~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/06. Encrypting with CMEK and CSEK.mp4 13.3 MB
~Get Your Files Here !/5. Securing Google Kubernetes Engine - Techniques and Best Practices/5. Hardening your clusters.mp4 13.2 MB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/09. Demo - Using and Verifying Keys in Cloud HSM.mp4 12.0 MB
~Get Your Files Here !/04. Application Security - Techniques and Best Practices/12. Secret Manager.mp4 11.0 MB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/07. Pluralsight - Getting Started with GCP and Qwiklabs.mp4 10.1 MB
~Get Your Files Here !/04. Application Security - Techniques and Best Practices/13. Identity-Aware Proxy (IAP).mp4 8.2 MB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/01. Shielded VMs.mp4 8.1 MB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/15. Module overview.mp4 8.1 MB
~Get Your Files Here !/04. Application Security - Techniques and Best Practices/06. Web Security Scanner.mp4 7.7 MB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/14. Service accounts, IAM roles, and API scopes.mp4 7.5 MB
~Get Your Files Here !/5. Securing Google Kubernetes Engine - Techniques and Best Practices/6. Securing your workloads.mp4 7.4 MB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/14. Signed URLs and policy documents.mp4 6.5 MB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/12. Cloud HSM.mp4 6.4 MB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/08. Connecting to virtual machines.mp4 6.3 MB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/13. Cloud Storage IAM permissions and ACLs.mp4 6.1 MB
~Get Your Files Here !/5. Securing Google Kubernetes Engine - Techniques and Best Practices/4. Introduction to KubernetesGKE.mp4 5.9 MB
~Get Your Files Here !/04. Application Security - Techniques and Best Practices/01. Types of application security vulnerabilities.mp4 5.9 MB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/02. Compute Engine best practices.mp4 5.4 MB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/01. BigQuery IAM roles and authorized views.mp4 5.2 MB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/10. Module review.mp4 5.0 MB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/07. Storage best practices.mp4 4.6 MB
~Get Your Files Here !/04. Application Security - Techniques and Best Practices/11. Module review.mp4 4.4 MB
~Get Your Files Here !/04. Application Security - Techniques and Best Practices/09. Module overview.mp4 4.3 MB
~Get Your Files Here !/5. Securing Google Kubernetes Engine - Techniques and Best Practices/1. Monitoring and logging.mp4 4.2 MB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/15. Connecting to VMs without external IPs.mp4 4.1 MB
~Get Your Files Here !/04. Application Security - Techniques and Best Practices/08. Threat - Identity and Oauth phishing.mp4 4.1 MB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/06. OS Login.mp4 4.0 MB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/12. Certificate Authority Service.mp4 3.9 MB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/03. Organization policy controls.mp4 3.8 MB
~Get Your Files Here !/5. Securing Google Kubernetes Engine - Techniques and Best Practices/2. Authentication and authorization.mp4 3.7 MB
~Get Your Files Here !/5. Securing Google Kubernetes Engine - Techniques and Best Practices/7. Module overview.mp4 3.7 MB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/09. Confidential VMs.mp4 3.5 MB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/16. Auditing cloud data.mp4 3.5 MB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/04. What Certificate Authority Service provides.mp4 3.5 MB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/03. Module review.mp4 3.2 MB
~Get Your Files Here !/5. Securing Google Kubernetes Engine - Techniques and Best Practices/3. Module review.mp4 2.0 MB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/13. Module overview.mp4 1.8 MB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/08. Lab Intro - Using Customer-Managed Encryption Keys with Cloud Storage and Clou.mp4 676.9 kB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/11. Lab Intro - Configuring, Using, and Auditing VM Service Accounts and Scope.mp4 530.3 kB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/11. Lab Intro - Using Customer-Supplied Encryption Keys with Cloud Storage.mp4 518.3 kB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/02. Lab Intro - Creating a BigQuery Authorized View.mp4 406.2 kB
~Get Your Files Here !/04. Application Security - Techniques and Best Practices/05. Lab Intro - Identify Application Vulnerabilities with Security Command Center.mp4 400.9 kB
~Get Your Files Here !/04. Application Security - Techniques and Best Practices/10. Lab Intro - Securing Compute Engine Applications with BeyondCorp Enterprise.mp4 347.8 kB
~Get Your Files Here !/04. Application Security - Techniques and Best Practices/02. Lab Intro - Configuring and Using Credentials with Secret Manager.mp4 224.0 kB
