[ FreeCourseWeb.com ] Udemy - Google Cloud Security Best Practices
    
    File List
    
        
            
                
                    - ~Get Your Files Here !/10 - Enable VPC Flow Logs for Subnets/1 -Enable VPC Flow Logs for Subnets.mp4  34.1 MB
 
                
                    - ~Get Your Files Here !/14 - Limiting API Access for Service Accounts/1 -Limiting API Access for Service Accounts.mp4  29.8 MB
 
                
                    - ~Get Your Files Here !/1 - Introduction/2 -Overview of GCP Security Services.mp4  28.7 MB
 
                
                    - ~Get Your Files Here !/17 - Configuring Log Sinks for All Log Entries/1 -Configuring Log Sinks for All Log Entries.mp4  28.7 MB
 
                
                    - ~Get Your Files Here !/19 - Enforcing HTTPS for App Engine Applications/1 -Enforcing HTTPS for App Engine Applications.mp4  28.1 MB
 
                
                    - ~Get Your Files Here !/1 - Introduction/3 -Security Foundations Identity, Network, Data, and Operations.mp4  28.0 MB
 
                
                    - ~Get Your Files Here !/15 - Enabling OS Login for VM Instances/1 -Enabling OS Login for VM Instances.mp4  27.7 MB
 
                
                    - ~Get Your Files Here !/23 - Preventing Public Access to BigQuery Datasets/1 -Preventing Public Access to BigQuery Datasets.mp4  27.3 MB
 
                
                    - ~Get Your Files Here !/16 - Enabling Cloud Audit Logging/1 -Enabling Cloud Audit Logging.mp4  27.1 MB
 
                
                    - ~Get Your Files Here !/11 - Block Project-Wide SSH Keys/1 -Block Project-Wide SSH Keys.mp4  26.6 MB
 
                
                    - ~Get Your Files Here !/13 - Avoid Using Default Service Accounts/1 -Avoid Using Default Service Accounts.mp4  26.4 MB
 
                
                    - ~Get Your Files Here !/21 - Restricting Public IP Access to Cloud SQL Instances/1 -Restricting Public IP Access to Cloud SQL Instances.mp4  25.7 MB
 
                
                    - ~Get Your Files Here !/1 - Introduction/4 -Key principles Least privilege, defense in depth, and zero trust.mp4  25.4 MB
 
                
                    - ~Get Your Files Here !/18 - Setting Retention Policies on Log Buckets/1 -Setting Retention Policies on Log Buckets.mp4  24.3 MB
 
                
                    - ~Get Your Files Here !/12 - Disabling Serial Port Access for VM Instances/1 -Disabling Serial Port Access for VM Instances.mp4  23.6 MB
 
                
                    - ~Get Your Files Here !/20 - Require SSL for Cloud SQL Connections/1 -Require SSL for Cloud SQL Connections.mp4  23.3 MB
 
                
                    - ~Get Your Files Here !/22 - Enabling Automated Backups for Cloud SQL/1 -Enabling Automated Backups for Cloud SQL.mp4  23.1 MB
 
                
                    - ~Get Your Files Here !/24 - Disabling IP Forwarding on VM Instances/1 -Disabling IP Forwarding on VM Instances.mp4  20.3 MB
 
                
                    - ~Get Your Files Here !/2 - Ensure that IAM policies do not grant access to personal email accounts/1 -Ensure that IAM policies do not grant access to personal email accounts.mp4  20.0 MB
 
                
                    - ~Get Your Files Here !/1 - Introduction/1 -Shared Responsibility Model in Google Cloud Platform (GCP).mp4  19.3 MB
 
                
                    - ~Get Your Files Here !/3 - Enable Multi-Factor Authentication (MFA) for All User Accounts/1 -Enable Multi-Factor Authentication (MFA) for All User Accounts.mp4  19.1 MB
 
                
                    - ~Get Your Files Here !/9 - Enable Uniform Bucket-Level Access/1 -Enable Uniform Bucket-Level Access.mp4  18.8 MB
 
                
                    - ~Get Your Files Here !/4 - Enforcing Security Key Usage for Admin Accounts/1 -Enforcing Security Key Usage for Admin Accounts.mp4  15.8 MB
 
                
                    - ~Get Your Files Here !/5 - Preventing the Use of User-Managed Service Account Keys/1 -Preventing the Use of User-Managed Service Account Keys.mp4  15.4 MB
 
