CDR024/01_welcome-to-mitigating-security-vulnerabilities-on-google-cloud-platform/01_welcome-to-the-course/01_01_welcome-and-getting-started-guide_instructions.html |
2 KB |
CDR024/01_welcome-to-mitigating-security-vulnerabilities-on-google-cloud-platform/02_how-to-use-qwiklabs/02_01_getting-started-with-google-cloud-platform-and-qwiklabs.en.srt |
5 KB |
CDR024/01_welcome-to-mitigating-security-vulnerabilities-on-google-cloud-platform/02_how-to-use-qwiklabs/02_01_getting-started-with-google-cloud-platform-and-qwiklabs.en.txt |
3 KB |
CDR024/01_welcome-to-mitigating-security-vulnerabilities-on-google-cloud-platform/02_how-to-use-qwiklabs/02_01_getting-started-with-google-cloud-platform-and-qwiklabs.mp4 |
5.6 MB |
CDR024/02_securing-compute-engine/01_module-overview/01_01_module-6-overview.en.srt |
1 KB |
CDR024/02_securing-compute-engine/01_module-overview/01_01_module-6-overview.en.txt |
915 B |
CDR024/02_securing-compute-engine/01_module-overview/01_01_module-6-overview.mp4 |
2.3 MB |
CDR024/02_securing-compute-engine/02_service-accounts-iam-roles-and-api-scopes/02_01_compute-engine-identity-and-api-access.en.srt |
3 KB |
CDR024/02_securing-compute-engine/02_service-accounts-iam-roles-and-api-scopes/02_01_compute-engine-identity-and-api-access.en.txt |
2 KB |
CDR024/02_securing-compute-engine/02_service-accounts-iam-roles-and-api-scopes/02_01_compute-engine-identity-and-api-access.mp4 |
2.2 MB |
CDR024/02_securing-compute-engine/02_service-accounts-iam-roles-and-api-scopes/02_02_vm-and-api-scopes.en.srt |
3 KB |
CDR024/02_securing-compute-engine/02_service-accounts-iam-roles-and-api-scopes/02_02_vm-and-api-scopes.en.txt |
2 KB |
CDR024/02_securing-compute-engine/02_service-accounts-iam-roles-and-api-scopes/02_02_vm-and-api-scopes.mp4 |
4.7 MB |
CDR024/02_securing-compute-engine/03_managing-vm-logins/03_01_connecting-to-virtual-machines.en.srt |
8 KB |
CDR024/02_securing-compute-engine/03_managing-vm-logins/03_01_connecting-to-virtual-machines.en.txt |
5 KB |
CDR024/02_securing-compute-engine/03_managing-vm-logins/03_01_connecting-to-virtual-machines.mp4 |
8.7 MB |
CDR024/02_securing-compute-engine/04_organization-policy-controls/04_01_organization-policy-service.en.srt |
2 KB |
CDR024/02_securing-compute-engine/04_organization-policy-controls/04_01_organization-policy-service.en.txt |
1 KB |
CDR024/02_securing-compute-engine/04_organization-policy-controls/04_01_organization-policy-service.mp4 |
2.6 MB |
CDR024/02_securing-compute-engine/04_organization-policy-controls/04_02_organization-policy-constraints.en.srt |
2 KB |
CDR024/02_securing-compute-engine/04_organization-policy-controls/04_02_organization-policy-constraints.en.txt |
2 KB |
CDR024/02_securing-compute-engine/04_organization-policy-controls/04_02_organization-policy-constraints.mp4 |
3.1 MB |
CDR024/02_securing-compute-engine/05_compute-engine-best-practices/05_01_compute-engine-security.en.srt |
5 KB |
CDR024/02_securing-compute-engine/05_compute-engine-best-practices/05_01_compute-engine-security.en.txt |
3 KB |