~Get Your Files Here !/5. Securing Google Kubernetes Engine - Techniques and Best Practices/5. Hardening your clusters.vtt 12.6 kB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/06. Encrypting with CMEK and CSEK.vtt 11.4 kB
~Get Your Files Here !/04. Application Security - Techniques and Best Practices/12. Secret Manager.vtt 9.9 kB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/09. Demo - Using and Verifying Keys in Cloud HSM.vtt 8.8 kB
~Get Your Files Here !/04. Application Security - Techniques and Best Practices/06. Web Security Scanner.vtt 7.5 kB
~Get Your Files Here !/04. Application Security - Techniques and Best Practices/13. Identity-Aware Proxy (IAP).vtt 6.4 kB
~Get Your Files Here !/5. Securing Google Kubernetes Engine - Techniques and Best Practices/4. Introduction to KubernetesGKE.vtt 6.4 kB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/14. Service accounts, IAM roles, and API scopes.vtt 6.4 kB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/07. Pluralsight - Getting Started with GCP and Qwiklabs.vtt 5.8 kB
~Get Your Files Here !/04. Application Security - Techniques and Best Practices/01. Types of application security vulnerabilities.vtt 5.7 kB
~Get Your Files Here !/5. Securing Google Kubernetes Engine - Techniques and Best Practices/6. Securing your workloads.vtt 5.6 kB
~Get Your Files Here !/playlist.m3u 5.5 kB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/12. Cloud HSM.vtt 5.5 kB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/02. Compute Engine best practices.vtt 5.5 kB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/08. Connecting to virtual machines.vtt 5.3 kB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/14. Signed URLs and policy documents.vtt 5.1 kB
~Get Your Files Here !/04. Application Security - Techniques and Best Practices/08. Threat - Identity and Oauth phishing.vtt 4.3 kB
~Get Your Files Here !/04. Application Security - Techniques and Best Practices/11. Module review.vtt 4.3 kB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/07. Storage best practices.vtt 4.3 kB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/10. Module review.vtt 4.2 kB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/01. Shielded VMs.vtt 4.2 kB
~Get Your Files Here !/5. Securing Google Kubernetes Engine - Techniques and Best Practices/1. Monitoring and logging.vtt 3.7 kB
~Get Your Files Here !/5. Securing Google Kubernetes Engine - Techniques and Best Practices/2. Authentication and authorization.vtt 3.6 kB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/06. OS Login.vtt 3.6 kB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/13. Cloud Storage IAM permissions and ACLs.vtt 3.4 kB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/15. Connecting to VMs without external IPs.vtt 3.2 kB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/03. Module review.vtt 3.1 kB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/03. Organization policy controls.vtt 3.0 kB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/12. Certificate Authority Service.vtt 3.0 kB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/01. BigQuery IAM roles and authorized views.vtt 3.0 kB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/09. Confidential VMs.vtt 2.9 kB
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/04. What Certificate Authority Service provides.vtt 2.9 kB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/16. Auditing cloud data.vtt 2.4 kB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/15. Module overview.vtt 2.2 kB
~Get Your Files Here !/5. Securing Google Kubernetes Engine - Techniques and Best Practices/3. Module review.vtt 2.0 kB
~Get Your Files Here !/04. Application Security - Techniques and Best Practices/09. Module overview.vtt 1.3 kB
~Get Your Files Here !/5. Securing Google Kubernetes Engine - Techniques and Best Practices/7. Module overview.vtt 1.2 kB
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/08. Lab Intro - Using Customer-Managed Encryption Keys with Cloud Storage and Clou.vtt 877 Bytes
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/13. Module overview.vtt 874 Bytes
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/11. Lab Intro - Using Customer-Supplied Encryption Keys with Cloud Storage.vtt 724 Bytes
~Get Your Files Here !/02. Securing Compute Engine - Techniques and Best Practices/11. Lab Intro - Configuring, Using, and Auditing VM Service Accounts and Scope.vtt 629 Bytes
~Get Your Files Here !/03. Securing Cloud Data - Techniques and Best Practices/02. Lab Intro - Creating a BigQuery Authorized View.vtt 565 Bytes
~Get Your Files Here !/04. Application Security - Techniques and Best Practices/05. Lab Intro - Identify Application Vulnerabilities with Security Command Center.vtt 467 Bytes
~Get Your Files Here !/Bonus Resources.txt 386 Bytes
~Get Your Files Here !/04. Application Security - Techniques and Best Practices/10. Lab Intro - Securing Compute Engine Applications with BeyondCorp Enterprise.vtt 366 Bytes
~Get Your Files Here !/04. Application Security - Techniques and Best Practices/02. Lab Intro - Configuring and Using Credentials with Secret Manager.vtt 293 Bytes