magnet:?xt=urn:btih:AA2976DE75ECA55E0FBBADA67F489FC7AD588078
SEC545.20.2[SEC 545-545.20.2].iso/SEC545.20.2[SEC 545-545.20.2].iso 20.9 GB
VMS/VMware Workstation 15.x Pro for Windows/VMware-workstation-full-15.5.0-14665864.exe 567.3 MB
VMS/VMware Fusion 11.x Pro (for Intel-based Macs)/VMware-Fusion-11.5.0-14634996.dmg 543.4 MB
545 Videos/SECTION 2/2.6 DATA SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_59.webm 130.9 MB
545 Videos/SECTION 5/5.4 BUILDING AUTOMATED EVENT MANAGEMENT AND DEFENSIVE STRATEGIES/SEC545- SANS OnDemand_12_2.webm 122.1 MB
545 Videos/SECTION 5/5.1 SCRIPTING AND AUTOMATION IN THE CLOUD/SEC545- SANS OnDemand_20.webm 121.7 MB
545 Videos/SECTION 5/5.3 CREATING SECURE CLOUD WORKFLOWS/SEC545- SANS OnDemand_37.webm 121.1 MB
545 Videos/SECTION 4/4.2 VULNERABILITY MANAGEMENT IN THE CLOUD/SEC545- SANS OnDemand_12_2.webm 115.8 MB
545 Videos/SECTION 5/5.3 CREATING SECURE CLOUD WORKFLOWS/SEC545- SANS OnDemand_49.webm 103.6 MB
545 Videos/SECTION 2/2.5 IDENTITY AND ACCESS MANAGEMENT/SEC545- SANS OnDemand_18.webm 100.9 MB
545 Videos/SECTION 1/1.1 INTRO AND BASICS/SEC545- SANS OnDemand_21.webm 97.5 MB
545 Videos/SECTION 4/4.3 CLOUD PEN TESTING/SEC545- SANS OnDemand_16.webm 97.2 MB
SANS 545 PDF/SEC545_F01_04_6385-unlocked.pdf 96.0 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_47.webm 91.7 MB
545 Videos/SECTION 4/4.4 INTRUSTION DETECTION IN THE CLOUD/SEC545- SANS OnDemand_14_2.webm 90.3 MB
545 Videos/SECTION 2/2.3 CLOUD NETWORK SECURITY/SEC545- SANS OnDemand_19.webm 87.6 MB
545 Videos/SECTION 2/2.2 A VIRTUALIZATION SECURITY PRIMER/SEC545- SANS OnDemand_15.webm 80.0 MB
545 Videos/SECTION 1/1.5 INTRO TO PaaS AND IaaS SECURITY CONTROLS/SEC545- SANS OnDemand_47.webm 78.8 MB
545 Videos/SECTION 1/1.3 CLOUD POLICY AND PLANNING/SEC545- SANS OnDemand_26.webm 77.2 MB
545 Videos/SECTION 1/1.5 INTRO TO PaaS AND IaaS SECURITY CONTROLS/SEC545- SANS OnDemand_27.webm 76.7 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_95.webm 73.9 MB
545 Videos/SECTION 3/3.3 INFRASTRUCTURE AND CORE COMPONENT SECURITY/SEC545- SANS OnDemand_18_2.webm 71.2 MB
545 Videos/SECTION 4/4.5 CLOUD IR AND EVENT MANAGEMENT/SEC545- SANS OnDemand_31.webm 65.3 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_69.webm 59.7 MB
545 Videos/SECTION 3/3.5 AVAILABILITY/SEC545- SANS OnDemand_24_2.webm 58.6 MB
545 Videos/SECTION 1/1.1 INTRO AND BASICS/SEC545- SANS OnDemand_22.webm 35.5 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_46.webm 30.9 MB
545 Videos/SECTION 3/3.2 CLOUD ARCHITECTURE AND SECURITY PRINCIPLES/SEC545- SANS OnDemand_23.webm 30.4 MB
545 Videos/SECTION 5/5.1 SCRIPTING AND AUTOMATION IN THE CLOUD/SEC545- SANS OnDemand_4_2.webm 25.4 MB
545 Videos/SECTION 1/1.5 INTRO TO PaaS AND IaaS SECURITY CONTROLS/SEC545- SANS OnDemand.webm 25.2 MB
545 Videos/SECTION 3/3.5 AVAILABILITY/SEC545- SANS OnDemand_25_2.webm 24.8 MB
545 Videos/SECTION 4/4.6 CLOUD FORENSICS/SEC545- SANS OnDemand_22_2.webm 24.6 MB
545 Videos/SECTION 5/5.2 DevSecOps PRINCIPLES/SEC545- SANS OnDemand_8.webm 23.9 MB
545 Videos/SECTION 5/5.6 CLASS WRAP-UP/SEC545- SANS OnDemand_4.webm 23.4 MB
545 Videos/SECTION 1/1.5 INTRO TO PaaS AND IaaS SECURITY CONTROLS/SEC545- SANS OnDemand_29.webm 21.6 MB
545 Videos/SECTION 2/2.4 INSTANCE AND IMAGE SECURITY/SEC545- SANS OnDemand_10.webm 21.5 MB
545 Videos/SECTION 3/3.5 AVAILABILITY/SEC545- SANS OnDemand_23_2.webm 21.3 MB
545 Videos/SECTION 5/5.4 BUILDING AUTOMATED EVENT MANAGEMENT AND DEFENSIVE STRATEGIES/SEC545- SANS OnDemand_13_2.webm 20.0 MB
545 Videos/SECTION 4/4.5 CLOUD IR AND EVENT MANAGEMENT/SEC545- SANS OnDemand_27.webm 19.7 MB
545 Videos/SECTION 2/2.3 CLOUD NETWORK SECURITY/SEC545- SANS OnDemand_15_2.webm 19.3 MB
545 Videos/SECTION 4/4.3 CLOUD PEN TESTING/SEC545- SANS OnDemand_15.webm 18.6 MB
545 Videos/SECTION 4/4.4 INTRUSTION DETECTION IN THE CLOUD/SEC545- SANS OnDemand_10_3.webm 18.1 MB
545 Videos/SECTION 3/3.1 CLOUD SECURITY ARCHITECTURE OVERVIEW/SEC545- SANS OnDemand_8.webm 17.7 MB
545 Videos/SECTION 1/1.4 SaaS SECURITY/SEC545- SANS OnDemand_28.webm 17.7 MB
545 Videos/SECTION 1/1.1 INTRO AND BASICS/SEC545- SANS OnDemand.webm 17.6 MB
545 Videos/SECTION 5/5.5 TOOLS, TACTICS AND USE CASES/SEC545- SANS OnDemand_24.webm 17.6 MB
545 Videos/SECTION 5/5.4 BUILDING AUTOMATED EVENT MANAGEMENT AND DEFENSIVE STRATEGIES/SEC545- SANS OnDemand_11_2.webm 17.6 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_94.webm 17.3 MB
545 Videos/SECTION 3/3.2 CLOUD ARCHITECTURE AND SECURITY PRINCIPLES/SEC545- SANS OnDemand_10.webm 17.3 MB
545 Videos/SECTION 2/2.2 A VIRTUALIZATION SECURITY PRIMER/SEC545- SANS OnDemand_6.webm 16.6 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_83.webm 16.0 MB
545 Videos/SECTION 5/5.3 CREATING SECURE CLOUD WORKFLOWS/SEC545- SANS OnDemand_48.webm 15.9 MB
545 Videos/SECTION 2/2.1 CLOUD SECURITY; IN-HOUSE VERSUS CLOUD/SEC545- SANS OnDemand_2_2.webm 15.7 MB
545 Videos/SECTION 5/5.2 DevSecOps PRINCIPLES/SEC545- SANS OnDemand.webm 15.5 MB
545 Videos/SECTION 3/3.2 CLOUD ARCHITECTURE AND SECURITY PRINCIPLES/SEC545- SANS OnDemand_12.webm 15.4 MB
545 Videos/SECTION 2/2.7 APPLICATION SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_14.webm 15.2 MB
545 Videos/SECTION 3/3.2 CLOUD ARCHITECTURE AND SECURITY PRINCIPLES/SEC545- SANS OnDemand_13.webm 14.9 MB
545 Videos/SECTION 2/2.5 IDENTITY AND ACCESS MANAGEMENT/SEC545- SANS OnDemand_17.webm 14.8 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_14.webm 14.6 MB
545 Videos/SECTION 5/5.1 SCRIPTING AND AUTOMATION IN THE CLOUD/SEC545- SANS OnDemand_17.webm 14.6 MB
545 Videos/SECTION 4/4.4 INTRUSTION DETECTION IN THE CLOUD/SEC545- SANS OnDemand_13_2.webm 14.0 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_6_2.webm 13.6 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_10.webm 13.4 MB
545 Videos/SECTION 1/1.3 CLOUD POLICY AND PLANNING/SEC545- SANS OnDemand.webm 13.3 MB
545 Videos/SECTION 5/5.1 SCRIPTING AND AUTOMATION IN THE CLOUD/SEC545- SANS OnDemand_10.webm 13.3 MB
545 Videos/SECTION 2/2.6 DATA SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_57.webm 13.0 MB
545 Videos/SECTION 4/4.6 CLOUD FORENSICS/SEC545- SANS OnDemand_17_2.webm 12.9 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_48.webm 12.7 MB
545 Videos/SECTION 5/5.4 BUILDING AUTOMATED EVENT MANAGEMENT AND DEFENSIVE STRATEGIES/SEC545- SANS OnDemand_9_3.webm 12.7 MB
545 Videos/SECTION 1/1.2 CLOUD SECURITY ALLIANCE GUIDANCE/SEC545- SANS OnDemand_15_2.webm 12.5 MB
545 Videos/SECTION 1/1.5 INTRO TO PaaS AND IaaS SECURITY CONTROLS/SEC545- SANS OnDemand_28_3.webm 12.4 MB
545 Videos/SECTION 4/4.3 CLOUD PEN TESTING/SEC545- SANS OnDemand_10.webm 12.3 MB
545 Videos/SECTION 1/1.1 INTRO AND BASICS/SEC545- SANS OnDemand_25.webm 12.1 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_67.webm 12.0 MB
545 Videos/SECTION 1/1.2 CLOUD SECURITY ALLIANCE GUIDANCE/SEC545- SANS OnDemand_29.webm 11.8 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_10.webm 11.8 MB
545 Videos/SECTION 4/4.3 CLOUD PEN TESTING/SEC545- SANS OnDemand_8_2.webm 11.7 MB
545 Videos/SECTION 5/5.3 CREATING SECURE CLOUD WORKFLOWS/SEC545- SANS OnDemand_34.webm 11.6 MB
545 Videos/SECTION 3/3.1 CLOUD SECURITY ARCHITECTURE OVERVIEW/SEC545- SANS OnDemand_2.webm 11.6 MB
545 Videos/SECTION 4/4.2 VULNERABILITY MANAGEMENT IN THE CLOUD/SEC545- SANS OnDemand.webm 11.3 MB
545 Videos/SECTION 2/2.6 DATA SECURITY FOR THE CLOUD/SEC545- SANS OnDemand.webm 11.2 MB
545 Videos/SECTION 2/2.3 CLOUD NETWORK SECURITY/SEC545- SANS OnDemand_16.webm 11.1 MB
545 Videos/SECTION 1/1.4 SaaS SECURITY/SEC545- SANS OnDemand_9_2.webm 11.1 MB
545 Videos/SECTION 1/1.5 INTRO TO PaaS AND IaaS SECURITY CONTROLS/SEC545- SANS OnDemand_2.webm 11.0 MB
545 Videos/SECTION 5/5.1 SCRIPTING AND AUTOMATION IN THE CLOUD/SEC545- SANS OnDemand_15.webm 10.9 MB
545 Videos/SECTION 1/1.4 SaaS SECURITY/SEC545- SANS OnDemand_26_2.webm 10.8 MB
545 Videos/SECTION 4/4.4 INTRUSTION DETECTION IN THE CLOUD/SEC545- SANS OnDemand.webm 10.8 MB
545 Videos/SECTION 2/2.5 IDENTITY AND ACCESS MANAGEMENT/SEC545- SANS OnDemand_3_2.webm 10.8 MB
545 Videos/SECTION 5/5.2 DevSecOps PRINCIPLES/SEC545- SANS OnDemand_5.webm 10.7 MB
545 Videos/SECTION 1/1.5 INTRO TO PaaS AND IaaS SECURITY CONTROLS/SEC545- SANS OnDemand_49.webm 10.6 MB
545 Videos/SECTION 2/2.2 A VIRTUALIZATION SECURITY PRIMER/SEC545- SANS OnDemand_11.webm 10.6 MB
545 Videos/SECTION 1/1.1 INTRO AND BASICS/SEC545- SANS OnDemand_3.webm 10.3 MB
