为您索检到134条磁力链接,耗时0毫秒。
- 【影视】 Pluralsight - Cisco Core Security Securing the Cloud by Craig Stansbury
-
收录时间:2022-02-24
文档个数:29
文档大小:230.2 MB
最近下载:2025-05-15
人气:1966
磁力链接
2. Describing DevSecOps/4. Creating Containers Using Docker.mp4 18.3 MB
3. Implementing Security in Cloud Environments/4. Deploy ASAv in AWS.mp4 16.9 MB
3. Implementing Security in Cloud Environments/1. Configuring the Frontend VPC in AWS.mp4 12.3 MB
3. Implementing Security in Cloud Environments/7. Verifying VPN Connectivity to AWS.mp4 12.0 MB
3. Implementing Security in Cloud Environments/3. Launching a Server in AWS.mp4 11.8 MB
4. Configuring Cloud Logging and Monitoring/2. Creating AWS Permissions for Stealthwatch Cloud to Access AWS S3 Bucket.mp4 10.7 MB
1. Identifying Security Solutions for Cloud Environments/0. Course Intro and Cloud Overview.mp4 10.1 MB
2. Describing DevSecOps/5. Container Orchestration.mp4 10.0 MB
3. Implementing Security in Cloud Environments/2. Configuring the Backend VPC in AWS.mp4 9.9 MB
4. Configuring Cloud Logging and Monitoring/5. Cisco Cloudlock.mp4 8.6 MB
4. Configuring Cloud Logging and Monitoring/1. Configure S3 Buckets and VPC Flowlogs.mp4 8.6 MB
3. Implementing Security in Cloud Environments/6. Configure SSL VPN on the ASA to Access AWS VPC.mp4 8.3 MB
2. Describing DevSecOps/0. Application Development Overview.mp4 8.0 MB
3. Implementing Security in Cloud Environments/5. Adding Interfaces to the ASAv.mp4 7.8 MB
1. Identifying Security Solutions for Cloud Environments/1. Cloud Service Models.mp4 7.3 MB
2. Describing DevSecOps/1. DevOps.mp4 7.3 MB
3. Implementing Security in Cloud Environments/0. AWS Network Diagram and Setup.mp4 7.1 MB
4. Configuring Cloud Logging and Monitoring/3. Exploring Stealthwatch Cloud.mp4 6.9 MB
cisco-core-security-securing-cloud.zip 6.7 MB
4. Configuring Cloud Logging and Monitoring/4. Cloud Access Security Broker.mp4 6.6 MB
猜你喜欢:
Core
Pluralsight
Cisco
Securing
Craig
Stansbury
Security
Cloud
- 【影视】 Pluralsight - Securing Your Application with OAuth and Passport
-
收录时间:2017-02-09
文档个数:28
文档大小:352.9 MB
最近下载:2025-05-16
人气:1960
磁力链接
01. Introduction/01_01-Introduction.mp4 2.5 MB
01. Introduction/01_02-What Is OAuth Anyway.mp4 9.3 MB
01. Introduction/01_03-Setting up Our Environment.mp4 11.2 MB
01. Introduction/01_04-Summary.mp4 1.8 MB
02. Sign in with Google/02_01-Introduction.mp4 1.8 MB
02. Sign in with Google/02_02-Setting up Passport Middleware.mp4 17.0 MB
02. Sign in with Google/02_03-Finding a Google Strategy.mp4 6.2 MB
02. Sign in with Google/02_04-Using the Google Strategy.mp4 10.2 MB
02. Sign in with Google/02_05-Setting up Your App with the Google Console.mp4 12.2 MB
02. Sign in with Google/02_06-Setting up Our Auth Routes.mp4 12.7 MB
02. Sign in with Google/02_07-Creating Our Views.mp4 19.2 MB
02. Sign in with Google/02_08-Summary.mp4 3.0 MB
03. Adding in More Providers/03_01-Introduction.mp4 1.3 MB
03. Adding in More Providers/03_02-Setting Our Code Up for Multiple Strategies.mp4 12.0 MB
