissions-and-roles.en.txt 2 KB
CDR024/03_securing-cloud-data/02_cloud-storage-iam-permissions-and-acls/02_01_cloud-storage-permissions-and-roles.mp4 3.8 MB
CDR024/03_securing-cloud-data/03_auditing-cloud-data/03_01_auditing-storage-buckets.en.srt 2 KB
CDR024/03_securing-cloud-data/03_auditing-cloud-data/03_01_auditing-storage-buckets.en.txt 1 KB
CDR024/03_securing-cloud-data/03_auditing-cloud-data/03_01_auditing-storage-buckets.mp4 2.3 MB
CDR024/03_securing-cloud-data/04_signed-urls-and-policy-documents/04_01_signed-urls-and-signed-policy-documents.en.srt 5 KB
CDR024/03_securing-cloud-data/04_signed-urls-and-policy-documents/04_01_signed-urls-and-signed-policy-documents.en.txt 3 KB
CDR024/03_securing-cloud-data/04_signed-urls-and-policy-documents/04_01_signed-urls-and-signed-policy-documents.mp4 6.8 MB
CDR024/03_securing-cloud-data/05_encrypting-with-cmek-and-csek/05_01_encryption-csek-cmek-review.en.srt 3 KB
CDR024/03_securing-cloud-data/05_encrypting-with-cmek-and-csek/05_01_encryption-csek-cmek-review.en.txt 2 KB
CDR024/03_securing-cloud-data/05_encrypting-with-cmek-and-csek/05_01_encryption-csek-cmek-review.mp4 2.7 MB
CDR024/03_securing-cloud-data/06_bigquery-iam-roles-and-authorized-views/06_01_bigquery-iam-roles-and-authorized-views.en.srt 3 KB
CDR024/03_securing-cloud-data/06_bigquery-iam-roles-and-authorized-views/06_01_bigquery-iam-roles-and-authorized-views.en.txt 2 KB
CDR024/03_securing-cloud-data/06_bigquery-iam-roles-and-authorized-views/06_01_bigquery-iam-roles-and-authorized-views.mp4 3.1 MB
CDR024/03_securing-cloud-data/07_storage-best-practices/07_01_cloud-storage-best-practices.en.srt 3 KB
CDR024/03_securing-cloud-data/07_storage-best-practices/07_01_cloud-storage-best-practices.en.txt 2 KB
CDR024/03_securing-cloud-data/07_storage-best-practices/07_01_cloud-storage-best-practices.mp4 4.6 MB
CDR024/03_securing-cloud-data/07_storage-best-practices/07_02_big-query-storage-best-practices.en.srt 1 KB
CDR024/03_securing-cloud-data/07_storage-best-practices/07_02_big-query-storage-best-practices.en.txt 946 B
CDR024/03_securing-cloud-data/07_storage-best-practices/07_02_big-query-storage-best-practices.mp4 2.2 MB
CDR024/03_securing-cloud-data/08_module-review/08_01_module-7-review.en.srt 3 KB
CDR024/03_securing-cloud-data/08_module-review/08_01_module-7-review.en.txt 2 KB
CDR024/03_securing-cloud-data/08_module-review/08_01_module-7-review.mp4 3.1 MB
CDR024/04_protecting-against-distributed-denial-of-service-attacks-ddos/01_module-overview/01_01_module-8-overview.en.srt 1 KB
CDR024/04_protecting-against-distributed-denial-of-service-attacks-ddos/01_module-overview/01_01_module-8-overview.en.txt 669 B
CDR024/04_protecting-against-distributed-denial-of-service-attacks-ddos/01_module-overview/01_01_module-8-overview.mp4 1.5 MB
CDR024/04_protecting-against-distributed-denial-of-service-attacks-ddos/02_how-ddos-attacks-work/02_01_ddos-attack-overview.en.srt 2 KB
CDR024/04_protecting-against-distributed-denial-of-service-attacks-ddos/02_how-ddos-attacks-work/02_01_ddos-attack-overview.en.txt 1 KB
CDR024/04_protecting-against-distributed-denial-of-service-attacks-ddos/02_how-ddos-attacks-work/02_01_ddos-attack-overview.mp4 2.1 MB
CDR024/04_protecting-against-distributed-denial-of-service-attacks-ddos/03_gcp-mitigations/03_01_ddos-mitigation-and-prevention-on-gcp.en.srt 7 KB
CDR024/04_protecting-against-distributed-denial-of-service-attacks-ddos/03_gcp-mitigations/03_01_ddos-mitigation-and-prevention-on-gcp.en.txt 5 KB
CDR024/04_protecting-against-distributed-denial-of-service-attacks-ddos/03_gcp-mitigations/03_01_ddos-mitigation-and-prevention-on-gcp.mp4 7.7 MB
CDR024/04_protecting-against-distributed-denial-of-service-attacks-ddos/03_gcp-mitigations/03_02_using-cloud-armor.en.srt 2 KB