545 Videos/SECTION 5/5.6 CLASS WRAP-UP/SEC545- SANS OnDemand_2.webm 10.3 MB
545 Videos/SECTION 2/2.4 INSTANCE AND IMAGE SECURITY/SEC545- SANS OnDemand.webm 10.2 MB
545 Videos/SECTION 5/5.4 BUILDING AUTOMATED EVENT MANAGEMENT AND DEFENSIVE STRATEGIES/SEC545- SANS OnDemand_14_2.webm 10.2 MB
545 Videos/SECTION 4/4.2 VULNERABILITY MANAGEMENT IN THE CLOUD/SEC545- SANS OnDemand_9.webm 10.1 MB
545 Videos/SECTION 4/4.4 INTRUSTION DETECTION IN THE CLOUD/SEC545- SANS OnDemand_9.webm 10.1 MB
545 Videos/SECTION 2/2.5 IDENTITY AND ACCESS MANAGEMENT/SEC545- SANS OnDemand_12.webm 10.0 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_18.webm 9.9 MB
545 Videos/SECTION 2/2.2 A VIRTUALIZATION SECURITY PRIMER/SEC545- SANS OnDemand.webm 9.7 MB
545 Videos/SECTION 3/3.3 INFRASTRUCTURE AND CORE COMPONENT SECURITY/SEC545- SANS OnDemand_3.webm 9.7 MB
545 Videos/SECTION 5/5.6 CLASS WRAP-UP/SEC545- SANS OnDemand_3.webm 9.6 MB
545 Videos/SECTION 4/4.6 CLOUD FORENSICS/SEC545- SANS OnDemand.webm 9.5 MB
545 Videos/SECTION 4/4.6 CLOUD FORENSICS/SEC545- SANS OnDemand_20_2.webm 9.4 MB
545 Videos/SECTION 5/5.2 DevSecOps PRINCIPLES/SEC545- SANS OnDemand_6.webm 9.4 MB
545 Videos/SECTION 1/1.4 SaaS SECURITY/SEC545- SANS OnDemand_10_2.webm 9.3 MB
545 Videos/SECTION 5/5.2 DevSecOps PRINCIPLES/SEC545- SANS OnDemand_3.webm 9.2 MB
545 Videos/SECTION 1/1.4 SaaS SECURITY/SEC545- SANS OnDemand_28_2.webm 9.1 MB
545 Videos/SECTION 5/5.4 BUILDING AUTOMATED EVENT MANAGEMENT AND DEFENSIVE STRATEGIES/SEC545- SANS OnDemand_10_2.webm 9.1 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_15.webm 9.1 MB
545 Videos/SECTION 1/1.1 INTRO AND BASICS/SEC545- SANS OnDemand_4.webm 9.0 MB
545 Videos/SECTION 1/1.1 INTRO AND BASICS/SEC545- SANS OnDemand_15.webm 9.0 MB
545 Videos/SECTION 1/1.5 INTRO TO PaaS AND IaaS SECURITY CONTROLS/SEC545- SANS OnDemand_11.webm 9.0 MB
545 Videos/SECTION 4/4.6 CLOUD FORENSICS/SEC545- SANS OnDemand_19_2.webm 9.0 MB
545 Videos/SECTION 2/2.5 IDENTITY AND ACCESS MANAGEMENT/SEC545- SANS OnDemand_5_2.webm 8.9 MB
545 Videos/SECTION 2/2.7 APPLICATION SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_12.webm 8.8 MB
545 Videos/SECTION 1/1.3 CLOUD POLICY AND PLANNING/SEC545- SANS OnDemand_25.webm 8.8 MB
545 Videos/SECTION 3/3.2 CLOUD ARCHITECTURE AND SECURITY PRINCIPLES/SEC545- SANS OnDemand_4_2.webm 8.8 MB
545 Videos/SECTION 3/3.2 CLOUD ARCHITECTURE AND SECURITY PRINCIPLES/SEC545- SANS OnDemand_10_2.webm 8.7 MB
545 Videos/SECTION 1/1.5 INTRO TO PaaS AND IaaS SECURITY CONTROLS/SEC545- SANS OnDemand_50.webm 8.6 MB
545 Videos/SECTION 2/2.5 IDENTITY AND ACCESS MANAGEMENT/SEC545- SANS OnDemand_6_2.webm 8.6 MB
545 Videos/SECTION 3/3.5 AVAILABILITY/SEC545- SANS OnDemand.webm 8.6 MB
545 Videos/SECTION 2/2.2 A VIRTUALIZATION SECURITY PRIMER/SEC545- SANS OnDemand_5.webm 8.5 MB
545 Videos/SECTION 1/1.5 INTRO TO PaaS AND IaaS SECURITY CONTROLS/SEC545- SANS OnDemand_3.webm 8.5 MB
545 Videos/SECTION 3/3.2 CLOUD ARCHITECTURE AND SECURITY PRINCIPLES/SEC545- SANS OnDemand_6_2.webm 8.5 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_3_2.webm 8.4 MB
545 Videos/SECTION 2/2.4 INSTANCE AND IMAGE SECURITY/SEC545- SANS OnDemand_6.webm 8.4 MB
545 Videos/SECTION 1/1.1 INTRO AND BASICS/SEC545- SANS OnDemand_23.webm 8.4 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_16.webm 8.4 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_35.webm 8.4 MB
545 Videos/SECTION 3/3.2 CLOUD ARCHITECTURE AND SECURITY PRINCIPLES/SEC545- SANS OnDemand_16.webm 8.3 MB
545 Videos/SECTION 1/1.1 INTRO AND BASICS/SEC545- SANS OnDemand_5.webm 8.3 MB
545 Videos/SECTION 3/3.3 INFRASTRUCTURE AND CORE COMPONENT SECURITY/SEC545- SANS OnDemand.webm 8.2 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_5_2.webm 8.2 MB
545 Videos/SECTION 5/5.4 BUILDING AUTOMATED EVENT MANAGEMENT AND DEFENSIVE STRATEGIES/SEC545- SANS OnDemand.webm 8.2 MB
545 Videos/SECTION 4/4.6 CLOUD FORENSICS/SEC545- SANS OnDemand_21_2.webm 8.2 MB
545 Videos/SECTION 5/5.3 CREATING SECURE CLOUD WORKFLOWS/SEC545- SANS OnDemand_7_2.webm 8.1 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_21.webm 8.1 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_16.webm 8.1 MB
545 Videos/SECTION 1/1.5 INTRO TO PaaS AND IaaS SECURITY CONTROLS/SEC545- SANS OnDemand_12.webm 8.0 MB
545 Videos/SECTION 3/3.1 CLOUD SECURITY ARCHITECTURE OVERVIEW/SEC545- SANS OnDemand_7.webm 8.0 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_23.webm 8.0 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_35.webm 8.0 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_31.webm 7.9 MB
545 Videos/SECTION 2/2.6 DATA SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_58.webm 7.9 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_18.webm 7.8 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_58.webm 7.8 MB
545 Videos/SECTION 1/1.4 SaaS SECURITY/SEC545- SANS OnDemand_5_2.webm 7.7 MB
545 Videos/SECTION 5/5.1 SCRIPTING AND AUTOMATION IN THE CLOUD/SEC545- SANS OnDemand_16.webm 7.7 MB
545 Videos/SECTION 5/5.4 BUILDING AUTOMATED EVENT MANAGEMENT AND DEFENSIVE STRATEGIES/SEC545- SANS OnDemand_6.webm 7.7 MB
545 Videos/SECTION 2/2.2 A VIRTUALIZATION SECURITY PRIMER/SEC545- SANS OnDemand_13.webm 7.7 MB
545 Videos/SECTION 5/5.1 SCRIPTING AND AUTOMATION IN THE CLOUD/SEC545- SANS OnDemand_9_2.webm 7.5 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_36.webm 7.5 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_71.webm 7.5 MB
545 Videos/SECTION 2/2.5 IDENTITY AND ACCESS MANAGEMENT/SEC545- SANS OnDemand_13.webm 7.5 MB
545 Videos/SECTION 1/1.5 INTRO TO PaaS AND IaaS SECURITY CONTROLS/SEC545- SANS OnDemand_10.webm 7.4 MB
545 Videos/SECTION 5/5.5 TOOLS, TACTICS AND USE CASES/SEC545- SANS OnDemand_25.webm 7.4 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_2_2.webm 7.3 MB
545 Videos/SECTION 1/1.5 INTRO TO PaaS AND IaaS SECURITY CONTROLS/SEC545- SANS OnDemand_24.webm 7.3 MB
545 Videos/SECTION 1/1.1 INTRO AND BASICS/SEC545- SANS OnDemand_2.webm 7.2 MB
545 Videos/SECTION 3/3.3 INFRASTRUCTURE AND CORE COMPONENT SECURITY/SEC545- SANS OnDemand_13_2.webm 7.2 MB
545 Videos/SECTION 2/2.7 APPLICATION SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_13.webm 7.2 MB
545 Videos/SECTION 5/5.3 CREATING SECURE CLOUD WORKFLOWS/SEC545- SANS OnDemand_9.webm 7.2 MB
545 Videos/SECTION 1/1.1 INTRO AND BASICS/SEC545- SANS OnDemand_26.webm 7.1 MB
545 Videos/SECTION 2/2.4 INSTANCE AND IMAGE SECURITY/SEC545- SANS OnDemand_7.webm 7.1 MB
545 Videos/SECTION 2/2.6 DATA SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_3.webm 7.1 MB
545 Videos/SECTION 4/4.5 CLOUD IR AND EVENT MANAGEMENT/SEC545- SANS OnDemand_7_2.webm 7.1 MB
545 Videos/SECTION 4/4.2 VULNERABILITY MANAGEMENT IN THE CLOUD/SEC545- SANS OnDemand_3.webm 7.0 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_29.webm 7.0 MB
545 Videos/SECTION 2/2.2 A VIRTUALIZATION SECURITY PRIMER/SEC545- SANS OnDemand_9.webm 7.0 MB
545 Videos/SECTION 4/4.2 VULNERABILITY MANAGEMENT IN THE CLOUD/SEC545- SANS OnDemand_6.webm 6.9 MB
545 Videos/SECTION 4/4.5 CLOUD IR AND EVENT MANAGEMENT/SEC545- SANS OnDemand_22.webm 6.9 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_34.webm 6.9 MB
545 Videos/SECTION 1/1.1 INTRO AND BASICS/SEC545- SANS OnDemand_6.webm 6.8 MB
545 Videos/SECTION 2/2.6 DATA SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_15_2.webm 6.8 MB
545 Videos/SECTION 4/4.5 CLOUD IR AND EVENT MANAGEMENT/SEC545- SANS OnDemand_30.webm 6.8 MB
545 Videos/SECTION 5/5.1 SCRIPTING AND AUTOMATION IN THE CLOUD/SEC545- SANS OnDemand_12.webm 6.8 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_15.webm 6.8 MB
545 Videos/SECTION 2/2.3 CLOUD NETWORK SECURITY/SEC545- SANS OnDemand_14_2.webm 6.8 MB
545 Videos/SECTION 1/1.3 CLOUD POLICY AND PLANNING/SEC545- SANS OnDemand_6.webm 6.7 MB
545 Videos/SECTION 3/3.1 CLOUD SECURITY ARCHITECTURE OVERVIEW/SEC545- SANS OnDemand.webm 6.7 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_85.webm 6.7 MB
545 Videos/SECTION 3/3.2 CLOUD ARCHITECTURE AND SECURITY PRINCIPLES/SEC545- SANS OnDemand_20.webm 6.7 MB
545 Videos/SECTION 3/3.5 AVAILABILITY/SEC545- SANS OnDemand_3.webm 6.7 MB
545 Videos/SECTION 5/5.3 CREATING SECURE CLOUD WORKFLOWS/SEC545- SANS OnDemand_2_2.webm 6.7 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_17.webm 6.7 MB
545 Videos/SECTION 5/5.1 SCRIPTING AND AUTOMATION IN THE CLOUD/SEC545- SANS OnDemand_5_2.webm 6.7 MB
545 Videos/SECTION 5/5.1 SCRIPTING AND AUTOMATION IN THE CLOUD/SEC545- SANS OnDemand_2_2.webm 6.6 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_69.webm 6.6 MB