03. Adding in More Providers/03_03-Securing Routes.mp4 4.1 MB
03. Adding in More Providers/03_04-Creating a User Object.mp4 8.1 MB
03. Adding in More Providers/03_05-Adding Twitter.mp4 23.6 MB
03. Adding in More Providers/03_06-Testing Twitter.mp4 9.8 MB
03. Adding in More Providers/03_07-Adding Facebook.mp4 20.5 MB
03. Adding in More Providers/03_08-Summary.mp4 2.2 MB
猜你喜欢:
Pluralsight
Securing
Application
Passport
OAuth
Your
- 【影视】 Pluralsight - Securing Applications on AWS by Mark Wilkins
-
收录时间:2021-04-27
文档个数:37
文档大小:329.9 MB
最近下载:2025-05-16
人气:1945
磁力链接
5.Auditing with CloudTrail/4.Analyzing CloudTrail Logs.mp4 18.1 MB
2.Web Application Firewall and the API Gateway/3.Conditions and Rules.mp4 17.8 MB
4.Logging with CloudWatch/8.Installing the CloudWatch Agent.mp4 16.5 MB
5.Auditing with CloudTrail/2.What Is CloudTrail.mp4 15.6 MB
6.Managing Compliance Standards with Trusted Advisor and AWS Config/6.Enable Managed Config Rules.mp4 15.5 MB
6.Managing Compliance Standards with Trusted Advisor and AWS Config/8.Notifications.mp4 14.7 MB
6.Managing Compliance Standards with Trusted Advisor and AWS Config/3.Trusted Advisor Benefits.mp4 14.4 MB
4.Logging with CloudWatch/3.CloudWatch Overview.mp4 13.9 MB
2.Web Application Firewall and the API Gateway/5.Creating a Geo Match Condition.mp4 12.7 MB
5.Auditing with CloudTrail/3.Creating Trails.mp4 12.5 MB
4.Logging with CloudWatch/7.Creating a CloudWatch Alarm.mp4 12.5 MB
3.Authenticating Users with Amazon Cognito/4.Creating a User Pool.mp4 12.1 MB
2.Web Application Firewall and the API Gateway/7.API Gateway Components.mp4 11.7 MB
4.Logging with CloudWatch/6.CloudTrail Events.mp4 11.6 MB
5.Auditing with CloudTrail/5.Monitoring Security Events with CloudTrail.mp4 11.5 MB
6.Managing Compliance Standards with Trusted Advisor and AWS Config/2.Trusted Advisor.mp4 11.5 MB
6.Managing Compliance Standards with Trusted Advisor and AWS Config/4.AWS Config.mp4 10.9 MB
2.Web Application Firewall and the API Gateway/2.Web Application Firewall.mp4 10.9 MB
3.Authenticating Users with Amazon Cognito/5.Create an Identity Pool.mp4 10.7 MB
2.Web Application Firewall and the API Gateway/6.API Gateway.mp4 7.7 MB
猜你喜欢:
Pluralsight
Securing
AWS
Wilkins
Mark
Applications
- 【影视】 [ DevCourseWeb.com ] Udemy - Securing Networks with Cisco Umbrella
-
收录时间:2022-03-21
文档个数:39
文档大小:1.6 GB
最近下载:2025-05-15
人气:1901
磁力链接
~Get Your Files Here !/04-Umbrella_Packages.mkv 154.8 MB
~Get Your Files Here !/34-Reports_and_Investigations.mkv 124.1 MB
~Get Your Files Here !/03-Preface.mkv 117.5 MB
~Get Your Files Here !/28-Umbrella_Anyconnect_Agent_Installation.mkv 108.7 MB
~Get Your Files Here !/22-User_Bypass.mkv 86.3 MB
~Get Your Files Here !/15-Configure_Policy_and_Security_Settings.mkv 85.7 MB
~Get Your Files Here !/10-Virtual_Appliance_(VA)_Installation.mkv 66.9 MB
~Get Your Files Here !/06-Initial_Setup_and_Identities.mkv 58.4 MB
~Get Your Files Here !/23-Configure_Intelligent_Proxy.mkv 56.1 MB
