[ FreeCourseWeb.com ] Udemy - Google Cloud Security Best Practices
File List
- ~Get Your Files Here !/10 - Enable VPC Flow Logs for Subnets/1 -Enable VPC Flow Logs for Subnets.mp4 34.1 MB
- ~Get Your Files Here !/14 - Limiting API Access for Service Accounts/1 -Limiting API Access for Service Accounts.mp4 29.8 MB
- ~Get Your Files Here !/1 - Introduction/2 -Overview of GCP Security Services.mp4 28.7 MB
- ~Get Your Files Here !/17 - Configuring Log Sinks for All Log Entries/1 -Configuring Log Sinks for All Log Entries.mp4 28.7 MB
- ~Get Your Files Here !/19 - Enforcing HTTPS for App Engine Applications/1 -Enforcing HTTPS for App Engine Applications.mp4 28.1 MB
- ~Get Your Files Here !/1 - Introduction/3 -Security Foundations Identity, Network, Data, and Operations.mp4 28.0 MB
- ~Get Your Files Here !/15 - Enabling OS Login for VM Instances/1 -Enabling OS Login for VM Instances.mp4 27.7 MB
- ~Get Your Files Here !/23 - Preventing Public Access to BigQuery Datasets/1 -Preventing Public Access to BigQuery Datasets.mp4 27.3 MB
- ~Get Your Files Here !/16 - Enabling Cloud Audit Logging/1 -Enabling Cloud Audit Logging.mp4 27.1 MB
- ~Get Your Files Here !/11 - Block Project-Wide SSH Keys/1 -Block Project-Wide SSH Keys.mp4 26.6 MB
- ~Get Your Files Here !/13 - Avoid Using Default Service Accounts/1 -Avoid Using Default Service Accounts.mp4 26.4 MB
- ~Get Your Files Here !/21 - Restricting Public IP Access to Cloud SQL Instances/1 -Restricting Public IP Access to Cloud SQL Instances.mp4 25.7 MB
- ~Get Your Files Here !/1 - Introduction/4 -Key principles Least privilege, defense in depth, and zero trust.mp4 25.4 MB
- ~Get Your Files Here !/18 - Setting Retention Policies on Log Buckets/1 -Setting Retention Policies on Log Buckets.mp4 24.3 MB
- ~Get Your Files Here !/12 - Disabling Serial Port Access for VM Instances/1 -Disabling Serial Port Access for VM Instances.mp4 23.6 MB
- ~Get Your Files Here !/20 - Require SSL for Cloud SQL Connections/1 -Require SSL for Cloud SQL Connections.mp4 23.3 MB
- ~Get Your Files Here !/22 - Enabling Automated Backups for Cloud SQL/1 -Enabling Automated Backups for Cloud SQL.mp4 23.1 MB
- ~Get Your Files Here !/24 - Disabling IP Forwarding on VM Instances/1 -Disabling IP Forwarding on VM Instances.mp4 20.3 MB
- ~Get Your Files Here !/2 - Ensure that IAM policies do not grant access to personal email accounts/1 -Ensure that IAM policies do not grant access to personal email accounts.mp4 20.0 MB
- ~Get Your Files Here !/1 - Introduction/1 -Shared Responsibility Model in Google Cloud Platform (GCP).mp4 19.3 MB
- ~Get Your Files Here !/3 - Enable Multi-Factor Authentication (MFA) for All User Accounts/1 -Enable Multi-Factor Authentication (MFA) for All User Accounts.mp4 19.1 MB
- ~Get Your Files Here !/9 - Enable Uniform Bucket-Level Access/1 -Enable Uniform Bucket-Level Access.mp4 18.8 MB
- ~Get Your Files Here !/4 - Enforcing Security Key Usage for Admin Accounts/1 -Enforcing Security Key Usage for Admin Accounts.mp4 15.8 MB
- ~Get Your Files Here !/5 - Preventing the Use of User-Managed Service Account Keys/1 -Preventing the Use of User-Managed Service Account Keys.mp4 15.4 MB
