BT种子基本信息
- 种子哈希:2dd6944f02dbf004b9ea3d74e3a76251874d016d
- 文档大小:1.3 GB
- 文档个数:106个文档
- 下载次数:221次
- 下载速度:极快
- 收录时间:2024-02-14
- 最近下载:2025-06-14
文档列表
7. Networking/6. Security Center.mp4 60.8 MB
1. Course Introduction/1. An Important Note About A Cloud Guru and Linux Academy Courses.mp4 54.2 MB
8. Compute/2. Hardware Security Module.mp4 51.3 MB
3. Transparency/2. Managing Data Location in Azure Services.mp4 48.6 MB
8. Compute/3. SQL VM TDE.mp4 48.4 MB
8. Compute/6. Security Policy and Management and Reporting.mp4 44.4 MB
5. Operations/7. Conclusion.mp4 40.4 MB
4. Identity and Access Management/1. Secure Identity.mp4 37.3 MB
6. Storage/1. Shared Access Signature.mp4 37.2 MB
2. Security in the Cloud/2. Shared Responsibilities.mp4 37.0 MB
6. Storage/7. Configure Application Level Rules within Azure Firewall/2. Lab Solution.mp4 34.5 MB
9. Secure Platform/1. Security Development Cycle and Internal Audits.mp4 32.2 MB
6. Storage/5. Enabling Browser-Based Clients Using CORS.mp4 32.1 MB
5. Operations/3. Azure Monitor.mp4 31.8 MB
3. Transparency/1. Securing Customer Data in Azure Services.mp4 30.7 MB
3. Transparency/4. Review Certification for Azure Services, Transparency Hub.mp4 29.4 MB
5. Operations/5. Azure Advisor.mp4 28.8 MB
4. Identity and Access Management/2. Secure Apps and Data.mp4 28.8 MB
7. Networking/2. Network Security Groups (NSG).mp4 27.8 MB
4. Identity and Access Management/3. Role-Based Access Control (RBAC).mp4 26.8 MB
7. Networking/3. Route Control and Forced Tunneling.mp4 26.5 MB
5. Operations/1. Security and the Audit Dashboard.mp4 26.4 MB
2. Security in the Cloud/1. Introduction into Azure Security.mp4 24.8 MB
4. Identity and Access Management/4. Conclusion.mp4 24.4 MB
8. Compute/1. Antimalware and Antivirus.mp4 24.1 MB
6. Storage/4. Storage Analytics.mp4 23.7 MB
7. Networking/4. Application Gateway.mp4 23.6 MB
3. Transparency/3. Who Can Access Your Data and on What Terms?.mp4 23.4 MB
7. Networking/1. Network Layer Controls.mp4 22.5 MB
7. Networking/7. Conclusion.mp4 21.8 MB
5. Operations/4. Azure Monitor Logs.mp4 21.6 MB
10. Wrapping Up/1. Additional Resources.mp4 21.3 MB
1. Course Introduction/2. What to Expect.mp4 18.5 MB
5. Operations/6. Azure Security Center.mp4 17.7 MB
3. Transparency/5. Conclusion.mp4 17.7 MB
8. Compute/7. Conclusion.mp4 17.5 MB
6. Storage/6. Conclusion.mp4 16.5 MB
9. Secure Platform/5. Security Incident Response and Shared Responsibility.mp4 15.5 MB
9. Secure Platform/4. State of the Art Data Centers, Physical Security, and Secure Networks.mp4 15.2 MB
6. Storage/3. Encryption at Rest.mp4 15.0 MB
9. Secure Platform/6. Conclusion.mp4 13.9 MB
7. Networking/5. Web Application Firewall.mp4 13.8 MB
6. Storage/2. Encryption in Transit.mp4 13.5 MB
7. Networking/8. Creating Service Endpoints Between Virtual Machines and Blob Storage/2. Lab Solution.mp4 13.2 MB
9. Secure Platform/3. Penetration Testing, Intrusion Detection, DDoS, Audits, and Logging.mp4 12.5 MB
8. Compute/4. VM Disk Encryption.mp4 12.1 MB
8. Compute/5. Patch Updates.mp4 12.0 MB
5. Operations/2. Application Insights.mp4 11.2 MB
6. Storage/7. Configure Application Level Rules within Azure Firewall/1. Lab Introduction.mp4 11.0 MB
10. Wrapping Up/2. What's Next?.mp4 10.8 MB
9. Secure Platform/2. Mandatory Security Training and Background Checks.mp4 7.9 MB
7. Networking/8. Creating Service Endpoints Between Virtual Machines and Blob Storage/1. Lab Introduction.mp4 6.7 MB
6. Storage/7. Configure Application Level Rules within Azure Firewall/Section Lab_ 447_ Serverless Computing with Azure Functions - 1.2 Configure Application Level Rules within Azure Firewall.png 185.9 kB