~Get Your Files Here !/30-Basic_Troubleshooting.mkv 55.1 MB
~Get Your Files Here !/33-Umbrella-Secure_Internet_Gateway_(SIG).mkv 51.9 MB
~Get Your Files Here !/18-Whitelists_and_Blacklists.mkv 48.7 MB
~Get Your Files Here !/09-Setup_Verification.mkv 45.5 MB
~Get Your Files Here !/08-Provisioning_Networks_and_Identities-Continued.mkv 43.5 MB
~Get Your Files Here !/27-Umbrella_Roaming_Agent_Installation.mkv 43.5 MB
~Get Your Files Here !/14-Policy_Setup_Review.mkv 39.6 MB
~Get Your Files Here !/01-BONUS-Intro_and_Discount_COUPONS.mkv 37.6 MB
~Get Your Files Here !/12-Virtual_Appliance_(VA)_Setup_Continued.mkv 36.3 MB
~Get Your Files Here !/19-Configuring_Block_Pages.mkv 34.6 MB
~Get Your Files Here !/35-Investigate_API.mkv 31.0 MB
猜你喜欢:
Cisco
Securing
Udemy
DevCourseWeb
Umbrella
com
Networks
- 【影视】 CompTIA Network+ (N10-007) Cert Prep - 5 Securing TCP_IP
-
收录时间:2018-10-24
文档个数:22
文档大小:613.6 MB
最近下载:2025-05-14
人气:1887
磁力链接
1.1. Securing TCP_IP/10.Certificates and trust.mp4 107.1 MB
1.1. Securing TCP_IP/01.Making TCP_IP secure.mp4 37.1 MB
1.1. Securing TCP_IP/02.Symmetric encryption.en.srt 9.1 kB
1.1. Securing TCP_IP/02.Symmetric encryption.mp4 43.1 MB
1.1. Securing TCP_IP/03.Asymmetric encryption.en.srt 5.1 kB
1.1. Securing TCP_IP/03.Asymmetric encryption.mp4 27.3 MB
1.1. Securing TCP_IP/04.Cryptographic hashes.en.srt 8.5 kB
1.1. Securing TCP_IP/04.Cryptographic hashes.mp4 34.1 MB
1.1. Securing TCP_IP/05.Identification.en.srt 22.0 kB
1.1. Securing TCP_IP/05.Identification.mp4 101.1 MB
1.1. Securing TCP_IP/06.Access control.en.srt 7.9 kB
1.1. Securing TCP_IP/06.Access control.mp4 36.6 MB
1.1. Securing TCP_IP/07.AAA.en.srt 7.7 kB
1.1. Securing TCP_IP/07.AAA.mp4 42.0 MB
1.1. Securing TCP_IP/08.Kerberos and EAP.en.srt 12.4 kB
1.1. Securing TCP_IP/08.Kerberos and EAP.mp4 63.7 MB
1.1. Securing TCP_IP/09.Single sign-on.en.srt 18.4 kB
1.1. Securing TCP_IP/09.Single sign-on.mp4 74.3 MB
1.1. Securing TCP_IP/10.Certificates and trust.en.srt 24.3 kB
1.1. Securing TCP_IP/01.Making TCP_IP secure.en.srt 7.7 kB
猜你喜欢:
N10
Network
Securing
IP
TCP
Cert
007
CompTIA
Prep
- 【影视】 Buried Hearts S01E02 Dongju Taken Out by Attackers After Securing Slush Funds 1080p DSNP WEB-DL AAC2 0 H 264-playWEB[EZTVx.to].mkv
-
收录时间:2025-03-13
文档个数:1
文档大小:2.1 GB
最近下载:2025-05-15
人气:1833
磁力链接
Buried Hearts S01E02 Dongju Taken Out by Attackers After Securing Slush Funds 1080p DSNP WEB-DL AAC2 0 H 264-playWEB[EZTVx.to].mkv 2.1 GB
猜你喜欢:
WEB
DL
AAC2
264
Securing
Dongju
Funds
Slush
After
DSNP
- 【影视】 Pluralsight - Securing ASP.NET Core with OAuth2 and OpenID Connect
-
收录时间:2018-02-03
文档个数:111
文档大小:1.3 GB
最近下载:2025-05-15
人气:1823
磁力链接
04.Securing Your Web Application/03.Demo - Logging in with the Hybrid Flow.mp4 59.2 MB
02.Inroduction/01.Coming Up.mp4 2.9 MB
02.Inroduction/02.Course Prerequisites.mp4 3.0 MB
02.Inroduction/03.Application Architectures and Security.mp4 13.9 MB
02.Inroduction/04.Working Towards a Central Identity Provider.mp4 9.5 MB
02.Inroduction/05.Introducing OAuth2.mp4 3.9 MB