                
                    - ~Get Your Files Here !/8 - Preventing Public Access to Cloud Storage Buckets/1 -Preventing Public Access to Cloud Storage Buckets.mp4  12.7 MB
 
                
                    - ~Get Your Files Here !/7 - Rotate KMS Encryption Keys Regularly/1 -Rotate KMS Encryption Keys Regularly.mp4  12.1 MB
 
                
                    - ~Get Your Files Here !/6 - Restricting Service Account Permissions/1 -Restricting Service Account Permissions.mp4  11.4 MB
 
                
                    - ~Get Your Files Here !/4 - Enforcing Security Key Usage for Admin Accounts/2 - Implementation Steps.html  7.9 KB
 
                
                    - ~Get Your Files Here !/6 - Restricting Service Account Permissions/2 - Implementation Steps.html  4.7 KB
 
                
                    - ~Get Your Files Here !/9 - Enable Uniform Bucket-Level Access/2 - Implementation Steps.html  4.4 KB
 
                
                    - ~Get Your Files Here !/3 - Enable Multi-Factor Authentication (MFA) for All User Accounts/2 - Implementation Steps.html  4.0 KB
 
                
                    - ~Get Your Files Here !/8 - Preventing Public Access to Cloud Storage Buckets/2 - Implementation Steps.html  3.7 KB
 
                
                    - ~Get Your Files Here !/5 - Preventing the Use of User-Managed Service Account Keys/2 - Implementation Steps.html  3.3 KB
 
                
                    - ~Get Your Files Here !/22 - Enabling Automated Backups for Cloud SQL/2 - Implementation Steps.html  2.8 KB
 
                
                    - ~Get Your Files Here !/16 - Enabling Cloud Audit Logging/2 - Implementation Steps.html  2.6 KB
 
                
                    - ~Get Your Files Here !/21 - Restricting Public IP Access to Cloud SQL Instances/2 - Implementation Steps.html  2.6 KB
 
                
                    - ~Get Your Files Here !/7 - Rotate KMS Encryption Keys Regularly/2 - Implementation Steps.html  2.6 KB
 
                
                    - ~Get Your Files Here !/13 - Avoid Using Default Service Accounts/2 - Implementation Steps.html  2.5 KB
 
                
                    - ~Get Your Files Here !/23 - Preventing Public Access to BigQuery Datasets/2 - Implementation Steps.html  2.4 KB
 
                
                    - ~Get Your Files Here !/14 - Limiting API Access for Service Accounts/2 - Implementation Steps.html  2.4 KB
 
                
                    - ~Get Your Files Here !/17 - Configuring Log Sinks for All Log Entries/2 - Implementation Steps.html  2.3 KB
 
                
                    - ~Get Your Files Here !/2 - Ensure that IAM policies do not grant access to personal email accounts/2 - Implementation Steps.html  2.3 KB
 
                
                    - ~Get Your Files Here !/20 - Require SSL for Cloud SQL Connections/2 - Implementation Steps.html  2.3 KB
 
                
                    - ~Get Your Files Here !/12 - Disabling Serial Port Access for VM Instances/2 - Implementation Steps.html  2.2 KB
 
                
                    - ~Get Your Files Here !/24 - Disabling IP Forwarding on VM Instances/2 - Implementation Steps.html  2.2 KB
 
                
                    - ~Get Your Files Here !/19 - Enforcing HTTPS for App Engine Applications/2 - Implementation Steps.html  2.2 KB
 
                
                    - ~Get Your Files Here !/11 - Block Project-Wide SSH Keys/2 - Implementation Steps.html  2.0 KB
 
                
                    - ~Get Your Files Here !/10 - Enable VPC Flow Logs for Subnets/2 - Implementation Steps.html  1.9 KB
 
                
                    - ~Get Your Files Here !/15 - Enabling OS Login for VM Instances/2 - Implementation Steps.html  1.9 KB
 
                
                    - ~Get Your Files Here !/18 - Setting Retention Policies on Log Buckets/2 - Implementation Steps.html  1.8 KB
 
                
                    - Get Bonus Downloads Here.url  183 bytes
 
                
                    - ~Get Your Files Here !/Bonus Resources.txt  70 bytes
 
                
            
        
     
    Download Torrent
    
    Related Resources
    
    Copyright Infringement
    
        If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.