545 Videos/SECTION 1/1.5 INTRO TO PaaS AND IaaS SECURITY CONTROLS/SEC545- SANS OnDemand_4.webm 6.5 MB
545 Videos/SECTION 2/2.5 IDENTITY AND ACCESS MANAGEMENT/SEC545- SANS OnDemand_11_2.webm 6.5 MB
545 Videos/SECTION 2/2.2 A VIRTUALIZATION SECURITY PRIMER/SEC545- SANS OnDemand_14.webm 6.5 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_60.webm 6.5 MB
545 Videos/SECTION 5/5.5 TOOLS, TACTICS AND USE CASES/SEC545- SANS OnDemand_9.webm 6.5 MB
545 Videos/SECTION 2/2.3 CLOUD NETWORK SECURITY/SEC545- SANS OnDemand_8_2.webm 6.5 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_41.webm 6.5 MB
545 Videos/SECTION 4/4.3 CLOUD PEN TESTING/SEC545- SANS OnDemand_13.webm 6.5 MB
545 Videos/SECTION 1/1.1 INTRO AND BASICS/SEC545- SANS OnDemand_28.webm 6.5 MB
545 Videos/SECTION 3/3.3 INFRASTRUCTURE AND CORE COMPONENT SECURITY/SEC545- SANS OnDemand_17_2.webm 6.5 MB
545 Videos/SECTION 4/4.5 CLOUD IR AND EVENT MANAGEMENT/SEC545- SANS OnDemand_28.webm 6.4 MB
545 Videos/SECTION 4/4.5 CLOUD IR AND EVENT MANAGEMENT/SEC545- SANS OnDemand_18.webm 6.4 MB
545 Videos/SECTION 3/3.2 CLOUD ARCHITECTURE AND SECURITY PRINCIPLES/SEC545- SANS OnDemand_21.webm 6.4 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_65.webm 6.4 MB
545 Videos/SECTION 4/4.5 CLOUD IR AND EVENT MANAGEMENT/SEC545- SANS OnDemand_15.webm 6.4 MB
545 Videos/SECTION 1/1.3 CLOUD POLICY AND PLANNING/SEC545- SANS OnDemand_5.webm 6.3 MB
545 Videos/SECTION 4/4.4 INTRUSTION DETECTION IN THE CLOUD/SEC545- SANS OnDemand_12_2.webm 6.3 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_5_2.webm 6.2 MB
545 Videos/SECTION 4/4.4 INTRUSTION DETECTION IN THE CLOUD/SEC545- SANS OnDemand_11_2.webm 6.2 MB
545 Videos/SECTION 1/1.4 SaaS SECURITY/SEC545- SANS OnDemand_16_2.webm 6.2 MB
545 Videos/SECTION 3/3.3 INFRASTRUCTURE AND CORE COMPONENT SECURITY/SEC545- SANS OnDemand_10_3.webm 6.2 MB
545 Videos/SECTION 2/2.5 IDENTITY AND ACCESS MANAGEMENT/SEC545- SANS OnDemand_4_2.webm 6.1 MB
545 Videos/SECTION 1/1.5 INTRO TO PaaS AND IaaS SECURITY CONTROLS/SEC545- SANS OnDemand_55.webm 6.1 MB
545 Videos/SECTION 2/2.4 INSTANCE AND IMAGE SECURITY/SEC545- SANS OnDemand_5.webm 6.1 MB
545 Videos/SECTION 1/1.1 INTRO AND BASICS/SEC545- SANS OnDemand_9.webm 6.1 MB
545 Videos/SECTION 4/4.4 INTRUSTION DETECTION IN THE CLOUD/SEC545- SANS OnDemand_4.webm 6.1 MB
545 Videos/SECTION 1/1.4 SaaS SECURITY/SEC545- SANS OnDemand_17_2.webm 6.1 MB
545 Videos/SECTION 4/4.5 CLOUD IR AND EVENT MANAGEMENT/SEC545- SANS OnDemand_10.webm 6.0 MB
545 Videos/SECTION 5/5.1 SCRIPTING AND AUTOMATION IN THE CLOUD/SEC545- SANS OnDemand_19.webm 6.0 MB
545 Videos/SECTION 2/2.3 CLOUD NETWORK SECURITY/SEC545- SANS OnDemand_12_2.webm 6.0 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_76.webm 6.0 MB
545 Videos/SECTION 4/4.2 VULNERABILITY MANAGEMENT IN THE CLOUD/SEC545- SANS OnDemand_11_2.webm 6.0 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_79.webm 6.0 MB
545 Videos/SECTION 5/5.3 CREATING SECURE CLOUD WORKFLOWS/SEC545- SANS OnDemand_17.webm 5.9 MB
545 Videos/SECTION 1/1.1 INTRO AND BASICS/SEC545- SANS OnDemand_19.webm 5.9 MB
545 Videos/SECTION 1/1.4 SaaS SECURITY/SEC545- SANS OnDemand_24_2.webm 5.9 MB
545 Videos/SECTION 2/2.3 CLOUD NETWORK SECURITY/SEC545- SANS OnDemand_10_2.webm 5.9 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_80.webm 5.9 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_14.webm 5.9 MB
545 Videos/SECTION 1/1.3 CLOUD POLICY AND PLANNING/SEC545- SANS OnDemand_8.webm 5.8 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_28.webm 5.8 MB
545 Videos/SECTION 2/2.2 A VIRTUALIZATION SECURITY PRIMER/SEC545- SANS OnDemand_12.webm 5.8 MB
545 Videos/SECTION 1/1.1 INTRO AND BASICS/SEC545- SANS OnDemand_24.webm 5.8 MB
545 Videos/SECTION 4/4.3 CLOUD PEN TESTING/SEC545- SANS OnDemand_5_2.webm 5.7 MB
545 Videos/SECTION 1/1.4 SaaS SECURITY/SEC545- SANS OnDemand_21_2.webm 5.7 MB
545 Videos/SECTION 4/4.6 CLOUD FORENSICS/SEC545- SANS OnDemand_18_2.webm 5.7 MB
545 Videos/SECTION 5/5.3 CREATING SECURE CLOUD WORKFLOWS/SEC545- SANS OnDemand_6_2.webm 5.7 MB
545 Videos/SECTION 2/2.7 APPLICATION SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_61.webm 5.7 MB
545 Videos/SECTION 2/2.3 CLOUD NETWORK SECURITY/SEC545- SANS OnDemand_11_2.webm 5.7 MB
545 Videos/SECTION 2/2.6 DATA SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_40.webm 5.7 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_33.webm 5.6 MB
545 Videos/SECTION 2/2.2 A VIRTUALIZATION SECURITY PRIMER/SEC545- SANS OnDemand_10.webm 5.6 MB
545 Videos/SECTION 5/5.3 CREATING SECURE CLOUD WORKFLOWS/SEC545- SANS OnDemand_46.webm 5.6 MB
545 Videos/SECTION 1/1.4 SaaS SECURITY/SEC545- SANS OnDemand_7_2.webm 5.5 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_43.webm 5.5 MB
545 Videos/SECTION 2/2.2 A VIRTUALIZATION SECURITY PRIMER/SEC545- SANS OnDemand_4.webm 5.5 MB
545 Videos/SECTION 1/1.5 INTRO TO PaaS AND IaaS SECURITY CONTROLS/SEC545- SANS OnDemand_18.webm 5.5 MB
545 Videos/SECTION 3/3.3 INFRASTRUCTURE AND CORE COMPONENT SECURITY/SEC545- SANS OnDemand_2.webm 5.5 MB
545 Videos/SECTION 2/2.3 CLOUD NETWORK SECURITY/SEC545- SANS OnDemand_7_2.webm 5.5 MB
545 Videos/SECTION 5/5.3 CREATING SECURE CLOUD WORKFLOWS/SEC545- SANS OnDemand_11.webm 5.5 MB
545 Videos/SECTION 2/2.1 CLOUD SECURITY; IN-HOUSE VERSUS CLOUD/SEC545- SANS OnDemand_4_2.webm 5.5 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_86.webm 5.5 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_41.webm 5.5 MB
545 Videos/SECTION 2/2.4 INSTANCE AND IMAGE SECURITY/SEC545- SANS OnDemand_2.webm 5.4 MB
545 Videos/SECTION 4/4.2 VULNERABILITY MANAGEMENT IN THE CLOUD/SEC545- SANS OnDemand_8.webm 5.4 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_24.webm 5.4 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_39.webm 5.4 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_36.webm 5.3 MB
545 Videos/SECTION 4/4.5 CLOUD IR AND EVENT MANAGEMENT/SEC545- SANS OnDemand_10_2.webm 5.3 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_55.webm 5.3 MB
545 Videos/SECTION 1/1.3 CLOUD POLICY AND PLANNING/SEC545- SANS OnDemand_27.webm 5.3 MB
545 Videos/SECTION 3/3.2 CLOUD ARCHITECTURE AND SECURITY PRINCIPLES/SEC545- SANS OnDemand_5_2.webm 5.2 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_42.webm 5.2 MB
545 Videos/SECTION 2/2.3 CLOUD NETWORK SECURITY/SEC545- SANS OnDemand_9_2.webm 5.2 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_7_2.webm 5.2 MB
545 Videos/SECTION 4/4.3 CLOUD PEN TESTING/SEC545- SANS OnDemand_14.webm 5.2 MB
545 Videos/SECTION 1/1.5 INTRO TO PaaS AND IaaS SECURITY CONTROLS/SEC545- SANS OnDemand_56.webm 5.2 MB
545 Videos/SECTION 2/2.6 DATA SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_17_2.webm 5.1 MB
545 Videos/SECTION 3/3.2 CLOUD ARCHITECTURE AND SECURITY PRINCIPLES/SEC545- SANS OnDemand_22.webm 5.1 MB
545 Videos/SECTION 1/1.5 INTRO TO PaaS AND IaaS SECURITY CONTROLS/SEC545- SANS OnDemand_8.webm 5.1 MB
545 Videos/SECTION 5/5.3 CREATING SECURE CLOUD WORKFLOWS/SEC545- SANS OnDemand_44.webm 5.1 MB
545 Videos/SECTION 4/4.5 CLOUD IR AND EVENT MANAGEMENT/SEC545- SANS OnDemand_24.webm 5.1 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_56.webm 5.1 MB
545 Videos/SECTION 1/1.4 SaaS SECURITY/SEC545- SANS OnDemand_6_2.webm 5.1 MB
545 Videos/SECTION 4/4.3 CLOUD PEN TESTING/SEC545- SANS OnDemand_12.webm 5.1 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_13.webm 5.0 MB
545 Videos/SECTION 5/5.3 CREATING SECURE CLOUD WORKFLOWS/SEC545- SANS OnDemand_19.webm 5.0 MB
545 Videos/SECTION 5/5.3 CREATING SECURE CLOUD WORKFLOWS/SEC545- SANS OnDemand_45.webm 5.0 MB
545 Videos/SECTION 2/2.6 DATA SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_9.webm 5.0 MB
545 Videos/SECTION 1/1.5 INTRO TO PaaS AND IaaS SECURITY CONTROLS/SEC545- SANS OnDemand_6.webm 5.0 MB
545 Videos/SECTION 5/5.3 CREATING SECURE CLOUD WORKFLOWS/SEC545- SANS OnDemand_5_2.webm 5.0 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_42.webm 4.9 MB
545 Videos/SECTION 2/2.6 DATA SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_31.webm 4.9 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_37.webm 4.9 MB
545 Videos/SECTION 3/3.3 INFRASTRUCTURE AND CORE COMPONENT SECURITY/SEC545- SANS OnDemand_14_2.webm 4.9 MB
545 Videos/SECTION 1/1.4 SaaS SECURITY/SEC545- SANS OnDemand_27_2.webm 4.9 MB
545 Videos/SECTION 3/3.3 INFRASTRUCTURE AND CORE COMPONENT SECURITY/SEC545- SANS OnDemand_6.webm 4.9 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_30.webm 4.9 MB