02.Inroduction/06.Introducing OpenID Connect.mp4 4.1 MB
02.Inroduction/07.Demo - Introducing the Demo Application.mp4 8.3 MB
02.Inroduction/08.Summary.mp4 1.2 MB
03.Understanding Authentication with OpenID Connect/01.Coming Up.mp4 860.0 kB
03.Understanding Authentication with OpenID Connect/02.How OpenID Connect Works.mp4 2.9 MB
03.Understanding Authentication with OpenID Connect/03.Public and Confidential Clients.mp4 2.8 MB
03.Understanding Authentication with OpenID Connect/04.OpenID Connect Flows and Endpoints.mp4 11.2 MB
03.Understanding Authentication with OpenID Connect/05.OpenID Connect Flow for ASP.NET Core MVC.mp4 3.5 MB
03.Understanding Authentication with OpenID Connect/06.Introducing IdentityServer4.mp4 1.8 MB
03.Understanding Authentication with OpenID Connect/07.Demo - Setting up IdentityServer4.mp4 29.2 MB
03.Understanding Authentication with OpenID Connect/08.Demo - Adding a User Interface for IdentityServer4.mp4 15.4 MB
03.Understanding Authentication with OpenID Connect/09.Demo - Ensuring Traffic Is Encrypted.mp4 16.5 MB
03.Understanding Authentication with OpenID Connect/10.A Note for Chrome Users.mp4 3.0 MB
03.Understanding Authentication with OpenID Connect/11.Summary.mp4 3.4 MB
猜你喜欢:
Core
Pluralsight
ASP
Securing
OpenID
OAuth2
Connect
NET
- 【影视】 Securing Azure SQL Managed Instance
-
收录时间:2024-10-12
文档个数:10
文档大小:127.7 MB
最近下载:2025-05-15
人气:1764
磁力链接
03. Encryption and Data Privacy Measures/02. Data Privacy with Dynamic Data Masking and Row-level Security.mp4 23.4 MB
02. Advanced Security Features in Azure SQL Managed Instance/01. Auditing and Advanced Threat Protection.mp4 20.9 MB
01. Deployment and Connectivity Options under Security Isolation/02. Deployment Options for Secure Architecture.mp4 18.2 MB
03. Encryption and Data Privacy Measures/01. Implementing Encryption Policies.mp4 15.5 MB
02. Advanced Security Features in Azure SQL Managed Instance/02. Authentication and Authorization with Microsoft Entra.mp4 13.8 MB
01. Deployment and Connectivity Options under Security Isolation/03. Secure Connectivity Options.mp4 10.6 MB
01. Deployment and Connectivity Options under Security Isolation/01. Securing Azure SQL Managed Instance.mp4 10.0 MB
04. Best Practices and Special Considerations/01. Best Practices for Securing Azure SQL Managed Instance.mp4 6.0 MB
04. Best Practices and Special Considerations/02. Migrating and Restoring Encrypted Databases.mp4 5.1 MB
azure-sql-managed-instance-securing.zip 4.1 MB
猜你喜欢:
Azure
Instance
Managed
Securing
SQL
- 【影视】 [PrimalFetish] Cassidy Klein - Securing Project Funding (26.03.2017) rq.mp4
-
收录时间:2017-04-07
文档个数:1
文档大小:718.7 MB
最近下载:2025-04-08
人气:1747
磁力链接
[PrimalFetish] Cassidy Klein - Securing Project Funding (26.03.2017) rq.mp4 718.7 MB
猜你喜欢:
Funding
Klein
Securing
Project
mp4
PrimalFetish
Cassidy
26.03
2017
rq
- 【影视】 [ CoursePig.com ] PluralSight - Securing an EKS Cluster
-
收录时间:2022-03-25
文档个数:28
文档大小:136.9 MB
最近下载:2025-05-10
人气:1721
