Linkedin - CCSP Cert Prep - 5 Cloud Security Operations (2022)

seeders: 6
leechers: 4
updated:

Download Fast Safe Anonymous
movies, software, shows...
  • Downloads: 45
  • Language: English

Files

[ FreeCourseWeb.com ] Linkedin - CCSP Cert Prep - 5 Cloud Security Operations (2022)
  • Get Bonus Downloads Here.url (0.2 KB)
  • ~Get Your Files Here ! 01 - Introduction
    • 01 - Cloud security operations.mp4 (20.7 MB)
    • 01 - Cloud security operations.srt (2.4 KB)
    • 02 - What you need to know.mp4 (1.2 MB)
    • 02 - What you need to know.srt (1.2 KB)
    • 03 - Study resources.mp4 (6.9 MB)
    • 03 - Study resources.srt (3.2 KB)
    02 - 1. Physical and Logical Infrastructure
    • 01 - Hardware security configuration.mp4 (16.5 MB)
    • 01 - Hardware security configuration.srt (6.9 KB)
    • 02 - Hardware security modules.mp4 (10.6 MB)
    • 02 - Hardware security modules.srt (5.2 KB)
    • 03 - Virtualization security configuration.mp4 (12.5 MB)
    • 03 - Virtualization security configuration.srt (5.7 KB)
    03 - 2. Secure Infrastructure Operations
    • 01 - Securing local and remote access.mp4 (14.2 MB)
    • 01 - Securing local and remote access.srt (9.2 KB)
    • 02 - Security zones.mp4 (11.4 MB)
    • 02 - Security zones.srt (7.1 KB)
    • 03 - Building lines of communication.mp4 (12.0 MB)
    • 03 - Building lines of communication.srt (5.2 KB)
    04 - 3. Network Operations
    • 01 - TCPIP networking.mp4 (13.9 MB)
    • 01 - TCPIP networking.srt (8.8 KB)
    • 02 - IP addressing and DHCP.mp4 (10.7 MB)
    • 02 - IP addressing and DHCP.srt (6.7 KB)
    • 03 - DNS.mp4 (12.4 MB)
    • 03 - DNS.srt (7.4 KB)
    • 04 - Network ports.mp4 (11.0 MB)
    • 04 - Network ports.srt (5.6 KB)
    • 05 - ICMP.mp4 (10.7 MB)
    • 05 - ICMP.srt (6.1 KB)
    • 06 - Public and private addressing.mp4 (16.9 MB)
    • 06 - Public and private addressing.srt (10.6 KB)
    • 07 - Subnetting.mp4 (7.0 MB)
    • 07 - Subnetting.srt (5.1 KB)
    • 08 - VLANs and network segmentation.mp4 (3.7 MB)
    • 08 - VLANs and network segmentation.srt (2.9 KB)
    05 - 4. Network Security
    • 01 - Firewalls.mp4 (18.3 MB)
    • 01 - Firewalls.srt (11.9 KB)
    • 02 - Network security groups.mp4 (8.8 MB)
    • 02 - Network security groups.srt (5.3 KB)
    • 03 - VPNs and VPN concentrators.mp4 (12.9 MB)
    • 03 - VPNs and VPN concentrators.srt (8.3 KB)
    • 04 - Network intrusion detection and prevention.mp4 (14.6 MB)
    • 04 - Network intrusion detection and prevention.srt (9.3 KB)
    • 05 - Zero trust networking.mp4 (15.1 MB)
    • 05 - Zero trust networking.srt (7.9 KB)
    06 - 5. Security Baselines and Standards
    • 01 - Developing security baselines.mp4 (11.8 MB)
    • 01 - Developing security baselines.srt (7.4 KB)
    • 02 - Leveraging industry standards.mp4 (27.6 MB)
    • 02 - Leveraging industry standards.srt (6.5 KB)
    • 03 - Customizing security standards.mp4 (7.0 MB)
    • 03 - Customizing security standards.srt (3.6 KB)
    • 04 - Host availability.mp4 (11.0 MB)
    • 04 - Host availability.srt (5.7 KB)
    07 - 6. Monitoring
    • 01 - Performance and capacity monitoring.mp4 (13.5 MB)
    • 01 - Performance and capacity monitoring.srt (5.9 KB)
    • 02 - Managing an SOC.mp4 (7.7 MB)
    • 02 - Managing an SOC.srt (3.2 KB)
    • 03 - The ITIL model.mp4 (7.9 MB)
    • 03 - The ITIL model.srt (4.8 KB)
    08 - 7. Threat and Vulnerability Management
    • 01 - What is vulnerability management.mp4 (14.6 MB)
    • 01 - What is vulnerability management.srt (9.4 KB)
    • 02 - Analyzing scan reports.mp4 (11.8 MB)
    • 02 - Analyzing scan reports.srt (10.1 KB)
    • 03 - Correlating scan results.mp4 (6.6 MB)
    • 03 - Correlating scan results.srt (4.4 KB)
    • 04 - Penetration testing.mp4 (15.3 MB)
    • 04 - Penetration testing.srt (8.7 KB)
    • 05 - Deception technologies.mp4 (8.9 MB)
    • 05 - Deception technologies.srt (5.5 KB)
    09 - 8. Incident Management
    • 01 - Building an incident response program.mp4 (16.0 MB)
    • 01 - Building an incident response program.srt (8.2 KB)
    • 02 - Creating an incident response team.mp4 (10.8 MB)
    • 02 - Creating an incident response team.srt (4.4 KB)
    • 03 - Incident communications plan.mp4 (12.2 MB)
    • 03 - Incident communications plan.srt (5.3 KB)
    • 04 - Incident identification.mp4 (16.7 MB)
    • 04 - Incident identification.srt (8.4 KB)
    • 05 - Escalation and notification.mp4 (7.0 MB)
    • 05 - Escalation and notification.srt (4.7 KB)
    • 06 - Mitigation.mp4 (6.8 MB)
    • 06 - Mitigation.srt (4.5 KB)
    • 07 - Containment techniques.mp4 (7.4 MB)
    • 07 - Containment techniques.srt (6.0 KB)
    • 08 - Incident eradication and recovery.mp4 (17.5 MB)
    • 08 - Incident eradication and recovery.srt (10.9 KB)
    • 09 - Validation.mp4 (5.3 MB)
    • 09 - Validation.srt (5.3 KB)
    • 10 - Post-incident activities.mp4 (15.0 MB)
    • 10 - Post-incident activities.srt (7.5 KB)
    • 11 - Incident response exercises.mp4 (7.9 MB)
    • 11 - Incident response exercises.srt (3.3 KB)
    10 - 9. Investigations and Forensics
    • 01 - Conducting investigations.mp4 (14.8 MB)
    • 01 - Conducting investigations.srt (7.4 KB)
    • 02 - Evidence types.mp4 (8.9 MB)
    • 02 - Evidence types.srt (6.8 KB)
    • 03 - Digital forensics.mp4 (10.3 MB)
    • 03 - Digital forensics.srt (6.6 KB)
    • 04 - Chain of custody.mp4 (6.7 MB)
    • 04 - Chain of custody.srt (3.7 KB)
    11 - What's Next
    • 01 - Continuing your CCSP certification journey.mp4 (1.4 MB)
    • 01 - Continuing your CCSP certification journey.srt (1.1 KB)
    • Bonus Resources.txt (0.4 KB)