CDR024/02_securing-compute-engine/05_compute-engine-best-practices/05_01_compute-engine-security.mp4 |
8.1 MB |
CDR024/02_securing-compute-engine/06_encrypting-disks-with-csek/06_01_encryption-overview.en.srt |
4 KB |
CDR024/02_securing-compute-engine/06_encrypting-disks-with-csek/06_01_encryption-overview.en.txt |
3 KB |
CDR024/02_securing-compute-engine/06_encrypting-disks-with-csek/06_01_encryption-overview.mp4 |
5.6 MB |
CDR024/02_securing-compute-engine/06_encrypting-disks-with-csek/06_02_customer-supplied-and-managed-keys.en.srt |
3 KB |
CDR024/02_securing-compute-engine/06_encrypting-disks-with-csek/06_02_customer-supplied-and-managed-keys.en.txt |
2 KB |
CDR024/02_securing-compute-engine/06_encrypting-disks-with-csek/06_02_customer-supplied-and-managed-keys.mp4 |
2.3 MB |
CDR024/02_securing-compute-engine/07_module-review/07_01_module-6-review.en.srt |
4 KB |
CDR024/02_securing-compute-engine/07_module-review/07_01_module-6-review.en.txt |
2 KB |
CDR024/02_securing-compute-engine/07_module-review/07_01_module-6-review.mp4 |
3.6 MB |
CDR024/03_securing-cloud-data/01_module-overview/01_01_module-7-overview.en.srt |
2 KB |
CDR024/03_securing-cloud-data/01_module-overview/01_01_module-7-overview.en.txt |
1 KB |
CDR024/03_securing-cloud-data/01_module-overview/01_01_module-7-overview.mp4 |
3 MB |
CDR024/03_securing-cloud-data/02_cloud-storage-iam-permissions-and-acls/02_01_cloud-storage-permissions-and-roles.en.srt |
3 KB |
CDR024/03_securing-cloud-data/02_cloud-storage-iam-permissions-and-acls/02_01_cloud-storage-permissions-and-roles.en.txt |
2 KB |
CDR024/03_securing-cloud-data/02_cloud-storage-iam-permissions-and-acls/02_01_cloud-storage-permissions-and-roles.mp4 |
3.8 MB |
CDR024/03_securing-cloud-data/03_auditing-cloud-data/03_01_auditing-storage-buckets.en.srt |
2 KB |
CDR024/03_securing-cloud-data/03_auditing-cloud-data/03_01_auditing-storage-buckets.en.txt |
1 KB |
CDR024/03_securing-cloud-data/03_auditing-cloud-data/03_01_auditing-storage-buckets.mp4 |
2.3 MB |
CDR024/03_securing-cloud-data/04_signed-urls-and-policy-documents/04_01_signed-urls-and-signed-policy-documents.en.srt |
5 KB |
CDR024/03_securing-cloud-data/04_signed-urls-and-policy-documents/04_01_signed-urls-and-signed-policy-documents.en.txt |
3 KB |
CDR024/03_securing-cloud-data/04_signed-urls-and-policy-documents/04_01_signed-urls-and-signed-policy-documents.mp4 |
6.8 MB |
CDR024/03_securing-cloud-data/05_encrypting-with-cmek-and-csek/05_01_encryption-csek-cmek-review.en.srt |
3 KB |
CDR024/03_securing-cloud-data/05_encrypting-with-cmek-and-csek/05_01_encryption-csek-cmek-review.en.txt |
2 KB |
CDR024/03_securing-cloud-data/05_encrypting-with-cmek-and-csek/05_01_encryption-csek-cmek-review.mp4 |
2.7 MB |
CDR024/03_securing-cloud-data/06_bigquery-iam-roles-and-authorized-views/06_01_bigquery-iam-roles-and-authorized-views.en.srt |
3 KB |
CDR024/03_securing-cloud-data/06_bigquery-iam-roles-and-authorized-views/06_01_bigquery-iam-roles-and-authorized-views.en.txt |
2 KB |
CDR024/03_securing-cloud-data/06_bigquery-iam-roles-and-authorized-views/06_01_bigquery-iam-roles-and-authorized-views.mp4 |
3.1 MB |