磁力链接
~Get Your Files Here !/02. Understanding IAM User Role and Group/04. Demo Understanding IAM in AWS.mp4 34.4 MB
~Get Your Files Here !/04. Understanding Kubeconfig/13. Demo-Understanding KubeConfig.mp4 20.5 MB
~Get Your Files Here !/06. Granting Granular Access to Other Users Using RBAC/20. Demo Granting Custom Privileges to Users.mp4 16.6 MB
~Get Your Files Here !/05. Granting Admin Access to Other Users/17. Demo-Granting Admin Access to Other Users.mp4 14.8 MB
~Get Your Files Here !/02. Understanding IAM User Role and Group/03. Understanding Role Based Access Control.mp4 6.2 MB
~Get Your Files Here !/03. Demystifying Kubernetes Security for Applications/06. Kubernetes Security Pillars.mp4 5.3 MB
~Get Your Files Here !/03. Demystifying Kubernetes Security for Applications/09. Benefits of EKS to DevOps.mp4 5.0 MB
~Get Your Files Here !/02. Understanding IAM User Role and Group/02. Overview of the Course.mp4 4.8 MB
~Get Your Files Here !/03. Demystifying Kubernetes Security for Applications/07. Introduction to Deployment Manifest.mp4 4.0 MB
~Get Your Files Here !/03. Demystifying Kubernetes Security for Applications/08. Importance of Service Account.mp4 3.5 MB
~Get Your Files Here !/06. Granting Granular Access to Other Users Using RBAC/19. Kubernetes Security Core Features.mp4 3.4 MB
~Get Your Files Here !/04. Understanding Kubeconfig/11. Introduction to KubeConfig.mp4 3.1 MB
~Get Your Files Here !/05. Granting Admin Access to Other Users/16. AWS IAM AUTHENTICATOR.mp4 3.0 MB
~Get Your Files Here !/05. Granting Admin Access to Other Users/15. Early Days of Authentication.mp4 2.9 MB
~Get Your Files Here !/01. Course Overview/01. Course Overview.mp4 2.7 MB
~Get Your Files Here !/04. Understanding Kubeconfig/12. Importance of KubeConfig.mp4 2.7 MB
~Get Your Files Here !/02. Understanding IAM User Role and Group/05. Summary.mp4 822.7 kB
~Get Your Files Here !/03. Demystifying Kubernetes Security for Applications/10. Summary.mp4 771.7 kB
~Get Your Files Here !/04. Understanding Kubeconfig/14. Summary.mp4 534.9 kB
~Get Your Files Here !/06. Granting Granular Access to Other Users Using RBAC/21. Summary.mp4 510.6 kB
猜你喜欢:
PluralSight
Securing
EKS
CoursePig
Cluster
com
- 【影视】 Securing Your GitHub Project
-
收录时间:2024-06-01
文档个数:46
文档大小:221.9 MB
最近下载:2025-05-15
人气:1669
磁力链接
03. Securing Your Development Workflow/04. Protecting GitHub Actions Secrets.mp4 21.7 MB
04. Discovering Vulnerabilities in Dependencies and Code/04. Discovering Vulnerabilities Using Static Analysis.mp4 18.6 MB
02. Safeguarding Access to Your GitHub Repository/02. Open Sourcing a JavaScript Library.mp4 17.4 MB
04. Discovering Vulnerabilities in Dependencies and Code/03. Patching Vulnerable Dependencies.mp4 17.0 MB
03. Securing Your Development Workflow/01. Hardening the GitHub Flow.mp4 14.4 MB
05. Publishing Security Fixes/02. Fixing the Code.mp4 12.9 MB
02. Safeguarding Access to Your GitHub Repository/07. Configuring Commit Signing Keys.mp4 11.8 MB