7. Networking/8. Creating Service Endpoints Between Virtual Machines and Blob Storage/Section Lab_ 447_ Serverless Computing with Azure Functions - 1.3 Creating Service Endpoints Between Virtual Machines and Blob Storage.png 163.8 kB
7. Networking/6. Security Center.vtt 33.8 kB
8. Compute/2. Hardware Security Module.vtt 27.1 kB
4. Identity and Access Management/1. Secure Identity.vtt 22.8 kB
2. Security in the Cloud/2. Shared Responsibilities.vtt 21.8 kB
9. Secure Platform/1. Security Development Cycle and Internal Audits.vtt 19.3 kB
6. Storage/1. Shared Access Signature.vtt 19.0 kB
4. Identity and Access Management/2. Secure Apps and Data.vtt 16.8 kB
3. Transparency/1. Securing Customer Data in Azure Services.vtt 16.8 kB
7. Networking/2. Network Security Groups (NSG).vtt 16.4 kB
8. Compute/3. SQL VM TDE.vtt 16.0 kB
7. Networking/3. Route Control and Forced Tunneling.vtt 15.9 kB
3. Transparency/2. Managing Data Location in Azure Services.vtt 15.8 kB
4. Identity and Access Management/3. Role-Based Access Control (RBAC).vtt 15.7 kB
6. Storage/5. Enabling Browser-Based Clients Using CORS.vtt 15.5 kB
3. Transparency/4. Review Certification for Azure Services, Transparency Hub.vtt 15.3 kB
8. Compute/1. Antimalware and Antivirus.vtt 14.9 kB
8. Compute/6. Security Policy and Management and Reporting.vtt 14.6 kB
5. Operations/1. Security and the Audit Dashboard.vtt 14.3 kB
5. Operations/5. Azure Advisor.vtt 13.9 kB
4. Identity and Access Management/4. Conclusion.vtt 13.8 kB
5. Operations/7. Conclusion.vtt 13.1 kB
7. Networking/1. Network Layer Controls.vtt 12.4 kB
3. Transparency/3. Who Can Access Your Data and on What Terms?.vtt 12.3 kB
5. Operations/4. Azure Monitor Logs.vtt 11.6 kB
6. Storage/4. Storage Analytics.vtt 10.9 kB
5. Operations/3. Azure Monitor.vtt 10.8 kB
7. Networking/7. Conclusion.vtt 10.5 kB
5. Operations/6. Azure Security Center.vtt 10.0 kB
2. Security in the Cloud/1. Introduction into Azure Security.vtt 9.6 kB
3. Transparency/5. Conclusion.vtt 9.4 kB
9. Secure Platform/5. Security Incident Response and Shared Responsibility.vtt 9.4 kB
10. Wrapping Up/1. Additional Resources.vtt 9.2 kB
8. Compute/7. Conclusion.vtt 9.2 kB
7. Networking/5. Web Application Firewall.vtt 9.0 kB
9. Secure Platform/4. State of the Art Data Centers, Physical Security, and Secure Networks.vtt 9.0 kB
7. Networking/4. Application Gateway.vtt 8.4 kB
9. Secure Platform/6. Conclusion.vtt 8.2 kB
6. Storage/7. Configure Application Level Rules within Azure Firewall/metadata.md 8.0 kB
1. Course Introduction/2. What to Expect.vtt 7.2 kB
8. Compute/5. Patch Updates.vtt 7.1 kB
5. Operations/2. Application Insights.vtt 6.6 kB
6. Storage/6. Conclusion.vtt 6.6 kB
9. Secure Platform/3. Penetration Testing, Intrusion Detection, DDoS, Audits, and Logging.vtt 6.4 kB
8. Compute/4. VM Disk Encryption.vtt 6.3 kB
6. Storage/3. Encryption at Rest.vtt 6.2 kB
7. Networking/8. Creating Service Endpoints Between Virtual Machines and Blob Storage/metadata.md 5.7 kB
6. Storage/2. Encryption in Transit.vtt 5.1 kB
9. Secure Platform/2. Mandatory Security Training and Background Checks.vtt 4.3 kB
7. Networking/8. Creating Service Endpoints Between Virtual Machines and Blob Storage/2. Lab Solution.vtt 4.2 kB
10. Wrapping Up/2. What's Next?.vtt 3.0 kB
1. Course Introduction/1. An Important Note About A Cloud Guru and Linux Academy Courses.vtt 2.5 kB
7. Networking/8. Creating Service Endpoints Between Virtual Machines and Blob Storage/1. Lab Introduction.vtt 2.2 kB
==查看完整文档列表==