CDR024/03_securing-cloud-data/07_storage-best-practices/07_01_cloud-storage-best-practices.en.srt |
3 KB |
CDR024/03_securing-cloud-data/07_storage-best-practices/07_01_cloud-storage-best-practices.en.txt |
2 KB |
CDR024/03_securing-cloud-data/07_storage-best-practices/07_01_cloud-storage-best-practices.mp4 |
4.6 MB |
CDR024/03_securing-cloud-data/07_storage-best-practices/07_02_big-query-storage-best-practices.en.srt |
1 KB |
CDR024/03_securing-cloud-data/07_storage-best-practices/07_02_big-query-storage-best-practices.en.txt |
946 B |
CDR024/03_securing-cloud-data/07_storage-best-practices/07_02_big-query-storage-best-practices.mp4 |
2.2 MB |
CDR024/03_securing-cloud-data/08_module-review/08_01_module-7-review.en.srt |
3 KB |
CDR024/03_securing-cloud-data/08_module-review/08_01_module-7-review.en.txt |
2 KB |
CDR024/03_securing-cloud-data/08_module-review/08_01_module-7-review.mp4 |
3.1 MB |
CDR024/04_protecting-against-distributed-denial-of-service-attacks-ddos/01_module-overview/01_01_module-8-overview.en.srt |
1 KB |
CDR024/04_protecting-against-distributed-denial-of-service-attacks-ddos/01_module-overview/01_01_module-8-overview.en.txt |
669 B |
CDR024/04_protecting-against-distributed-denial-of-service-attacks-ddos/01_module-overview/01_01_module-8-overview.mp4 |
1.5 MB |
CDR024/04_protecting-against-distributed-denial-of-service-attacks-ddos/02_how-ddos-attacks-work/02_01_ddos-attack-overview.en.srt |
2 KB |
CDR024/04_protecting-against-distributed-denial-of-service-attacks-ddos/02_how-ddos-attacks-work/02_01_ddos-attack-overview.en.txt |
1 KB |
CDR024/04_protecting-against-distributed-denial-of-service-attacks-ddos/02_how-ddos-attacks-work/02_01_ddos-attack-overview.mp4 |
2.1 MB |
CDR024/04_protecting-against-distributed-denial-of-service-attacks-ddos/03_gcp-mitigations/03_01_ddos-mitigation-and-prevention-on-gcp.en.srt |
7 KB |
CDR024/04_protecting-against-distributed-denial-of-service-attacks-ddos/03_gcp-mitigations/03_01_ddos-mitigation-and-prevention-on-gcp.en.txt |
5 KB |
CDR024/04_protecting-against-distributed-denial-of-service-attacks-ddos/03_gcp-mitigations/03_01_ddos-mitigation-and-prevention-on-gcp.mp4 |
7.7 MB |
CDR024/04_protecting-against-distributed-denial-of-service-attacks-ddos/03_gcp-mitigations/03_02_using-cloud-armor.en.srt |
2 KB |
CDR024/04_protecting-against-distributed-denial-of-service-attacks-ddos/03_gcp-mitigations/03_02_using-cloud-armor.en.txt |
1 KB |
CDR024/04_protecting-against-distributed-denial-of-service-attacks-ddos/03_gcp-mitigations/03_02_using-cloud-armor.mp4 |
2.7 MB |
CDR024/04_protecting-against-distributed-denial-of-service-attacks-ddos/04_types-of-complementary-partner-products/04_01_security-partner-products.en.srt |
2 KB |
CDR024/04_protecting-against-distributed-denial-of-service-attacks-ddos/04_types-of-complementary-partner-products/04_01_security-partner-products.en.txt |
1 KB |
CDR024/04_protecting-against-distributed-denial-of-service-attacks-ddos/04_types-of-complementary-partner-products/04_01_security-partner-products.mp4 |
1.7 MB |
