magnet:?xt=urn:btih:86AF8909E9AC8CC9B75D3AB35945B320FA4F6015
Module 2 Kubernetes Cluster Setup/Lesson 4 Network Security Policies/004. 4.3 Segmentation.mp4 104.0 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/007. 28.6 Falco Custom Rules in Action.mp4 94.9 MB
Module 6 Software Supply Chain Security/Lesson 22 Secure Your Software Supply Chain/005. 22.4 Policy Enforcement Image Policy Webhook.mp4 82.1 MB
Module 8 Exam Practice Scenarios/Lesson 31 CKS Practice Exam 2/006. 31.5 Detecting and Mitigating Security Vulnerabilities.mp4 71.0 MB
Module 5 Minimize Microservice Vulnerabilities/Lesson 21 Implement Pod-to-Pod Encryption with Cilium/003. 21.2 Using Cilium for Pod-to-Pod Encryption.mp4 68.1 MB
Module 3 Cluster Hardening/Lesson 10 Restrict Access to Kubernetes API/005. 10.4 API Server Hardening.mp4 65.4 MB
Module 1 Preparing for the CKS Exam/Lesson 2 Building Your K8s Home Lab/005. 2.4 Your Cluster Up and Running.mp4 64.8 MB
Module 8 Exam Practice Scenarios/Lesson 31 CKS Practice Exam 2/003. 31.2 Detecting Malicious Behavior Using Falco.mp4 64.4 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/004. 28.3 Falco Host Installation.mp4 63.1 MB
Module 3 Cluster Hardening/Lesson 13 Upgrade Kubernetes to Avoid Vulnerabilities/004. 13.3 Upgrade Components and Test.mp4 60.6 MB
Module 1 Preparing for the CKS Exam/Lesson 2 Building Your K8s Home Lab/004. 2.3 Cloud Installation.mp4 60.0 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 29 Investigate and Identify Signs of Compromise/002. 29.1 MITRE ATT&CK Framework.mp4 57.2 MB
Module 5 Minimize Microservice Vulnerabilities/Lesson 20 Implement Container Isolation Techniques/003. 20.2 Sandboxed Pods.mp4 56.4 MB
Module 4 System Hardening/Lesson 16 Kernel Hardening/003. 16.2 Using Seccomp.mp4 56.1 MB
Module 3 Cluster Hardening/Lesson 10 Restrict Access to Kubernetes API/006. 10.5 Verify Access Control Policies.mp4 54.8 MB
Module 5 Minimize Microservice Vulnerabilities/Lesson 18 Use Appropriate Pod Security Standards/002. 18.1 Understanding Pod Security.mp4 54.5 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 28 Detect Malicious Activity, Threats, and Attacks/002. 28.1 Understanding Syscall Behavioral Analysis.mp4 54.4 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 29 Investigate and Identify Signs of Compromise/004. 29.3 Gathering Evidence of Compromise.mp4 54.3 MB
Module 2 Kubernetes Cluster Setup/Lesson 7 Protect Node Metadata and Endpoints/004. 7.3 Node Metadata Protection.mp4 54.3 MB
Module 7 Monitoring, Logging, and Runtime Security/Lesson 27 Use Kubernetes Audit Logs to Monitor Access/003. 27.2 Define an Audit Policy.mp4 52.8 MB
Le Specialist (The Specialist) Fr 2011 WebDL-WCR.mp4 269.4 MB
The.Specialist.1994.MULTi.PAL.DVD5.BG.Audio.and.BG.Sub-Atany 3.8 GB
Microsoft Office 2013 Pro Plus + Visio Professional +... 1.7 GB
Specialist Po Vsichko 571.7 MB
The.Specialist.1994.DVDRip.XviD BG Audio 678.8 MB
Specialist.1994.XviD.BDRip.ExKinoRay.avi 3.3 GB
[ UsaBit.com ] -... 734.0 MB
Dub Specialist - African Rub 'A' Dub (1980) [FLAC] {Reggae Vinyl} 176.3 MB
Microsoft Office 2007 Enterprise + Visio Premium +... 1.3 GB
Microsoft Office 2016 Pro Plus + Visio Professional +... 1.9 GB