- ~Get Your Files Here !/8 - Preventing Public Access to Cloud Storage Buckets/1 -Preventing Public Access to Cloud Storage Buckets.mp4 12.7 MB
- ~Get Your Files Here !/7 - Rotate KMS Encryption Keys Regularly/1 -Rotate KMS Encryption Keys Regularly.mp4 12.1 MB
- ~Get Your Files Here !/6 - Restricting Service Account Permissions/1 -Restricting Service Account Permissions.mp4 11.4 MB
- ~Get Your Files Here !/4 - Enforcing Security Key Usage for Admin Accounts/2 - Implementation Steps.html 7.9 KB
- ~Get Your Files Here !/6 - Restricting Service Account Permissions/2 - Implementation Steps.html 4.7 KB
- ~Get Your Files Here !/9 - Enable Uniform Bucket-Level Access/2 - Implementation Steps.html 4.4 KB
- ~Get Your Files Here !/3 - Enable Multi-Factor Authentication (MFA) for All User Accounts/2 - Implementation Steps.html 4.0 KB
- ~Get Your Files Here !/8 - Preventing Public Access to Cloud Storage Buckets/2 - Implementation Steps.html 3.7 KB
- ~Get Your Files Here !/5 - Preventing the Use of User-Managed Service Account Keys/2 - Implementation Steps.html 3.3 KB
- ~Get Your Files Here !/22 - Enabling Automated Backups for Cloud SQL/2 - Implementation Steps.html 2.8 KB
- ~Get Your Files Here !/16 - Enabling Cloud Audit Logging/2 - Implementation Steps.html 2.6 KB
- ~Get Your Files Here !/21 - Restricting Public IP Access to Cloud SQL Instances/2 - Implementation Steps.html 2.6 KB
- ~Get Your Files Here !/7 - Rotate KMS Encryption Keys Regularly/2 - Implementation Steps.html 2.6 KB
- ~Get Your Files Here !/13 - Avoid Using Default Service Accounts/2 - Implementation Steps.html 2.5 KB
- ~Get Your Files Here !/23 - Preventing Public Access to BigQuery Datasets/2 - Implementation Steps.html 2.4 KB
- ~Get Your Files Here !/14 - Limiting API Access for Service Accounts/2 - Implementation Steps.html 2.4 KB
- ~Get Your Files Here !/17 - Configuring Log Sinks for All Log Entries/2 - Implementation Steps.html 2.3 KB
- ~Get Your Files Here !/2 - Ensure that IAM policies do not grant access to personal email accounts/2 - Implementation Steps.html 2.3 KB
- ~Get Your Files Here !/20 - Require SSL for Cloud SQL Connections/2 - Implementation Steps.html 2.3 KB
- ~Get Your Files Here !/12 - Disabling Serial Port Access for VM Instances/2 - Implementation Steps.html 2.2 KB
- ~Get Your Files Here !/24 - Disabling IP Forwarding on VM Instances/2 - Implementation Steps.html 2.2 KB
- ~Get Your Files Here !/19 - Enforcing HTTPS for App Engine Applications/2 - Implementation Steps.html 2.2 KB
- ~Get Your Files Here !/11 - Block Project-Wide SSH Keys/2 - Implementation Steps.html 2.0 KB
- ~Get Your Files Here !/10 - Enable VPC Flow Logs for Subnets/2 - Implementation Steps.html 1.9 KB
- ~Get Your Files Here !/15 - Enabling OS Login for VM Instances/2 - Implementation Steps.html 1.9 KB
- ~Get Your Files Here !/18 - Setting Retention Policies on Log Buckets/2 - Implementation Steps.html 1.8 KB
- Get Bonus Downloads Here.url 183 bytes
- ~Get Your Files Here !/Bonus Resources.txt 70 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.