CDR024/04_protecting-against-distributed-denial-of-service-attacks-ddos/04_types-of-complementary-partner-products/04_02_infrastructure-data-protection-logging-and-compliance-partners.en.srt |
2 KB |
CDR024/04_protecting-against-distributed-denial-of-service-attacks-ddos/04_types-of-complementary-partner-products/04_02_infrastructure-data-protection-logging-and-compliance-partners.en.txt |
1 KB |
CDR024/04_protecting-against-distributed-denial-of-service-attacks-ddos/04_types-of-complementary-partner-products/04_02_infrastructure-data-protection-logging-and-compliance-partners.mp4 |
1.2 MB |
CDR024/04_protecting-against-distributed-denial-of-service-attacks-ddos/05_module-review/05_01_module-8-review.en.srt |
3 KB |
CDR024/04_protecting-against-distributed-denial-of-service-attacks-ddos/05_module-review/05_01_module-8-review.en.txt |
2 KB |
CDR024/04_protecting-against-distributed-denial-of-service-attacks-ddos/05_module-review/05_01_module-8-review.mp4 |
2.6 MB |
CDR024/05_application-security/01_module-overview/01_01_module-9-overview.en.srt |
1 KB |
CDR024/05_application-security/01_module-overview/01_01_module-9-overview.en.txt |
804 B |
CDR024/05_application-security/01_module-overview/01_01_module-9-overview.mp4 |
1.8 MB |
CDR024/05_application-security/02_types-of-application-security-vulnerabilities/02_01_application-vulnerabilities.en.srt |
5 KB |
CDR024/05_application-security/02_types-of-application-security-vulnerabilities/02_01_application-vulnerabilities.en.txt |
3 KB |
CDR024/05_application-security/02_types-of-application-security-vulnerabilities/02_01_application-vulnerabilities.mp4 |
7.5 MB |
CDR024/05_application-security/03_cloud-security-scanner/03_01_how-cloud-security-scanner-works.en.srt |
4 KB |
CDR024/05_application-security/03_cloud-security-scanner/03_01_how-cloud-security-scanner-works.en.txt |
3 KB |
CDR024/05_application-security/03_cloud-security-scanner/03_01_how-cloud-security-scanner-works.mp4 |
6.1 MB |
CDR024/05_application-security/03_cloud-security-scanner/03_02_avoiding-unwanted-impact.en.srt |
2 KB |
CDR024/05_application-security/03_cloud-security-scanner/03_02_avoiding-unwanted-impact.en.txt |
1 KB |
CDR024/05_application-security/03_cloud-security-scanner/03_02_avoiding-unwanted-impact.mp4 |
3.4 MB |
CDR024/05_application-security/04_threat-identity-and-oauth-phishing/04_01_types-of-phishing-attacks.en.srt |
4 KB |
CDR024/05_application-security/04_threat-identity-and-oauth-phishing/04_01_types-of-phishing-attacks.en.txt |
3 KB |
CDR024/05_application-security/04_threat-identity-and-oauth-phishing/04_01_types-of-phishing-attacks.mp4 |
6.2 MB |
CDR024/05_application-security/05_cloud-identity-aware-proxy/05_01_cloud-identity-aware-proxy-cloud-iap.en.srt |
2 KB |
CDR024/05_application-security/05_cloud-identity-aware-proxy/05_01_cloud-identity-aware-proxy-cloud-iap.en.txt |
2 KB |
CDR024/05_application-security/05_cloud-identity-aware-proxy/05_01_cloud-identity-aware-proxy-cloud-iap.mp4 |
3.9 MB |
CDR024/05_application-security/06_module-review/06_01_module-9-review.en.srt |
4 KB |
CDR024/05_application-security/06_module-review/06_01_module-9-review.en.txt |