CDR024/04_protecting-against-distributed-denial-of-service-attacks-ddos/03_gcp-mitigations/03_02_using-cloud-armor.en.txt 1 KB
CDR024/04_protecting-against-distributed-denial-of-service-attacks-ddos/03_gcp-mitigations/03_02_using-cloud-armor.mp4 2.7 MB
CDR024/04_protecting-against-distributed-denial-of-service-attacks-ddos/04_types-of-complementary-partner-products/04_01_security-partner-products.en.srt 2 KB
CDR024/04_protecting-against-distributed-denial-of-service-attacks-ddos/04_types-of-complementary-partner-products/04_01_security-partner-products.en.txt 1 KB
CDR024/04_protecting-against-distributed-denial-of-service-attacks-ddos/04_types-of-complementary-partner-products/04_01_security-partner-products.mp4 1.7 MB
CDR024/04_protecting-against-distributed-denial-of-service-attacks-ddos/04_types-of-complementary-partner-products/04_02_infrastructure-data-protection-logging-and-compliance-partners.en.srt 2 KB
CDR024/04_protecting-against-distributed-denial-of-service-attacks-ddos/04_types-of-complementary-partner-products/04_02_infrastructure-data-protection-logging-and-compliance-partners.en.txt 1 KB
CDR024/04_protecting-against-distributed-denial-of-service-attacks-ddos/04_types-of-complementary-partner-products/04_02_infrastructure-data-protection-logging-and-compliance-partners.mp4 1.2 MB
CDR024/04_protecting-against-distributed-denial-of-service-attacks-ddos/05_module-review/05_01_module-8-review.en.srt 3 KB
CDR024/04_protecting-against-distributed-denial-of-service-attacks-ddos/05_module-review/05_01_module-8-review.en.txt 2 KB
CDR024/04_protecting-against-distributed-denial-of-service-attacks-ddos/05_module-review/05_01_module-8-review.mp4 2.6 MB
CDR024/05_application-security/01_module-overview/01_01_module-9-overview.en.srt 1 KB
CDR024/05_application-security/01_module-overview/01_01_module-9-overview.en.txt 804 B
CDR024/05_application-security/01_module-overview/01_01_module-9-overview.mp4 1.8 MB
CDR024/05_application-security/02_types-of-application-security-vulnerabilities/02_01_application-vulnerabilities.en.srt 5 KB
CDR024/05_application-security/02_types-of-application-security-vulnerabilities/02_01_application-vulnerabilities.en.txt 3 KB
CDR024/05_application-security/02_types-of-application-security-vulnerabilities/02_01_application-vulnerabilities.mp4 7.5 MB
CDR024/05_application-security/03_cloud-security-scanner/03_01_how-cloud-security-scanner-works.en.srt 4 KB
CDR024/05_application-security/03_cloud-security-scanner/03_01_how-cloud-security-scanner-works.en.txt 3 KB
CDR024/05_application-security/03_cloud-security-scanner/03_01_how-cloud-security-scanner-works.mp4 6.1 MB
CDR024/05_application-security/03_cloud-security-scanner/03_02_avoiding-unwanted-impact.en.srt 2 KB
CDR024/05_application-security/03_cloud-security-scanner/03_02_avoiding-unwanted-impact.en.txt 1 KB
CDR024/05_application-security/03_cloud-security-scanner/03_02_avoiding-unwanted-impact.mp4 3.4 MB
CDR024/05_application-security/04_threat-identity-and-oauth-phishing/04_01_types-of-phishing-attacks.en.srt 4 KB
CDR024/05_application-security/04_threat-identity-and-oauth-phishing/04_01_types-of-phishing-attacks.en.txt 3 KB
CDR024/05_application-security/04_threat-identity-and-oauth-phishing/04_01_types-of-phishing-attacks.mp4 6.2 MB
CDR024/05_application-security/05_cloud-identity-aware-proxy/05_01_cloud-identity-aware-proxy-cloud-iap.en.srt 2 KB
CDR024/05_application-security/05_cloud-identity-aware-proxy/05_01_cloud-identity-aware-proxy-cloud-iap.en.txt 2 KB
CDR024/05_application-security/05_cloud-identity-aware-proxy/05_01_cloud-identity-aware-proxy-cloud-iap.mp4 3.9 MB
CDR024/05_application-security/06_module-review/06_01_module-9-review.en.srt 4 KB
CDR024/05_application-security/06_module-review/06_01_module-9-review.en.txt 3 KB