545 Videos/SECTION 3/3.2 CLOUD ARCHITECTURE AND SECURITY PRINCIPLES/SEC545- SANS OnDemand_9_2.webm 4.8 MB
545 Videos/SECTION 4/4.5 CLOUD IR AND EVENT MANAGEMENT/SEC545- SANS OnDemand_16.webm 4.8 MB
545 Videos/SECTION 1/1.5 INTRO TO PaaS AND IaaS SECURITY CONTROLS/SEC545- SANS OnDemand_14.webm 4.8 MB
545 Videos/SECTION 1/1.5 INTRO TO PaaS AND IaaS SECURITY CONTROLS/SEC545- SANS OnDemand_45.webm 4.8 MB
545 Videos/SECTION 4/4.5 CLOUD IR AND EVENT MANAGEMENT/SEC545- SANS OnDemand_8_2.webm 4.8 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_22.webm 4.8 MB
545 Videos/SECTION 3/3.3 INFRASTRUCTURE AND CORE COMPONENT SECURITY/SEC545- SANS OnDemand_7.webm 4.7 MB
545 Videos/SECTION 5/5.3 CREATING SECURE CLOUD WORKFLOWS/SEC545- SANS OnDemand_23.webm 4.7 MB
545 Videos/SECTION 1/1.3 CLOUD POLICY AND PLANNING/SEC545- SANS OnDemand_14.webm 4.7 MB
545 Videos/SECTION 1/1.5 INTRO TO PaaS AND IaaS SECURITY CONTROLS/SEC545- SANS OnDemand_13.webm 4.7 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_10_2.webm 4.7 MB
545 Videos/SECTION 5/5.2 DevSecOps PRINCIPLES/SEC545- SANS OnDemand_7.webm 4.7 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_91.webm 4.7 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_64.webm 4.6 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_19.webm 4.6 MB
545 Videos/SECTION 2/2.3 CLOUD NETWORK SECURITY/SEC545- SANS OnDemand_13_2.webm 4.6 MB
545 Videos/SECTION 4/4.3 CLOUD PEN TESTING/SEC545- SANS OnDemand_4_2.webm 4.6 MB
545 Videos/SECTION 1/1.4 SaaS SECURITY/SEC545- SANS OnDemand_12_2.webm 4.6 MB
545 Videos/SECTION 3/3.3 INFRASTRUCTURE AND CORE COMPONENT SECURITY/SEC545- SANS OnDemand_8.webm 4.6 MB
545 Videos/SECTION 1/1.4 SaaS SECURITY/SEC545- SANS OnDemand_14_2.webm 4.6 MB
545 Videos/SECTION 2/2.6 DATA SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_42.webm 4.6 MB
545 Videos/SECTION 3/3.3 INFRASTRUCTURE AND CORE COMPONENT SECURITY/SEC545- SANS OnDemand_12_2.webm 4.6 MB
545 Videos/SECTION 1/1.3 CLOUD POLICY AND PLANNING/SEC545- SANS OnDemand_20.webm 4.5 MB
545 Videos/SECTION 3/3.3 INFRASTRUCTURE AND CORE COMPONENT SECURITY/SEC545- SANS OnDemand_16_2.webm 4.5 MB
545 Videos/SECTION 5/5.4 BUILDING AUTOMATED EVENT MANAGEMENT AND DEFENSIVE STRATEGIES/SEC545- SANS OnDemand_8.webm 4.5 MB
545 Videos/SECTION 2/2.6 DATA SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_14_2.webm 4.4 MB
545 Videos/SECTION 2/2.1 CLOUD SECURITY; IN-HOUSE VERSUS CLOUD/SEC545- SANS OnDemand_5_2.webm 4.4 MB
545 Videos/SECTION 1/1.4 SaaS SECURITY/SEC545- SANS OnDemand_15_2.webm 4.4 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_19.webm 4.4 MB
545 Videos/SECTION 1/1.4 SaaS SECURITY/SEC545- SANS OnDemand_18_2.webm 4.4 MB
545 Videos/SECTION 2/2.7 APPLICATION SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_7_2.webm 4.4 MB
545 Videos/SECTION 5/5.3 CREATING SECURE CLOUD WORKFLOWS/SEC545- SANS OnDemand_43.webm 4.4 MB
545 Videos/SECTION 1/1.4 SaaS SECURITY/SEC545- SANS OnDemand_3_2.webm 4.3 MB
545 Videos/SECTION 2/2.5 IDENTITY AND ACCESS MANAGEMENT/SEC545- SANS OnDemand_15.webm 4.3 MB
545 Videos/SECTION 2/2.5 IDENTITY AND ACCESS MANAGEMENT/SEC545- SANS OnDemand_16.webm 4.3 MB
545 Videos/SECTION 4/4.5 CLOUD IR AND EVENT MANAGEMENT/SEC545- SANS OnDemand_3_2.webm 4.3 MB
545 Videos/SECTION 1/1.4 SaaS SECURITY/SEC545- SANS OnDemand_2_2.webm 4.3 MB
545 Videos/SECTION 2/2.6 DATA SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_16_2.webm 4.3 MB
545 Videos/SECTION 2/2.6 DATA SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_21.webm 4.2 MB
545 Videos/SECTION 4/4.6 CLOUD FORENSICS/SEC545- SANS OnDemand_6.webm 4.2 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_4_2.webm 4.2 MB
545 Videos/SECTION 2/2.5 IDENTITY AND ACCESS MANAGEMENT/SEC545- SANS OnDemand_14.webm 4.2 MB
545 Videos/SECTION 1/1.5 INTRO TO PaaS AND IaaS SECURITY CONTROLS/SEC545- SANS OnDemand_35.webm 4.2 MB
545 Videos/SECTION 4/4.5 CLOUD IR AND EVENT MANAGEMENT/SEC545- SANS OnDemand_9_2.webm 4.2 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_25.webm 4.2 MB
545 Videos/SECTION 3/3.5 AVAILABILITY/SEC545- SANS OnDemand_19_2.webm 4.2 MB
545 Videos/SECTION 4/4.2 VULNERABILITY MANAGEMENT IN THE CLOUD/SEC545- SANS OnDemand_5.webm 4.2 MB
545 Videos/SECTION 3/3.5 AVAILABILITY/SEC545- SANS OnDemand_9.webm 4.2 MB
545 Videos/SECTION 4/4.5 CLOUD IR AND EVENT MANAGEMENT/SEC545- SANS OnDemand_6_2.webm 4.1 MB
545 Videos/SECTION 2/2.6 DATA SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_5.webm 4.1 MB
545 Videos/SECTION 5/5.3 CREATING SECURE CLOUD WORKFLOWS/SEC545- SANS OnDemand_22.webm 4.1 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_54.webm 4.1 MB
545 Videos/SECTION 1/1.1 INTRO AND BASICS/SEC545- SANS OnDemand_14.webm 4.1 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_44.webm 4.1 MB
545 Videos/SECTION 2/2.6 DATA SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_23.webm 4.1 MB
545 Videos/SECTION 5/5.5 TOOLS, TACTICS AND USE CASES/SEC545- SANS OnDemand_21.webm 4.1 MB
545 Videos/SECTION 2/2.3 CLOUD NETWORK SECURITY/SEC545- SANS OnDemand_6_2.webm 4.1 MB
545 Videos/SECTION 2/2.6 DATA SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_60.webm 4.1 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_43.webm 4.1 MB
545 Videos/SECTION 4/4.6 CLOUD FORENSICS/SEC545- SANS OnDemand_3.webm 4.1 MB
545 Videos/SECTION 5/5.5 TOOLS, TACTICS AND USE CASES/SEC545- SANS OnDemand_4_2.webm 4.1 MB
545 Videos/SECTION 5/5.3 CREATING SECURE CLOUD WORKFLOWS/SEC545- SANS OnDemand_8_2.webm 4.0 MB
545 Videos/SECTION 1/1.5 INTRO TO PaaS AND IaaS SECURITY CONTROLS/SEC545- SANS OnDemand_51.webm 4.0 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_23.webm 4.0 MB
545 Videos/SECTION 4/4.6 CLOUD FORENSICS/SEC545- SANS OnDemand_8.webm 4.0 MB
545 Videos/SECTION 5/5.4 BUILDING AUTOMATED EVENT MANAGEMENT AND DEFENSIVE STRATEGIES/SEC545- SANS OnDemand_3.webm 4.0 MB
545 Videos/SECTION 5/5.3 CREATING SECURE CLOUD WORKFLOWS/SEC545- SANS OnDemand_10.webm 4.0 MB
545 Videos/SECTION 3/3.2 CLOUD ARCHITECTURE AND SECURITY PRINCIPLES/SEC545- SANS OnDemand_24.webm 4.0 MB
545 Videos/SECTION 4/4.6 CLOUD FORENSICS/SEC545- SANS OnDemand_13_2.webm 4.0 MB
545 Videos/SECTION 3/3.2 CLOUD ARCHITECTURE AND SECURITY PRINCIPLES/SEC545- SANS OnDemand_19.webm 4.0 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_11.webm 4.0 MB
545 Videos/SECTION 2/2.4 INSTANCE AND IMAGE SECURITY/SEC545- SANS OnDemand_9.webm 4.0 MB
545 Videos/SECTION 1/1.5 INTRO TO PaaS AND IaaS SECURITY CONTROLS/SEC545- SANS OnDemand_22.webm 4.0 MB
545 Videos/SECTION 3/3.5 AVAILABILITY/SEC545- SANS OnDemand_13_2.webm 4.0 MB
545 Videos/SECTION 5/5.1 SCRIPTING AND AUTOMATION IN THE CLOUD/SEC545- SANS OnDemand_8_2.webm 4.0 MB
545 Videos/SECTION 1/1.5 INTRO TO PaaS AND IaaS SECURITY CONTROLS/SEC545- SANS OnDemand_40.webm 4.0 MB
545 Videos/SECTION 3/3.1 CLOUD SECURITY ARCHITECTURE OVERVIEW/SEC545- SANS OnDemand_3.webm 4.0 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_9_2.webm 4.0 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_61.webm 4.0 MB
545 Videos/SECTION 1/1.4 SaaS SECURITY/SEC545- SANS OnDemand_8_2.webm 3.9 MB
545 Videos/SECTION 5/5.3 CREATING SECURE CLOUD WORKFLOWS/SEC545- SANS OnDemand_14.webm 3.9 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_12.webm 3.9 MB
545 Videos/SECTION 1/1.3 CLOUD POLICY AND PLANNING/SEC545- SANS OnDemand_18.webm 3.9 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_34.webm 3.9 MB
545 Videos/SECTION 1/1.4 SaaS SECURITY/SEC545- SANS OnDemand_23_2.webm 3.9 MB
545 Videos/SECTION 5/5.3 CREATING SECURE CLOUD WORKFLOWS/SEC545- SANS OnDemand_12.webm 3.9 MB
545 Videos/SECTION 2/2.3 CLOUD NETWORK SECURITY/SEC545- SANS OnDemand_3_2.webm 3.9 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_40.webm 3.9 MB
545 Videos/SECTION 3/3.2 CLOUD ARCHITECTURE AND SECURITY PRINCIPLES/SEC545- SANS OnDemand_15.webm 3.9 MB
545 Videos/SECTION 2/2.2 A VIRTUALIZATION SECURITY PRIMER/SEC545- SANS OnDemand_3.webm 3.8 MB
545 Videos/SECTION 2/2.5 IDENTITY AND ACCESS MANAGEMENT/SEC545- SANS OnDemand_10_2.webm 3.8 MB
545 Videos/SECTION 1/1.3 CLOUD POLICY AND PLANNING/SEC545- SANS OnDemand_23.webm 3.8 MB
545 Videos/SECTION 5/5.3 CREATING SECURE CLOUD WORKFLOWS/SEC545- SANS OnDemand_9_2.webm 3.8 MB
545 Videos/SECTION 5/5.3 CREATING SECURE CLOUD WORKFLOWS/SEC545- SANS OnDemand_35.webm 3.8 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_40.webm 3.8 MB