Description

CCSP Cert Prep: 5 Cloud Security Operations (2022)



https://FreeCourseWeb.com

Released 05/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Skill Level: Intermediate | Genre: eLearning | Language: English + srt | Duration: 2h 46m | Size: 571 MB

The omnipresence of cloud computing in the business world has created a high demand for cybersecurity professionals with cloud expertise. Earning the Certified Cloud Security Professional (CCSP) certification nstrates that you have the skills needed to help businesses secure information and systems that used to live on site. In this course, learn how security operations function in the world of cloud computing as you prepare for the Certified Cloud Security Professional (CCSP) exam. This course covers the fifth domain of that exam: Cloud Security Operations. Mike Chapple nstrates how to build, operate, and manage the physical and logical infrastructure required to support cloud computing. Plus, learn about digital forensics and the incident response process.



Download torrent
570.9 MB
seeders:6
leechers:4
Linkedin - CCSP Cert Prep - 5 Cloud Security Operations (2022)


Trackers

tracker name
udp://tracker.torrent.eu.org:451/announce
udp://tracker.tiny-vps.com:6969/announce
http://tracker.foreverpirates.co:80/announce
udp://tracker.cyberia.is:6969/announce
udp://exodus.desync.com:6969/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2780/announce
udp://tracker.internetwarriors.net:1337/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://open.stealth.si:80/announce
udp://9.rarbg.to:2900/announce
udp://9.rarbg.me:2720/announce
udp://opentor.org:2710/announce
µTorrent compatible trackers list

Download torrent
570.9 MB
seeders:6
leechers:4
Linkedin - CCSP Cert Prep - 5 Cloud Security Operations (2022)


Torrent hash: CCB5AC406F5C92DDCD1EE245E8056E6F05845C79