04. Discovering Vulnerabilities in Dependencies and Code/02. Managing Vulnerabilities in Dependencies.mp4 11.3 MB
03. Securing Your Development Workflow/02. Preventing Sensitive Data Leaks.mp4 11.3 MB
05. Publishing Security Fixes/03. Publishing the Fix.mp4 11.2 MB
05. Publishing Security Fixes/01. Vulnerabilities in Open Source Code.mp4 10.5 MB
04. Discovering Vulnerabilities in Dependencies and Code/01. Open Source Dependencies.mp4 9.5 MB
github-project-securing.zip 9.5 MB
02. Safeguarding Access to Your GitHub Repository/06. Configuring 2FA.mp4 8.5 MB
03. Securing Your Development Workflow/03. Recovering from Sensitive Data Leak.mp4 8.3 MB
02. Safeguarding Access to Your GitHub Repository/05. Protecting User Credentials.mp4 7.4 MB
02. Safeguarding Access to Your GitHub Repository/04. Using SSH Keys.mp4 6.8 MB
02. Safeguarding Access to Your GitHub Repository/03. Understanding Open Source Security.mp4 5.3 MB
01. Course Overview/01. Course Overview.mp4 3.1 MB
03. Securing Your Development Workflow/05. Summary.mp4 1.5 MB
猜你喜欢:
Project
GitHub
Your
Securing
- 【影视】 Cybersecurity Basics Securing your life in the digital age
-
收录时间:2021-03-08
文档个数:107
文档大小:718.3 MB
最近下载:2025-05-15
人气:1559
磁力链接
Course/8. Email/2. Creating your email.mp4 58.6 MB
Course/5. Securing your computer/1. The basics of securing your computer.mp4 46.3 MB
Course/4. Securing your Phone/4. Walkthrough Steps to take when downloading an app.mp4 41.6 MB
Course/7. Surfing the Internet Securely/2. Google, Search, and Cookies.mp4 34.8 MB
Course/5. Securing your computer/4. Non-obvious basic essentials for securing your computer.mp4 34.0 MB
Course/6. Password and Accounts/4. Security questions & Birthday for your accounts.mp4 33.8 MB
Course/7. Surfing the Internet Securely/3. Drive by downloads, HTTPs, and Internet Trackers.mp4 31.7 MB
Course/4. Securing your Phone/9. Phishing attacks on your phone.mp4 29.3 MB
Course/8. Email/4. Email activity.mp4 28.6 MB
Course/5. Securing your computer/3. Protecting your home internet.mp4 26.0 MB
Course/7. Surfing the Internet Securely/5. Google Maps and Child Filters.mp4 25.6 MB
Course/3. Cyber Attacks/2. PhishingWhaling.mp4 24.6 MB
Course/3. Cyber Attacks/4. Ransomware.mp4 24.0 MB
Course/6. Password and Accounts/1. Rules for creating passwords.mp4 23.8 MB
Course/4. Securing your Phone/3. Downloading Apps.mp4 23.2 MB
Course/2. Mindset of Cybersecurity Professional/3. Convenience vs Friction.mp4 22.5 MB
Course/2. Mindset of Cybersecurity Professional/5. Classifying your data.mp4 22.3 MB
Course/4. Securing your Phone/7. Mobile Carrier Security.mp4 21.9 MB
Course/4. Securing your Phone/6. Two Factor Authentication.mp4 19.2 MB
Course/1. Introduction/1. Introduction - Getting Startaed.mp4 18.4 MB
猜你喜欢:
life
Basics
Securing
Cybersecurity
age
digital
your
- 【影视】 [ FreeCourseWeb.com ] Securing SQL Server Applications
-
收录时间:2023-12-28
文档个数:55
文档大小:370.5 MB
最近下载:2025-05-16
人气:1478
磁力链接