CDR024/05_application-security/06_module-review/06_01_module-9-review.mp4 4 MB
CDR024/06_content-related-vulnerabilities/01_module-overview/01_01_module-10-overview.en.srt 1 KB
CDR024/06_content-related-vulnerabilities/01_module-overview/01_01_module-10-overview.en.txt 817 B
CDR024/06_content-related-vulnerabilities/01_module-overview/01_01_module-10-overview.mp4 1.7 MB
CDR024/06_content-related-vulnerabilities/02_threat-ransomware/02_01_what-is-ransomware.en.srt 1 KB
CDR024/06_content-related-vulnerabilities/02_threat-ransomware/02_01_what-is-ransomware.en.txt 839 B
CDR024/06_content-related-vulnerabilities/02_threat-ransomware/02_01_what-is-ransomware.mp4 2 MB
CDR024/06_content-related-vulnerabilities/03_ransomware-mitigations/03_01_mitigating-the-threat-of-ransomware.en.srt 5 KB
CDR024/06_content-related-vulnerabilities/03_ransomware-mitigations/03_01_mitigating-the-threat-of-ransomware.en.txt 3 KB
CDR024/06_content-related-vulnerabilities/03_ransomware-mitigations/03_01_mitigating-the-threat-of-ransomware.mp4 7.2 MB
CDR024/06_content-related-vulnerabilities/04_threats-data-misuse-privacy-violations-sensitive-content/04_01_misuse-of-data-and-content.en.srt 3 KB
CDR024/06_content-related-vulnerabilities/04_threats-data-misuse-privacy-violations-sensitive-content/04_01_misuse-of-data-and-content.en.txt 2 KB
CDR024/06_content-related-vulnerabilities/04_threats-data-misuse-privacy-violations-sensitive-content/04_01_misuse-of-data-and-content.mp4 3.9 MB
CDR024/06_content-related-vulnerabilities/05_content-related-mitigations/05_01_threat-mitigation-strategies-for-content.en.srt 4 KB
CDR024/06_content-related-vulnerabilities/05_content-related-mitigations/05_01_threat-mitigation-strategies-for-content.en.txt 2 KB
CDR024/06_content-related-vulnerabilities/05_content-related-mitigations/05_01_threat-mitigation-strategies-for-content.mp4 5 MB
CDR024/06_content-related-vulnerabilities/06_module-review/06_01_module-10-review.en.srt 3 KB
CDR024/06_content-related-vulnerabilities/06_module-review/06_01_module-10-review.en.txt 2 KB
CDR024/06_content-related-vulnerabilities/06_module-review/06_01_module-10-review.mp4 2.9 MB
CDR024/07_Resources/01_module-6-slides/01_01__Module_6-SecuringComputeEngine.pdf 3.5 MB
CDR024/07_Resources/01_module-6-slides/01_01__resources.html 1 KB
CDR024/07_Resources/02_module-7-slides/02_01__Module_7-SecuringCloudData.pdf 3.2 MB
CDR024/07_Resources/02_module-7-slides/02_01__resources.html 1 KB
CDR024/07_Resources/03_module-8-slides/03_01__Module_8-ProtectingAgainstDDOS.pdf 1.9 MB
CDR024/07_Resources/03_module-8-slides/03_01__resources.html 1 KB
CDR024/07_Resources/04_module-9-slides/04_01__Module_9-ApplicationSecurity.pdf 2 MB
CDR024/07_Resources/04_module-9-slides/04_01__resources.html 1 KB
CDR024/07_Resources/05_module-10-slides/05_01__Module_10-ContentRelatedVulnerabilities.pdf 1.5 MB
CDR024/07_Resources/05_module-10-slides/05_01__resources.html 1 KB
Name
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.open-internet.nl:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://exodus.desync.com:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2710/announce
udp://9.rarbg.me:2710/announce
http://tracker3.itzmx.com:6961/announce
http://tracker1.itzmx.com:8080/announce
udp://thetracker.org:80/announce
udp://open.demonii.si:1337/announce
udp://bt.xxx-tracker.com:2710/announce
udp://tracker.torrent.eu.org:451/announce
udp://tracker.cyberia.is:6969/announce
udp://tracker.tiny-vps.com:6969/announce
udp://denis.stalker.upeer.me:6969/announce
http://open.acgnxtracker.com:80/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://tracker.zer0day.to:1337/announce
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://mgtracker.org:6969/announce
udp://explodie.org:6969/announce
Name Size Peers
CDR024 Video 167.7 MB 2

Loading...