545 Videos/SECTION 1/1.4 SaaS SECURITY/SEC545- SANS OnDemand_20_2.webm 3.8 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_27.webm 3.8 MB
545 Videos/SECTION 4/4.6 CLOUD FORENSICS/SEC545- SANS OnDemand_16_2.webm 3.7 MB
545 Videos/SECTION 2/2.4 INSTANCE AND IMAGE SECURITY/SEC545- SANS OnDemand_11.webm 3.7 MB
545 Videos/SECTION 3/3.5 AVAILABILITY/SEC545- SANS OnDemand_15_2.webm 3.7 MB
545 Videos/SECTION 2/2.7 APPLICATION SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_9_2.webm 3.7 MB
545 Videos/SECTION 4/4.2 VULNERABILITY MANAGEMENT IN THE CLOUD/SEC545- SANS OnDemand_2.webm 3.7 MB
545 Videos/SECTION 5/5.6 CLASS WRAP-UP/SEC545- SANS OnDemand.webm 3.7 MB
545 Videos/SECTION 3/3.2 CLOUD ARCHITECTURE AND SECURITY PRINCIPLES/SEC545- SANS OnDemand_11.webm 3.7 MB
545 Videos/SECTION 5/5.3 CREATING SECURE CLOUD WORKFLOWS/SEC545- SANS OnDemand_21.webm 3.7 MB
545 Videos/SECTION 1/1.3 CLOUD POLICY AND PLANNING/SEC545- SANS OnDemand_10.webm 3.7 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_63.webm 3.7 MB
545 Videos/SECTION 4/4.5 CLOUD IR AND EVENT MANAGEMENT/SEC545- SANS OnDemand_13.webm 3.6 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_56.webm 3.6 MB
545 Videos/SECTION 1/1.5 INTRO TO PaaS AND IaaS SECURITY CONTROLS/SEC545- SANS OnDemand_17.webm 3.6 MB
545 Videos/SECTION 4/4.3 CLOUD PEN TESTING/SEC545- SANS OnDemand_2_2.webm 3.6 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_27.webm 3.6 MB
545 Videos/SECTION 2/2.6 DATA SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_25.webm 3.6 MB
545 Videos/SECTION 1/1.5 INTRO TO PaaS AND IaaS SECURITY CONTROLS/SEC545- SANS OnDemand_25.webm 3.6 MB
545 Videos/SECTION 5/5.3 CREATING SECURE CLOUD WORKFLOWS/SEC545- SANS OnDemand_3_2.webm 3.6 MB
545 Videos/SECTION 4/4.4 INTRUSTION DETECTION IN THE CLOUD/SEC545- SANS OnDemand_6.webm 3.6 MB
545 Videos/SECTION 3/3.3 INFRASTRUCTURE AND CORE COMPONENT SECURITY/SEC545- SANS OnDemand_15_2.webm 3.6 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_20.webm 3.6 MB
545 Videos/SECTION 3/3.5 AVAILABILITY/SEC545- SANS OnDemand_16_2.webm 3.6 MB
545 Videos/SECTION 1/1.3 CLOUD POLICY AND PLANNING/SEC545- SANS OnDemand_4.webm 3.6 MB
545 Videos/SECTION 5/5.1 SCRIPTING AND AUTOMATION IN THE CLOUD/SEC545- SANS OnDemand_10_2.webm 3.6 MB
545 Videos/SECTION 2/2.6 DATA SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_28.webm 3.6 MB
545 Videos/SECTION 1/1.5 INTRO TO PaaS AND IaaS SECURITY CONTROLS/SEC545- SANS OnDemand_41.webm 3.6 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_21.webm 3.5 MB
545 Videos/SECTION 5/5.3 CREATING SECURE CLOUD WORKFLOWS/SEC545- SANS OnDemand_18.webm 3.5 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_58.webm 3.5 MB
545 Videos/SECTION 3/3.2 CLOUD ARCHITECTURE AND SECURITY PRINCIPLES/SEC545- SANS OnDemand_7_2.webm 3.5 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_8_2.webm 3.5 MB
545 Videos/SECTION 2/2.2 A VIRTUALIZATION SECURITY PRIMER/SEC545- SANS OnDemand_8.webm 3.5 MB
545 Videos/SECTION 5/5.3 CREATING SECURE CLOUD WORKFLOWS/SEC545- SANS OnDemand_33.webm 3.5 MB
545 Videos/SECTION 4/4.5 CLOUD IR AND EVENT MANAGEMENT/SEC545- SANS OnDemand_4_2.webm 3.5 MB
545 Videos/SECTION 2/2.6 DATA SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_12_3.webm 3.5 MB
545 Videos/SECTION 4/4.5 CLOUD IR AND EVENT MANAGEMENT/SEC545- SANS OnDemand_12.webm 3.5 MB
545 Videos/SECTION 2/2.6 DATA SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_52.webm 3.4 MB
545 Videos/SECTION 5/5.5 TOOLS, TACTICS AND USE CASES/SEC545- SANS OnDemand_9_2.webm 3.4 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_12.webm 3.4 MB
545 Videos/SECTION 5/5.3 CREATING SECURE CLOUD WORKFLOWS/SEC545- SANS OnDemand_25.webm 3.4 MB
545 Videos/SECTION 2/2.6 DATA SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_56.webm 3.4 MB
545 Videos/SECTION 3/3.3 INFRASTRUCTURE AND CORE COMPONENT SECURITY/SEC545- SANS OnDemand_11_2.webm 3.4 MB
545 Videos/SECTION 3/3.3 INFRASTRUCTURE AND CORE COMPONENT SECURITY/SEC545- SANS OnDemand_4.webm 3.4 MB
545 Videos/SECTION 2/2.6 DATA SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_37.webm 3.3 MB
545 Videos/SECTION 4/4.5 CLOUD IR AND EVENT MANAGEMENT/SEC545- SANS OnDemand_17.webm 3.3 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_20.webm 3.3 MB
545 Videos/SECTION 5/5.4 BUILDING AUTOMATED EVENT MANAGEMENT AND DEFENSIVE STRATEGIES/SEC545- SANS OnDemand_5.webm 3.3 MB
545 Videos/SECTION 4/4.3 CLOUD PEN TESTING/SEC545- SANS OnDemand_9_2.webm 3.3 MB
545 Videos/SECTION 2/2.7 APPLICATION SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_11_2.webm 3.3 MB
545 Videos/SECTION 2/2.6 DATA SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_51.webm 3.3 MB
545 Videos/SECTION 3/3.5 AVAILABILITY/SEC545- SANS OnDemand_8.webm 3.3 MB
545 Videos/SECTION 4/4.3 CLOUD PEN TESTING/SEC545- SANS OnDemand_11.webm 3.3 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_13.webm 3.3 MB
545 Videos/SECTION 4/4.5 CLOUD IR AND EVENT MANAGEMENT/SEC545- SANS OnDemand_19.webm 3.3 MB
545 Videos/SECTION 2/2.6 DATA SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_6.webm 3.3 MB
545 Videos/SECTION 5/5.5 TOOLS, TACTICS AND USE CASES/SEC545- SANS OnDemand_16.webm 3.3 MB
545 Videos/SECTION 2/2.6 DATA SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_44.webm 3.3 MB
545 Videos/SECTION 2/2.6 DATA SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_43.webm 3.2 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_45.webm 3.2 MB
545 Videos/SECTION 1/1.3 CLOUD POLICY AND PLANNING/SEC545- SANS OnDemand_13.webm 3.2 MB
545 Videos/SECTION 5/5.1 SCRIPTING AND AUTOMATION IN THE CLOUD/SEC545- SANS OnDemand_18.webm 3.2 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_59.webm 3.2 MB
545 Videos/SECTION 4/4.5 CLOUD IR AND EVENT MANAGEMENT/SEC545- SANS OnDemand_14.webm 3.2 MB
545 Videos/SECTION 4/4.3 CLOUD PEN TESTING/SEC545- SANS OnDemand_7_2.webm 3.2 MB
545 Videos/SECTION 2/2.3 CLOUD NETWORK SECURITY/SEC545- SANS OnDemand_17.webm 3.2 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_24.webm 3.2 MB
545 Videos/SECTION 1/1.5 INTRO TO PaaS AND IaaS SECURITY CONTROLS/SEC545- SANS OnDemand_53.webm 3.2 MB
545 Videos/SECTION 1/1.3 CLOUD POLICY AND PLANNING/SEC545- SANS OnDemand_9.webm 3.2 MB
545 Videos/SECTION 4/4.2 VULNERABILITY MANAGEMENT IN THE CLOUD/SEC545- SANS OnDemand_10_3.webm 3.2 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_57.webm 3.2 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_57.webm 3.2 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_28.webm 3.1 MB
545 Videos/SECTION 4/4.2 VULNERABILITY MANAGEMENT IN THE CLOUD/SEC545- SANS OnDemand_4.webm 3.1 MB
545 Videos/SECTION 3/3.3 INFRASTRUCTURE AND CORE COMPONENT SECURITY/SEC545- SANS OnDemand_9.webm 3.1 MB
545 Videos/SECTION 1/1.2 CLOUD SECURITY ALLIANCE GUIDANCE/SEC545- SANS OnDemand_11_2.webm 3.1 MB
545 Videos/SECTION 5/5.3 CREATING SECURE CLOUD WORKFLOWS/SEC545- SANS OnDemand_32.webm 3.1 MB
545 Videos/SECTION 2/2.5 IDENTITY AND ACCESS MANAGEMENT/SEC545- SANS OnDemand_8_2.webm 3.1 MB
545 Videos/SECTION 5/5.3 CREATING SECURE CLOUD WORKFLOWS/SEC545- SANS OnDemand_41.webm 3.1 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_29.webm 3.1 MB
545 Videos/SECTION 1/1.5 INTRO TO PaaS AND IaaS SECURITY CONTROLS/SEC545- SANS OnDemand_39.webm 3.1 MB
545 Videos/SECTION 1/1.5 INTRO TO PaaS AND IaaS SECURITY CONTROLS/SEC545- SANS OnDemand_5.webm 3.1 MB
545 Videos/SECTION 2/2.6 DATA SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_8.webm 3.1 MB
545 Videos/SECTION 1/1.3 CLOUD POLICY AND PLANNING/SEC545- SANS OnDemand_21.webm 3.1 MB
545 Videos/SECTION 5/5.5 TOOLS, TACTICS AND USE CASES/SEC545- SANS OnDemand_13.webm 3.0 MB
545 Videos/SECTION 1/1.1 INTRO AND BASICS/SEC545- SANS OnDemand_20.webm 3.0 MB
545 Videos/SECTION 4/4.6 CLOUD FORENSICS/SEC545- SANS OnDemand_5.webm 3.0 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_59.webm 3.0 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_78.webm 3.0 MB
545 Videos/SECTION 5/5.5 TOOLS, TACTICS AND USE CASES/SEC545- SANS OnDemand_3_2.webm 3.0 MB
545 Videos/SECTION 1/1.5 INTRO TO PaaS AND IaaS SECURITY CONTROLS/SEC545- SANS OnDemand_43.webm 3.0 MB
545 Videos/SECTION 5/5.5 TOOLS, TACTICS AND USE CASES/SEC545- SANS OnDemand_8_2.webm 3.0 MB
545 Videos/SECTION 1/1.2 CLOUD SECURITY ALLIANCE GUIDANCE/SEC545- SANS OnDemand_3_2.webm 3.0 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_39.webm 3.0 MB