3 KB |
CDR024/05_application-security/06_module-review/06_01_module-9-review.mp4 |
4 MB |
CDR024/06_content-related-vulnerabilities/01_module-overview/01_01_module-10-overview.en.srt |
1 KB |
CDR024/06_content-related-vulnerabilities/01_module-overview/01_01_module-10-overview.en.txt |
817 B |
CDR024/06_content-related-vulnerabilities/01_module-overview/01_01_module-10-overview.mp4 |
1.7 MB |
CDR024/06_content-related-vulnerabilities/02_threat-ransomware/02_01_what-is-ransomware.en.srt |
1 KB |
CDR024/06_content-related-vulnerabilities/02_threat-ransomware/02_01_what-is-ransomware.en.txt |
839 B |
CDR024/06_content-related-vulnerabilities/02_threat-ransomware/02_01_what-is-ransomware.mp4 |
2 MB |
CDR024/06_content-related-vulnerabilities/03_ransomware-mitigations/03_01_mitigating-the-threat-of-ransomware.en.srt |
5 KB |
CDR024/06_content-related-vulnerabilities/03_ransomware-mitigations/03_01_mitigating-the-threat-of-ransomware.en.txt |
3 KB |
CDR024/06_content-related-vulnerabilities/03_ransomware-mitigations/03_01_mitigating-the-threat-of-ransomware.mp4 |
7.2 MB |
CDR024/06_content-related-vulnerabilities/04_threats-data-misuse-privacy-violations-sensitive-content/04_01_misuse-of-data-and-content.en.srt |
3 KB |
CDR024/06_content-related-vulnerabilities/04_threats-data-misuse-privacy-violations-sensitive-content/04_01_misuse-of-data-and-content.en.txt |
2 KB |
CDR024/06_content-related-vulnerabilities/04_threats-data-misuse-privacy-violations-sensitive-content/04_01_misuse-of-data-and-content.mp4 |
3.9 MB |
CDR024/06_content-related-vulnerabilities/05_content-related-mitigations/05_01_threat-mitigation-strategies-for-content.en.srt |
4 KB |
CDR024/06_content-related-vulnerabilities/05_content-related-mitigations/05_01_threat-mitigation-strategies-for-content.en.txt |
2 KB |
CDR024/06_content-related-vulnerabilities/05_content-related-mitigations/05_01_threat-mitigation-strategies-for-content.mp4 |
5 MB |
CDR024/06_content-related-vulnerabilities/06_module-review/06_01_module-10-review.en.srt |
3 KB |
CDR024/06_content-related-vulnerabilities/06_module-review/06_01_module-10-review.en.txt |
2 KB |
CDR024/06_content-related-vulnerabilities/06_module-review/06_01_module-10-review.mp4 |
2.9 MB |
CDR024/07_Resources/01_module-6-slides/01_01__Module_6-SecuringComputeEngine.pdf |
3.5 MB |
CDR024/07_Resources/01_module-6-slides/01_01__resources.html |
1 KB |
CDR024/07_Resources/02_module-7-slides/02_01__Module_7-SecuringCloudData.pdf |
3.2 MB |
CDR024/07_Resources/02_module-7-slides/02_01__resources.html |
1 KB |
CDR024/07_Resources/03_module-8-slides/03_01__Module_8-ProtectingAgainstDDOS.pdf |
1.9 MB |
CDR024/07_Resources/03_module-8-slides/03_01__resources.html |
1 KB |
CDR024/07_Resources/04_module-9-slides/04_01__Module_9-ApplicationSecurity.pdf |
2 MB |
CDR024/07_Resources/04_module-9-slides/04_01__resources.html |
1 KB |
CDR024/07_Resources/05_module-10-slides/05_01__Module_10-ContentRelatedVulnerabilities.pdf |
1.5 MB |
CDR024/07_Resources/05_module-10-slides/05_01__resources.html |
1 KB |