[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/00.Cloud-Computing-Concepts/00.Overview.mp4 |
4.7 MB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/00.Cloud-Computing-Concepts/00.Overview.mp4.srt |
3 KB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/00.Cloud-Computing-Concepts/01.From-On-premise-to-Cloud.mp4 |
58.5 MB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/00.Cloud-Computing-Concepts/01.From-On-premise-to-Cloud.mp4.srt |
7 KB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/00.Cloud-Computing-Concepts/02.The-Characteristics-of-a-Cloud-Service.mp4 |
9.3 MB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/00.Cloud-Computing-Concepts/02.The-Characteristics-of-a-Cloud-Service.mp4.srt |
7 KB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/00.Cloud-Computing-Concepts/03.Understanding-IaaS-PaaS-and-SaaS.mp4 |
13.1 MB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/00.Cloud-Computing-Concepts/03.Understanding-IaaS-PaaS-and-SaaS.mp4.srt |
7 KB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/00.Cloud-Computing-Concepts/04.Cloud-Deployment-Models.mp4 |
5.7 MB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/00.Cloud-Computing-Concepts/04.Cloud-Deployment-Models.mp4.srt |
6 KB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/00.Cloud-Computing-Concepts/05.The-NIST-Cloud-Computing-Reference-Architecture.mp4 |
7.9 MB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/00.Cloud-Computing-Concepts/05.The-NIST-Cloud-Computing-Reference-Architecture.mp4.srt |
4 KB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/00.Cloud-Computing-Concepts/06.The-Promise-of-the-Cloud.mp4 |
3.6 MB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/00.Cloud-Computing-Concepts/06.The-Promise-of-the-Cloud.mp4.srt |
4 KB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/00.Cloud-Computing-Concepts/07.Is-the-Cloud-Secure.mp4 |
6.7 MB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/00.Cloud-Computing-Concepts/07.Is-the-Cloud-Secure.mp4.srt |
5 KB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/00.Cloud-Computing-Concepts/08.Summary.mp4 |
3.4 MB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/00.Cloud-Computing-Concepts/08.Summary.mp4.srt |
2 KB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/00.Cloud-Computing-Concepts/clips-info.json |
2 KB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/00.Cloud-Computing-Concepts/module-info.json |
293 B |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/01.Organizational-Security-Considerations/00.Overview.mp4 |
3.7 MB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/01.Organizational-Security-Considerations/00.Overview.mp4.srt |
3 KB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/01.Organizational-Security-Considerations/01.Everything-Old-Is-New-Again.mp4 |
3.1 MB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/01.Organizational-Security-Considerations/01.Everything-Old-Is-New-Again.mp4.srt |
2 KB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/01.Organizational-Security-Considerations/02.Data-Sovereignty.mp4 |
27.6 MB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/01.Organizational-Security-Considerations/02.Data-Sovereignty.mp4.srt |
11 KB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/01.Organizational-Security-Considerations/03.Compliance-Assessments.mp4 |
19.3 MB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/01.Organizational-Security-Considerations/03.Compliance-Assessments.mp4.srt |
8 KB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/01.Organizational-Security-Considerations/04.Client-driven-Penetration-Tests.mp4 |
12.6 MB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/01.Organizational-Security-Considerations/04.Client-driven-Penetration-Tests.mp4.srt |
3 KB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/01.Organizational-Security-Considerations/05.Commercial-Considerations.mp4 |
2.7 MB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/01.Organizational-Security-Considerations/05.Commercial-Considerations.mp4.srt |
3 KB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/01.Organizational-Security-Considerations/06.Shadow-IT.mp4 |
7.8 MB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/01.Organizational-Security-Considerations/06.Shadow-IT.mp4.srt |
6 KB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/01.Organizational-Security-Considerations/07.Summary.mp4 |
4.9 MB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/01.Organizational-Security-Considerations/07.Summary.mp4.srt |
4 KB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/01.Organizational-Security-Considerations/clips-info.json |
2 KB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/01.Organizational-Security-Considerations/module-info.json |
321 B |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/02.Cloud-Computing-Risks/00.Overview.mp4 |
3.3 MB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/02.Cloud-Computing-Risks/00.Overview.mp4.srt |
3 KB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/02.Cloud-Computing-Risks/01.Compromise-of-Administration-Facilities.mp4 |
26.3 MB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/02.Cloud-Computing-Risks/01.Compromise-of-Administration-Facilities.mp4.srt |
12 KB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/02.Cloud-Computing-Risks/02.Service-Hijacking-via-Social-Engineering.mp4 |
12.6 MB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/02.Cloud-Computing-Risks/02.Service-Hijacking-via-Social-Engineering.mp4.srt |
5 KB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/02.Cloud-Computing-Risks/03.Economic-Denial-of-Sustainability-EDoS.mp4 |
15.7 MB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/02.Cloud-Computing-Risks/03.Economic-Denial-of-Sustainability-EDoS.mp4.srt |
7 KB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/02.Cloud-Computing-Risks/04.Hypervisor-Breakouts.mp4 |