545 Videos/SECTION 1/1.4 SaaS SECURITY/SEC545- SANS OnDemand_25_2.webm 3.0 MB
545 Videos/SECTION 2/2.6 DATA SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_11.webm 3.0 MB
545 Videos/SECTION 2/2.6 DATA SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_49.webm 3.0 MB
545 Videos/SECTION 2/2.6 DATA SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_36.webm 2.9 MB
545 Videos/SECTION 2/2.6 DATA SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_47.webm 2.9 MB
545 Videos/SECTION 1/1.5 INTRO TO PaaS AND IaaS SECURITY CONTROLS/SEC545- SANS OnDemand_16.webm 2.9 MB
545 Videos/SECTION 2/2.6 DATA SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_4.webm 2.9 MB
545 Videos/SECTION 1/1.2 CLOUD SECURITY ALLIANCE GUIDANCE/SEC545- SANS OnDemand_12_2.webm 2.9 MB
545 Videos/SECTION 1/1.3 CLOUD POLICY AND PLANNING/SEC545- SANS OnDemand_16.webm 2.9 MB
545 Videos/SECTION 5/5.3 CREATING SECURE CLOUD WORKFLOWS/SEC545- SANS OnDemand_40.webm 2.9 MB
545 Videos/SECTION 5/5.3 CREATING SECURE CLOUD WORKFLOWS/SEC545- SANS OnDemand_20.webm 2.9 MB
545 Videos/SECTION 2/2.6 DATA SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_41.webm 2.9 MB
545 Videos/SECTION 3/3.2 CLOUD ARCHITECTURE AND SECURITY PRINCIPLES/SEC545- SANS OnDemand_14.webm 2.9 MB
545 Videos/SECTION 1/1.5 INTRO TO PaaS AND IaaS SECURITY CONTROLS/SEC545- SANS OnDemand_7.webm 2.8 MB
545 Videos/SECTION 2/2.5 IDENTITY AND ACCESS MANAGEMENT/SEC545- SANS OnDemand_9_2.webm 2.8 MB
545 Videos/SECTION 4/4.5 CLOUD IR AND EVENT MANAGEMENT/SEC545- SANS OnDemand_29.webm 2.8 MB
545 Videos/SECTION 1/1.2 CLOUD SECURITY ALLIANCE GUIDANCE/SEC545- SANS OnDemand_5_2.webm 2.8 MB
545 Videos/SECTION 5/5.5 TOOLS, TACTICS AND USE CASES/SEC545- SANS OnDemand_7_2.webm 2.8 MB
545 Videos/SECTION 4/4.6 CLOUD FORENSICS/SEC545- SANS OnDemand_10_3.webm 2.8 MB
545 Videos/SECTION 2/2.6 DATA SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_30.webm 2.8 MB
545 Videos/SECTION 4/4.2 VULNERABILITY MANAGEMENT IN THE CLOUD/SEC545- SANS OnDemand_7.webm 2.8 MB
545 Videos/SECTION 5/5.3 CREATING SECURE CLOUD WORKFLOWS/SEC545- SANS OnDemand_16.webm 2.8 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_2_2.webm 2.7 MB
545 Videos/SECTION 1/1.4 SaaS SECURITY/SEC545- SANS OnDemand_11_2.webm 2.7 MB
545 Videos/SECTION 5/5.3 CREATING SECURE CLOUD WORKFLOWS/SEC545- SANS OnDemand_39.webm 2.7 MB
545 Videos/SECTION 2/2.1 CLOUD SECURITY; IN-HOUSE VERSUS CLOUD/SEC545- SANS OnDemand_3_2.webm 2.7 MB
545 Videos/SECTION 5/5.5 TOOLS, TACTICS AND USE CASES/SEC545- SANS OnDemand_14.webm 2.7 MB
545 Videos/SECTION 1/1.5 INTRO TO PaaS AND IaaS SECURITY CONTROLS/SEC545- SANS OnDemand_23.webm 2.7 MB
545 Videos/SECTION 1/1.1 INTRO AND BASICS/SEC545- SANS OnDemand_7.webm 2.7 MB
545 Videos/SECTION 1/1.5 INTRO TO PaaS AND IaaS SECURITY CONTROLS/SEC545- SANS OnDemand_48.webm 2.7 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_11.webm 2.7 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_22.webm 2.7 MB
545 Videos/SECTION 4/4.3 CLOUD PEN TESTING/SEC545- SANS OnDemand_3_2.webm 2.7 MB
545 Videos/SECTION 4/4.6 CLOUD FORENSICS/SEC545- SANS OnDemand_2.webm 2.7 MB
545 Videos/SECTION 5/5.5 TOOLS, TACTICS AND USE CASES/SEC545- SANS OnDemand_12.webm 2.7 MB
545 Videos/SECTION 1/1.1 INTRO AND BASICS/SEC545- SANS OnDemand_11.webm 2.7 MB
545 Videos/SECTION 4/4.4 INTRUSTION DETECTION IN THE CLOUD/SEC545- SANS OnDemand_7.webm 2.6 MB
545 Videos/SECTION 3/3.2 CLOUD ARCHITECTURE AND SECURITY PRINCIPLES/SEC545- SANS OnDemand_8_2.webm 2.6 MB
545 Videos/SECTION 1/1.5 INTRO TO PaaS AND IaaS SECURITY CONTROLS/SEC545- SANS OnDemand_54.webm 2.6 MB
545 Videos/SECTION 1/1.5 INTRO TO PaaS AND IaaS SECURITY CONTROLS/SEC545- SANS OnDemand_21.webm 2.6 MB
545 Videos/SECTION 1/1.1 INTRO AND BASICS/SEC545- SANS OnDemand_13.webm 2.6 MB
545 Videos/SECTION 5/5.3 CREATING SECURE CLOUD WORKFLOWS/SEC545- SANS OnDemand_28.webm 2.6 MB
545 Videos/SECTION 2/2.6 DATA SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_33.webm 2.6 MB
545 Videos/SECTION 5/5.4 BUILDING AUTOMATED EVENT MANAGEMENT AND DEFENSIVE STRATEGIES/SEC545- SANS OnDemand_2.webm 2.6 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_67.webm 2.6 MB
545 Videos/SECTION 5/5.1 SCRIPTING AND AUTOMATION IN THE CLOUD/SEC545- SANS OnDemand_11.webm 2.5 MB
545 Videos/SECTION 5/5.3 CREATING SECURE CLOUD WORKFLOWS/SEC545- SANS OnDemand_26.webm 2.5 MB
545 Videos/SECTION 2/2.6 DATA SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_18_2.webm 2.5 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_50.webm 2.5 MB
545 Videos/SECTION 1/1.3 CLOUD POLICY AND PLANNING/SEC545- SANS OnDemand_17.webm 2.5 MB
545 Videos/SECTION 1/1.5 INTRO TO PaaS AND IaaS SECURITY CONTROLS/SEC545- SANS OnDemand_15.webm 2.5 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_73.webm 2.5 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_32.webm 2.5 MB
545 Videos/SECTION 1/1.4 SaaS SECURITY/SEC545- SANS OnDemand_19_2.webm 2.5 MB
545 Videos/SECTION 3/3.1 CLOUD SECURITY ARCHITECTURE OVERVIEW/SEC545- SANS OnDemand_5.webm 2.5 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_87.webm 2.5 MB
545 Videos/SECTION 1/1.1 INTRO AND BASICS/SEC545- SANS OnDemand_10.webm 2.5 MB
545 Videos/SECTION 1/1.4 SaaS SECURITY/SEC545- SANS OnDemand_13_2.webm 2.5 MB
545 Videos/SECTION 4/4.4 INTRUSTION DETECTION IN THE CLOUD/SEC545- SANS OnDemand_5.webm 2.5 MB
545 Videos/SECTION 4/4.3 CLOUD PEN TESTING/SEC545- SANS OnDemand_6_2.webm 2.4 MB
545 Videos/SECTION 5/5.5 TOOLS, TACTICS AND USE CASES/SEC545- SANS OnDemand_17.webm 2.4 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_9_2.webm 2.4 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_49.webm 2.4 MB
545 Videos/SECTION 2/2.3 CLOUD NETWORK SECURITY/SEC545- SANS OnDemand_5_2.webm 2.4 MB
545 Videos/SECTION 4/4.6 CLOUD FORENSICS/SEC545- SANS OnDemand_12_2.webm 2.4 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_37.webm 2.4 MB
545 Videos/SECTION 2/2.6 DATA SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_38.webm 2.4 MB
545 Videos/SECTION 1/1.2 CLOUD SECURITY ALLIANCE GUIDANCE/SEC545- SANS OnDemand_6_2.webm 2.4 MB
545 Videos/SECTION 1/1.1 INTRO AND BASICS/SEC545- SANS OnDemand_8.webm 2.4 MB
545 Videos/SECTION 1/1.5 INTRO TO PaaS AND IaaS SECURITY CONTROLS/SEC545- SANS OnDemand_36.webm 2.4 MB
545 Videos/SECTION 1/1.5 INTRO TO PaaS AND IaaS SECURITY CONTROLS/SEC545- SANS OnDemand_33.webm 2.4 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_82.webm 2.3 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_77.webm 2.3 MB
545 Videos/SECTION 5/5.1 SCRIPTING AND AUTOMATION IN THE CLOUD/SEC545- SANS OnDemand_13.webm 2.3 MB
545 Videos/SECTION 1/1.5 INTRO TO PaaS AND IaaS SECURITY CONTROLS/SEC545- SANS OnDemand_19.webm 2.3 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_68.webm 2.3 MB
545 Videos/SECTION 2/2.6 DATA SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_39.webm 2.3 MB
545 Videos/SECTION 2/2.6 DATA SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_2.webm 2.3 MB
545 Videos/SECTION 1/1.5 INTRO TO PaaS AND IaaS SECURITY CONTROLS/SEC545- SANS OnDemand_30.webm 2.3 MB
545 Videos/SECTION 1/1.3 CLOUD POLICY AND PLANNING/SEC545- SANS OnDemand_24.webm 2.3 MB
545 Videos/SECTION 5/5.3 CREATING SECURE CLOUD WORKFLOWS/SEC545- SANS OnDemand_38.webm 2.3 MB
545 Videos/SECTION 5/5.3 CREATING SECURE CLOUD WORKFLOWS/SEC545- SANS OnDemand_29.webm 2.2 MB
545 Videos/SECTION 3/3.5 AVAILABILITY/SEC545- SANS OnDemand_21_2.webm 2.2 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_33.webm 2.2 MB
545 Videos/SECTION 5/5.3 CREATING SECURE CLOUD WORKFLOWS/SEC545- SANS OnDemand_27.webm 2.2 MB
545 Videos/SECTION 1/1.4 SaaS SECURITY/SEC545- SANS OnDemand_22_2.webm 2.2 MB
545 Videos/SECTION 4/4.5 CLOUD IR AND EVENT MANAGEMENT/SEC545- SANS OnDemand_20.webm 2.2 MB
545 Videos/SECTION 5/5.2 DevSecOps PRINCIPLES/SEC545- SANS OnDemand_2.webm 2.2 MB
545 Videos/SECTION 2/2.4 INSTANCE AND IMAGE SECURITY/SEC545- SANS OnDemand_4.webm 2.2 MB
545 Videos/SECTION 2/2.2 A VIRTUALIZATION SECURITY PRIMER/SEC545- SANS OnDemand_7.webm 2.2 MB
545 Videos/SECTION 3/3.1 CLOUD SECURITY ARCHITECTURE OVERVIEW/SEC545- SANS OnDemand_9.webm 2.2 MB
545 Videos/SECTION 3/3.5 AVAILABILITY/SEC545- SANS OnDemand_12_2.webm 2.2 MB
545 Videos/SECTION 1/1.1 INTRO AND BASICS/SEC545- SANS OnDemand_18.webm 2.2 MB
545 Videos/SECTION 1/1.5 INTRO TO PaaS AND IaaS SECURITY CONTROLS/SEC545- SANS OnDemand_46.webm 2.2 MB
545 Videos/SECTION 3/3.5 AVAILABILITY/SEC545- SANS OnDemand_14_2.webm 2.2 MB