~Get Your Files Here !/3. Auditing/2. Setting up SQL Server Auditing at the Instance Level.mp4 35.3 MB
~Get Your Files Here !/3. Auditing/4. Reading and Interpreting Audit Logs.mp4 29.8 MB
~Get Your Files Here !/4. Encryption in SQL Server/6. Using Always Encrypted.mp4 26.1 MB
~Get Your Files Here !/3. Auditing/1. Purpose and Advantages of Auditing and Logging.mp4 25.3 MB
~Get Your Files Here !/4. Encryption in SQL Server/3. Encrypting Data in SQL Server.mp4 21.9 MB
~Get Your Files Here !/6. Tools for Compliance Regulations/3. Keeping History Using Temporal Tables.mp4 21.3 MB
~Get Your Files Here !/4. Encryption in SQL Server/7. Setting up Always Encrypted with Secure Enclaves.mp4 18.8 MB
~Get Your Files Here !/6. Tools for Compliance Regulations/5. Using SQL Server Ledger.mp4 18.0 MB
~Get Your Files Here !/2. Introduction to Advanced Security Topics/5. Using SSL with Client Connections.mp4 17.2 MB
~Get Your Files Here !/4. Encryption in SQL Server/5. Encrypting Data at Rest.mp4 16.8 MB
~Get Your Files Here !/4. Encryption in SQL Server/4. Encrypting Column Data.mp4 16.1 MB
~Get Your Files Here !/3. Auditing/3. Setting up SQL Server Auditing in a Database.mp4 13.1 MB
~Get Your Files Here !/4. Encryption in SQL Server/2. Using Hash Functions for Password Storage.mp4 13.0 MB
~Get Your Files Here !/2. Introduction to Advanced Security Topics/1. SQL Server Security Overview.mp4 12.3 MB
~Get Your Files Here !/6. Tools for Compliance Regulations/2. Masking Sensitive Data Using Dynamic Data Masking.mp4 12.3 MB
~Get Your Files Here !/5. Fighting SQL Injection Attacks/4. Using Properly Stored Procedures and Dynamic SQL.mp4 11.7 MB
~Get Your Files Here !/5. Fighting SQL Injection Attacks/2. Real World Injection Threats.mp4 10.7 MB
~Get Your Files Here !/5. Fighting SQL Injection Attacks/1. Understanding SQL Injections.mp4 9.5 MB
~Get Your Files Here !/5. Fighting SQL Injection Attacks/3. Protecting T-SQL Code Against Injections.mp4 8.8 MB
~Get Your Files Here !/2. Introduction to Advanced Security Topics/3. Recognizing Security Threats and Vulnerabilities.mp4 6.6 MB
猜你喜欢:
Securing
Server
Applications
FreeCourseWeb
SQL
com
- 【影视】 Securing Generative AI
-
收录时间:2024-10-23
文档个数:34
文档大小:886.8 MB
最近下载:2025-05-16
人气:1388
磁力链接
Lesson 3 Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/006. 3.5 Securing Amazon BedRock, SageMaker, Microsoft Azure AI Services, and Other Environments.mp4 71.1 MB
Lesson 2 Understanding Prompt Injection & Insecure Output Handling/002. 2.1 Defining Prompt Injection Attacks.mp4 69.3 MB
Lesson 6 Protecting Retrieval Augmented Generation (RAG) Implementations/002. 6.1 Understanding the RAG, LangChain, Llama Index, and AI Orchestration.mp4 62.2 MB
Lesson 3 Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/005. 3.4 Best Practices when Using Open-Source Models from Hugging Face and Other Sources.mp4 54.9 MB
Lesson 5 Overreliance, Model Theft, and Red Teaming AI Models/004. 5.3 Understanding Red Teaming of AI Models.mp4 51.4 MB