13.3 MB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/02.Cloud-Computing-Risks/04.Hypervisor-Breakouts.mp4.srt |
6 KB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/02.Cloud-Computing-Risks/05.Malicious-Cloud-Uses.mp4 |
9.5 MB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/02.Cloud-Computing-Risks/05.Malicious-Cloud-Uses.mp4.srt |
5 KB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/02.Cloud-Computing-Risks/06.Other-Potential-Risks.mp4 |
24.5 MB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/02.Cloud-Computing-Risks/06.Other-Potential-Risks.mp4.srt |
7 KB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/02.Cloud-Computing-Risks/07.Summary.mp4 |
2.8 MB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/02.Cloud-Computing-Risks/07.Summary.mp4.srt |
2 KB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/02.Cloud-Computing-Risks/clips-info.json |
2 KB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/02.Cloud-Computing-Risks/module-info.json |
287 B |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/03.Cloud-Computing-Security-Strengths/00.Overview.mp4 |
3.9 MB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/03.Cloud-Computing-Security-Strengths/00.Overview.mp4.srt |
3 KB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/03.Cloud-Computing-Security-Strengths/01.DDoS-Prevention.mp4 |
26.4 MB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/03.Cloud-Computing-Security-Strengths/01.DDoS-Prevention.mp4.srt |
10 KB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/03.Cloud-Computing-Security-Strengths/02.Server-Administration-as-a-Service.mp4 |
27.5 MB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/03.Cloud-Computing-Security-Strengths/02.Server-Administration-as-a-Service.mp4.srt |
8 KB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/03.Cloud-Computing-Security-Strengths/03.Account-Management-as-a-Service.mp4 |
12.1 MB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/03.Cloud-Computing-Security-Strengths/03.Account-Management-as-a-Service.mp4.srt |
7 KB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/03.Cloud-Computing-Security-Strengths/04.VNet-on-Demand.mp4 |
4.6 MB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/03.Cloud-Computing-Security-Strengths/04.VNet-on-Demand.mp4.srt |
2 KB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/03.Cloud-Computing-Security-Strengths/05.Key-Vaults.mp4 |
8.5 MB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/03.Cloud-Computing-Security-Strengths/05.Key-Vaults.mp4.srt |
5 KB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/03.Cloud-Computing-Security-Strengths/06.Auditability.mp4 |
12.5 MB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/03.Cloud-Computing-Security-Strengths/06.Auditability.mp4.srt |
4 KB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/03.Cloud-Computing-Security-Strengths/07.Summary.mp4 |
4.9 MB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/03.Cloud-Computing-Security-Strengths/07.Summary.mp4.srt |
3 KB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/03.Cloud-Computing-Security-Strengths/clips-info.json |
2 KB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/03.Cloud-Computing-Security-Strengths/module-info.json |
313 B |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/04.Hardening-the-Cloud/00.Overview.mp4 |
3.2 MB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/04.Hardening-the-Cloud/00.Overview.mp4.srt |
2 KB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/04.Hardening-the-Cloud/01.Securing-the-Administration-Portal.mp4 |
15.5 MB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/04.Hardening-the-Cloud/01.Securing-the-Administration-Portal.mp4.srt |
7 KB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/04.Hardening-the-Cloud/02.Hardening-the-Configuration.mp4 |
15.3 MB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/04.Hardening-the-Cloud/02.Hardening-the-Configuration.mp4.srt |
8 KB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/04.Hardening-the-Cloud/03.Data-Replication-and-Redundancy.mp4 |
8.2 MB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/04.Hardening-the-Cloud/03.Data-Replication-and-Redundancy.mp4.srt |
4 KB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/04.Hardening-the-Cloud/04.Securing-the-Transport-Layer.mp4 |
7 MB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/04.Hardening-the-Cloud/04.Securing-the-Transport-Layer.mp4.srt |
3 KB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/04.Hardening-the-Cloud/05.SQL-Injection-Alerts-in-Azure.mp4 |
13.3 MB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/04.Hardening-the-Cloud/05.SQL-Injection-Alerts-in-Azure.mp4.srt |
5 KB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/04.Hardening-the-Cloud/06.Security-as-a-Service.mp4 |
15.2 MB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/04.Hardening-the-Cloud/06.Security-as-a-Service.mp4.srt |
5 KB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/04.Hardening-the-Cloud/07.Summary.mp4 |
2.7 MB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/04.Hardening-the-Cloud/07.Summary.mp4.srt |
2 KB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/04.Hardening-the-Cloud/clips-info.json |
2 KB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/04.Hardening-the-Cloud/module-info.json |
283 B |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/course-info.json |
2 KB |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/[FreeCoursesOnline.Us].txt |
138 B |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/[FreeCoursesOnline.Us].url |
123 B |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/[FreeTutorials.Us].txt |
75 B |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/[FreeTutorials.Us].url |
119 B |
[FreeCoursesOnline.Us] ethical-hacking-cloud-computing/image.jpg |
297 KB |