545 Videos/SECTION 5/5.1 SCRIPTING AND AUTOMATION IN THE CLOUD/SEC545- SANS OnDemand_3_2.webm 2.2 MB
545 Videos/SECTION 4/4.5 CLOUD IR AND EVENT MANAGEMENT/SEC545- SANS OnDemand_11.webm 2.2 MB
545 Videos/SECTION 2/2.7 APPLICATION SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_5_2.webm 2.2 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_25.webm 2.1 MB
545 Videos/SECTION 1/1.2 CLOUD SECURITY ALLIANCE GUIDANCE/SEC545- SANS OnDemand_2_2.webm 2.1 MB
545 Videos/SECTION 2/2.1 CLOUD SECURITY; IN-HOUSE VERSUS CLOUD/SEC545- SANS OnDemand_58.webm 2.1 MB
545 Videos/SECTION 2/2.6 DATA SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_35.webm 2.1 MB
545 Videos/SECTION 5/5.1 SCRIPTING AND AUTOMATION IN THE CLOUD/SEC545- SANS OnDemand_6_2.webm 2.1 MB
545 Videos/SECTION 2/2.6 DATA SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_46.webm 2.1 MB
545 Videos/SECTION 5/5.4 BUILDING AUTOMATED EVENT MANAGEMENT AND DEFENSIVE STRATEGIES/SEC545- SANS OnDemand_7.webm 2.1 MB
545 Videos/SECTION 5/5.1 SCRIPTING AND AUTOMATION IN THE CLOUD/SEC545- SANS OnDemand_14.webm 2.1 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_62.webm 2.1 MB
545 Videos/SECTION 4/4.3 CLOUD PEN TESTING/SEC545- SANS OnDemand_10_2.webm 2.0 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_53.webm 2.0 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_89.webm 2.0 MB
545 Videos/SECTION 1/1.1 INTRO AND BASICS/SEC545- SANS OnDemand_12.webm 2.0 MB
545 Videos/SECTION 1/1.2 CLOUD SECURITY ALLIANCE GUIDANCE/SEC545- SANS OnDemand_4_2.webm 2.0 MB
545 Videos/SECTION 2/2.6 DATA SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_29.webm 2.0 MB
545 Videos/SECTION 1/1.2 CLOUD SECURITY ALLIANCE GUIDANCE/SEC545- SANS OnDemand_9_2.webm 2.0 MB
545 Videos/SECTION 1/1.5 INTRO TO PaaS AND IaaS SECURITY CONTROLS/SEC545- SANS OnDemand_42.webm 2.0 MB
545 Videos/SECTION 2/2.6 DATA SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_55.webm 2.0 MB
545 Videos/SECTION 5/5.5 TOOLS, TACTICS AND USE CASES/SEC545- SANS OnDemand_18.webm 2.0 MB
545 Videos/SECTION 5/5.3 CREATING SECURE CLOUD WORKFLOWS/SEC545- SANS OnDemand_31.webm 2.0 MB
545 Videos/SECTION 4/4.4 INTRUSTION DETECTION IN THE CLOUD/SEC545- SANS OnDemand_3.webm 2.0 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_54.webm 2.0 MB
545 Videos/SECTION 5/5.5 TOOLS, TACTICS AND USE CASES/SEC545- SANS OnDemand_22.webm 2.0 MB
545 Videos/SECTION 3/3.5 AVAILABILITY/SEC545- SANS OnDemand_10_3.webm 2.0 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_92.webm 2.0 MB
545 Videos/SECTION 1/1.5 INTRO TO PaaS AND IaaS SECURITY CONTROLS/SEC545- SANS OnDemand_37.webm 2.0 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_17.webm 2.0 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_93.webm 2.0 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_90.webm 2.0 MB
545 Videos/SECTION 2/2.6 DATA SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_10.webm 2.0 MB
545 Videos/SECTION 2/2.7 APPLICATION SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_10_2.webm 1.9 MB
545 Videos/SECTION 4/4.6 CLOUD FORENSICS/SEC545- SANS OnDemand_14_2.webm 1.9 MB
545 Videos/SECTION 1/1.5 INTRO TO PaaS AND IaaS SECURITY CONTROLS/SEC545- SANS OnDemand_38.webm 1.9 MB
545 Videos/SECTION 5/5.3 CREATING SECURE CLOUD WORKFLOWS/SEC545- SANS OnDemand_47.webm 1.9 MB
545 Videos/SECTION 5/5.3 CREATING SECURE CLOUD WORKFLOWS/SEC545- SANS OnDemand_13.webm 1.9 MB
545 Videos/SECTION 3/3.5 AVAILABILITY/SEC545- SANS OnDemand_4.webm 1.9 MB
545 Videos/SECTION 5/5.3 CREATING SECURE CLOUD WORKFLOWS/SEC545- SANS OnDemand_36.webm 1.9 MB
545 Videos/SECTION 3/3.1 CLOUD SECURITY ARCHITECTURE OVERVIEW/SEC545- SANS OnDemand_4.webm 1.9 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_45.webm 1.9 MB
545 Videos/SECTION 1/1.3 CLOUD POLICY AND PLANNING/SEC545- SANS OnDemand_19.webm 1.9 MB
545 Videos/SECTION 1/1.3 CLOUD POLICY AND PLANNING/SEC545- SANS OnDemand_3.webm 1.9 MB
545 Videos/SECTION 1/1.5 INTRO TO PaaS AND IaaS SECURITY CONTROLS/SEC545- SANS OnDemand_57.webm 1.9 MB
545 Videos/SECTION 3/3.5 AVAILABILITY/SEC545- SANS OnDemand_7.webm 1.9 MB
545 Videos/SECTION 1/1.4 SaaS SECURITY/SEC545- SANS OnDemand_4_2.webm 1.9 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_88.webm 1.8 MB
545 Videos/SECTION 3/3.5 AVAILABILITY/SEC545- SANS OnDemand_5.webm 1.8 MB
545 Videos/SECTION 2/2.3 CLOUD NETWORK SECURITY/SEC545- SANS OnDemand_18.webm 1.8 MB
545 Videos/SECTION 2/2.3 CLOUD NETWORK SECURITY/SEC545- SANS OnDemand_16_2.webm 1.8 MB
545 Videos/SECTION 2/2.6 DATA SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_27.webm 1.8 MB
545 Videos/SECTION 4/4.5 CLOUD IR AND EVENT MANAGEMENT/SEC545- SANS OnDemand_5_2.webm 1.8 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_55.webm 1.8 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_53.webm 1.8 MB
545 Videos/SECTION 2/2.6 DATA SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_34.webm 1.8 MB
545 Videos/SECTION 5/5.5 TOOLS, TACTICS AND USE CASES/SEC545- SANS OnDemand_6_2.webm 1.8 MB
545 Videos/SECTION 5/5.1 SCRIPTING AND AUTOMATION IN THE CLOUD/SEC545- SANS OnDemand_7_2.webm 1.8 MB
545 Videos/SECTION 1/1.2 CLOUD SECURITY ALLIANCE GUIDANCE/SEC545- SANS OnDemand_13_2.webm 1.8 MB
545 Videos/SECTION 4/4.4 INTRUSTION DETECTION IN THE CLOUD/SEC545- SANS OnDemand_2.webm 1.8 MB
545 Videos/SECTION 1/1.5 INTRO TO PaaS AND IaaS SECURITY CONTROLS/SEC545- SANS OnDemand_31.webm 1.7 MB
545 Videos/SECTION 1/1.5 INTRO TO PaaS AND IaaS SECURITY CONTROLS/SEC545- SANS OnDemand_52.webm 1.7 MB
545 Videos/SECTION 5/5.3 CREATING SECURE CLOUD WORKFLOWS/SEC545- SANS OnDemand_42.webm 1.7 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_44.webm 1.7 MB
545 Videos/SECTION 2/2.6 DATA SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_22.webm 1.7 MB
545 Videos/SECTION 2/2.6 DATA SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_19.webm 1.7 MB
545 Videos/SECTION 2/2.3 CLOUD NETWORK SECURITY/SEC545- SANS OnDemand_4_2.webm 1.7 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_81.webm 1.7 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_26.webm 1.7 MB
545 Videos/SECTION 2/2.5 IDENTITY AND ACCESS MANAGEMENT/SEC545- SANS OnDemand_12_2.webm 1.7 MB
545 Videos/SECTION 5/5.3 CREATING SECURE CLOUD WORKFLOWS/SEC545- SANS OnDemand_4_2.webm 1.7 MB
545 Videos/SECTION 3/3.1 CLOUD SECURITY ARCHITECTURE OVERVIEW/SEC545- SANS OnDemand_6.webm 1.7 MB
545 Videos/SECTION 2/2.7 APPLICATION SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_8_2.webm 1.7 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_51.webm 1.7 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_70.webm 1.7 MB
545 Videos/SECTION 2/2.4 INSTANCE AND IMAGE SECURITY/SEC545- SANS OnDemand_8.webm 1.7 MB
545 Videos/SECTION 4/4.4 INTRUSTION DETECTION IN THE CLOUD/SEC545- SANS OnDemand_15_2.webm 1.7 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_30.webm 1.7 MB
545 Videos/SECTION 2/2.6 DATA SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_32.webm 1.7 MB
545 Videos/SECTION 3/3.5 AVAILABILITY/SEC545- SANS OnDemand_11_2.webm 1.7 MB
545 Videos/SECTION 1/1.3 CLOUD POLICY AND PLANNING/SEC545- SANS OnDemand_2.webm 1.7 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_46.webm 1.7 MB
545 Videos/SECTION 3/3.2 CLOUD ARCHITECTURE AND SECURITY PRINCIPLES/SEC545- SANS OnDemand_17.webm 1.6 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_66.webm 1.6 MB
545 Videos/SECTION 3/3.5 AVAILABILITY/SEC545- SANS OnDemand_18_2.webm 1.6 MB
545 Videos/SECTION 4/4.6 CLOUD FORENSICS/SEC545- SANS OnDemand_4.webm 1.6 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_63.webm 1.6 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_51.webm 1.6 MB
545 Videos/SECTION 4/4.5 CLOUD IR AND EVENT MANAGEMENT/SEC545- SANS OnDemand_21.webm 1.6 MB
545 Videos/SECTION 1/1.3 CLOUD POLICY AND PLANNING/SEC545- SANS OnDemand_11.webm 1.6 MB
545 Videos/SECTION 2/2.2 A VIRTUALIZATION SECURITY PRIMER/SEC545- SANS OnDemand_2.webm 1.6 MB
545 Videos/SECTION 1/1.3 CLOUD POLICY AND PLANNING/SEC545- SANS OnDemand_7.webm 1.6 MB
545 Videos/SECTION 1/1.1 INTRO AND BASICS/SEC545- SANS OnDemand_17.webm 1.6 MB
545 Videos/SECTION 2/2.7 APPLICATION SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_6_2.webm 1.6 MB
545 Videos/SECTION 2/2.7 APPLICATION SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_4_2.webm 1.6 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_38.webm 1.6 MB
545 Videos/SECTION 1/1.5 INTRO TO PaaS AND IaaS SECURITY CONTROLS/SEC545- SANS OnDemand_32.webm 1.6 MB
545 Videos/SECTION 1/1.1 INTRO AND BASICS/SEC545- SANS OnDemand_16.webm 1.6 MB
545 Videos/SECTION 1/1.3 CLOUD POLICY AND PLANNING/SEC545- SANS OnDemand_15.webm 1.6 MB
545 Videos/SECTION 1/1.5 INTRO TO PaaS AND IaaS SECURITY CONTROLS/SEC545- SANS OnDemand_9.webm 1.6 MB
545 Videos/SECTION 2/2.6 DATA SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_54.webm 1.6 MB
545 Videos/SECTION 5/5.5 TOOLS, TACTICS AND USE CASES/SEC545- SANS OnDemand_5_2.webm 1.6 MB
545 Videos/SECTION 5/5.5 TOOLS, TACTICS AND USE CASES/SEC545- SANS OnDemand_11.webm 1.5 MB
545 Videos/SECTION 5/5.3 CREATING SECURE CLOUD WORKFLOWS/SEC545- SANS OnDemand_15.webm 1.5 MB
545 Videos/SECTION 2/2.6 DATA SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_13_2.webm 1.5 MB
545 Videos/SECTION 1/1.2 CLOUD SECURITY ALLIANCE GUIDANCE/SEC545- SANS OnDemand_14_2.webm 1.5 MB
545 Videos/SECTION 4/4.6 CLOUD FORENSICS/SEC545- SANS OnDemand_15_2.webm 1.5 MB
545 Videos/SECTION 3/3.2 CLOUD ARCHITECTURE AND SECURITY PRINCIPLES/SEC545- SANS OnDemand_3_2.webm 1.5 MB
545 Videos/SECTION 5/5.3 CREATING SECURE CLOUD WORKFLOWS/SEC545- SANS OnDemand_24.webm 1.5 MB
545 Videos/SECTION 3/3.5 AVAILABILITY/SEC545- SANS OnDemand_20_2.webm 1.5 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_52.webm 1.4 MB
545 Videos/SECTION 3/3.5 AVAILABILITY/SEC545- SANS OnDemand_6.webm 1.4 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_52.webm 1.4 MB
545 Videos/SECTION 2/2.6 DATA SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_45.webm 1.4 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_48.webm 1.4 MB
545 Videos/SECTION 5/5.5 TOOLS, TACTICS AND USE CASES/SEC545- SANS OnDemand_15.webm 1.4 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_72.webm 1.4 MB
545 Videos/SECTION 5/5.5 TOOLS, TACTICS AND USE CASES/SEC545- SANS OnDemand_19.webm 1.4 MB
545 Videos/SECTION 1/1.5 INTRO TO PaaS AND IaaS SECURITY CONTROLS/SEC545- SANS OnDemand_34.webm 1.3 MB
545 Videos/SECTION 3/3.3 INFRASTRUCTURE AND CORE COMPONENT SECURITY/SEC545- SANS OnDemand_5.webm 1.3 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_26.webm 1.3 MB
545 Videos/SECTION 2/2.6 DATA SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_24.webm 1.3 MB
545 Videos/SECTION 2/2.7 APPLICATION SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_2_2.webm 1.3 MB
545 Videos/SECTION 2/2.4 INSTANCE AND IMAGE SECURITY/SEC545- SANS OnDemand_3.webm 1.3 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_31.webm 1.3 MB
545 Videos/SECTION 3/3.2 CLOUD ARCHITECTURE AND SECURITY PRINCIPLES/SEC545- SANS OnDemand_18.webm 1.3 MB
545 Videos/SECTION 2/2.6 DATA SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_53.webm 1.3 MB
545 Videos/SECTION 2/2.5 IDENTITY AND ACCESS MANAGEMENT/SEC545- SANS OnDemand_7_2.webm 1.3 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_38.webm 1.3 MB
545 Videos/SECTION 5/5.5 TOOLS, TACTICS AND USE CASES/SEC545- SANS OnDemand_23.webm 1.2 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_65.webm 1.2 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_62.webm 1.2 MB
545 Videos/SECTION 2/2.7 APPLICATION SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_3_2.webm 1.2 MB
545 Videos/SECTION 1/1.5 INTRO TO PaaS AND IaaS SECURITY CONTROLS/SEC545- SANS OnDemand_20.webm 1.2 MB
545 Videos/SECTION 5/5.5 TOOLS, TACTICS AND USE CASES/SEC545- SANS OnDemand_2_2.webm 1.2 MB
545 Videos/SECTION 2/2.6 DATA SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_26.webm 1.2 MB
545 Videos/SECTION 1/1.3 CLOUD POLICY AND PLANNING/SEC545- SANS OnDemand_12.webm 1.2 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_49.webm 1.2 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_75.webm 1.2 MB
545 Videos/SECTION 2/2.5 IDENTITY AND ACCESS MANAGEMENT/SEC545- SANS OnDemand_2_2.webm 1.2 MB
545 Videos/SECTION 4/4.4 INTRUSTION DETECTION IN THE CLOUD/SEC545- SANS OnDemand_8.webm 1.2 MB
545 Videos/SECTION 2/2.3 CLOUD NETWORK SECURITY/SEC545- SANS OnDemand_2_2.webm 1.2 MB
545 Videos/SECTION 5/5.4 BUILDING AUTOMATED EVENT MANAGEMENT AND DEFENSIVE STRATEGIES/SEC545- SANS OnDemand_4.webm 1.1 MB
545 Videos/SECTION 2/2.6 DATA SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_48.webm 1.1 MB
545 Videos/SECTION 1/1.2 CLOUD SECURITY ALLIANCE GUIDANCE/SEC545- SANS OnDemand_8_2.webm 1.1 MB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_32.webm 1.1 MB
545 Videos/SECTION 5/5.2 DevSecOps PRINCIPLES/SEC545- SANS OnDemand_4.webm 1.1 MB
545 Videos/SECTION 4/4.6 CLOUD FORENSICS/SEC545- SANS OnDemand_11_2.webm 1.0 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_4_2.webm 1.0 MB
545 Videos/SECTION 1/1.2 CLOUD SECURITY ALLIANCE GUIDANCE/SEC545- SANS OnDemand_7_2.webm 1.0 MB
545 Videos/SECTION 3/3.5 AVAILABILITY/SEC545- SANS OnDemand_17_2.webm 1.0 MB
545 Videos/SECTION 4/4.6 CLOUD FORENSICS/SEC545- SANS OnDemand_9.webm 1.0 MB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_74.webm 999.6 kB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_64.webm 974.4 kB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_50.webm 956.6 kB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_60.webm 931.6 kB
545 Videos/SECTION 4/4.6 CLOUD FORENSICS/SEC545- SANS OnDemand_7.webm 929.6 kB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_66.webm 921.0 kB
545 Videos/SECTION 1/1.5 INTRO TO PaaS AND IaaS SECURITY CONTROLS/SEC545- SANS OnDemand_26.webm 919.4 kB
545 Videos/SECTION 1/1.3 CLOUD POLICY AND PLANNING/SEC545- SANS OnDemand_22.webm 912.8 kB
545 Videos/SECTION 4/4.5 CLOUD IR AND EVENT MANAGEMENT/SEC545- SANS OnDemand_25.webm 898.0 kB
545 Videos/SECTION 2/2.6 DATA SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_50.webm 890.5 kB
545 Videos/SECTION 5/5.5 TOOLS, TACTICS AND USE CASES/SEC545- SANS OnDemand_10.webm 886.5 kB
545 Videos/SECTION 3/3.2 CLOUD ARCHITECTURE AND SECURITY PRINCIPLES/SEC545- SANS OnDemand_2_2.webm 872.0 kB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_68.webm 871.4 kB
545 Videos/SECTION 4/4.5 CLOUD IR AND EVENT MANAGEMENT/SEC545- SANS OnDemand_2_2.webm 848.8 kB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_61.webm 844.5 kB
545 Videos/SECTION 2/2.6 DATA SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_7.webm 839.7 kB
545 Videos/SECTION 3/3.5 AVAILABILITY/SEC545- SANS OnDemand_2.webm 839.4 kB
545 Videos/SECTION 4/4.5 CLOUD IR AND EVENT MANAGEMENT/SEC545- SANS OnDemand_26.webm 824.8 kB
545 Videos/SECTION 1/1.5 INTRO TO PaaS AND IaaS SECURITY CONTROLS/SEC545- SANS OnDemand_44.webm 718.5 kB
545 Videos/SECTION 1/1.2 CLOUD SECURITY ALLIANCE GUIDANCE/SEC545- SANS OnDemand_10_2.webm 704.3 kB
545 Videos/SECTION 2/2.6 DATA SECURITY FOR THE CLOUD/SEC545- SANS OnDemand_20.webm 653.3 kB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_7_2.webm 650.7 kB
545 Videos/SECTION 5/5.3 CREATING SECURE CLOUD WORKFLOWS/SEC545- SANS OnDemand_30.webm 639.9 kB
545 Videos/SECTION 3/3.5 AVAILABILITY/SEC545- SANS OnDemand_22_2.webm 601.4 kB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_6_2.webm 534.2 kB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_10_2.webm 504.4 kB
545 Videos/SECTION 4/4.1 THREATS TO CLOUD COMPUTING/SEC545- SANS OnDemand_47.webm 443.2 kB
545 Videos/SECTION 5/5.5 TOOLS, TACTICS AND USE CASES/SEC545- SANS OnDemand_20.webm 438.7 kB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_3_2.webm 402.9 kB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_84.webm 380.5 kB
545 Videos/SECTION 1/1.1 INTRO AND BASICS/SEC545- SANS OnDemand_27.webm 361.8 kB
545 Videos/SECTION 3/3.4 ACCESS CONTROLS AND COMPARTMENTALIZATION/SEC545- SANS OnDemand_8_2.webm 320.3 kB
545 Videos/SECTION 4/4.5 CLOUD IR AND EVENT MANAGEMENT/SEC545- SANS OnDemand_23.webm 148.2 kB
VMS/VMware Workstation 15.x Pro for Windows/Serial key.txt 29 Bytes
VMS/VMware Fusion 11.x Pro (for Intel-based Macs)/Serial.txt 0 Bytes
Joint Operations Typhoon Rising + Joint Operations... 3.5 GB
[ FreeCourseWeb.com ] Udemy - Operations Management -... 1.2 GB
Operations and Project Management 29.3 GB
Maingot's Abdominal Operations, 12E [Epub] [StormRG] 103.8 MB
Secret Operations-(SECOPS025) Seba – Secops025 97.0 MB
The Great Courses - Espionage and Covert Operations - A... 535.2 MB
Организация службы Service Desk. Домен ITIL Operations 1.2 GB
MICROSOFT.SYSTEM.CENTER.2012.R2.OPERATIONS.MANAGER.RTM.CO... 736.6 MB
Operations Management Fundamentals {AM} 438.2 MB
ArmA.2.Combined.Operations - RELOADED 6.8 GB