Lesson 1 Introduction to AI Threats and LLM Security/002. 1.1 Understanding the Significance of LLMs in the AI Landscape.mp4 51.1 MB
Lesson 6 Protecting Retrieval Augmented Generation (RAG) Implementations/004. 6.3 Securing Vector Databases.mp4 43.6 MB
Lesson 2 Understanding Prompt Injection & Insecure Output Handling/004. 2.3 Using ChatML for OpenAI API Calls to Indicate to the LLM the Source of Prompt Input.mp4 40.1 MB
Lesson 3 Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/004. 3.3 Understanding the Risks of the AI and ML Supply Chain.mp4 38.0 MB
Lesson 1 Introduction to AI Threats and LLM Security/004. 1.3 Introducing Retrieval Augmented Generation (RAG).mp4 35.6 MB
Lesson 6 Protecting Retrieval Augmented Generation (RAG) Implementations/003. 6.2 Securing Embedding Models.mp4 30.6 MB
Lesson 1 Introduction to AI Threats and LLM Security/006. 1.5 Exploring the MITRE ATLAS (Adversarial Threat Landscape for Artificial-Intelligence Systems) Framework.mp4 27.1 MB
Lesson 6 Protecting Retrieval Augmented Generation (RAG) Implementations/005. 6.4 Monitoring and Incident Response.mp4 24.5 MB
Lesson 3 Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/002. 3.1 Understanding Training Data Poisoning Attacks.mp4 22.9 MB
Lesson 5 Overreliance, Model Theft, and Red Teaming AI Models/002. 5.1 Understanding Overreliance.mp4 22.2 MB
Lesson 1 Introduction to AI Threats and LLM Security/005. 1.4 Understanding the OWASP Top-10 Risks for LLMs.mp4 21.9 MB
Lesson 2 Understanding Prompt Injection & Insecure Output Handling/008. 2.7 Using the OWASP ASVS to Protect Against Insecure Output Handling.mp4 21.0 MB
Introduction/001. Securing Generative AI Introduction.mp4 19.7 MB
Lesson 4 Sensitive Information Disclosure, Insecure Plugin Design, and Excessive Agency/002. 4.1 Understanding Sensitive Information Disclosure.mp4 19.0 MB
Lesson 2 Understanding Prompt Injection & Insecure Output Handling/003. 2.2 Exploring Real-life Prompt Injection Attacks.mp4 18.0 MB
猜你喜欢:
Generative
AI
Securing
- 【影视】 Lynda - Securing Your Mobile Device
-
收录时间:2017-02-12
文档个数:29
文档大小:229.4 MB
最近下载:2025-05-14
人气:1326
磁力链接
001 Welcome.mp4 19.5 MB
002 What you should know.mp4 2.3 MB
003 Risks of technology.mp4 8.0 MB
004 Risks of mobile devices.mp4 8.5 MB
005 Acquire a device securely.mp4 7.6 MB
006 Dispose of a device securely.mp4 5.4 MB
007 Passwords and two-step authentication.mp4 14.5 MB
008 Backups for mobile.mp4 5.3 MB
009 Remote device management.mp4 5.2 MB
010 Application security.mp4 5.0 MB
011 Set up a Play account.mp4 10.6 MB
012 Set up a password on Android.mp4 9.0 MB
013 Lock screen security for Android.mp4 5.8 MB
014 Enable Find My Mobile security.mp4 5.1 MB
015 Android device admin settings.mp4 4.6 MB
016 Android backup and restore.mp4 7.1 MB
017 Android device encryption.mp4 3.5 MB
018 Set up an Apple ID.mp4 13.1 MB
019 Password and Touch ID.mp4 10.4 MB
020 iOS encryption, backups, and restores.mp4 5.8 MB
猜你喜欢:
Mobile
Lynda
Your
Securing
Device
- 【影视】 Pluralsight - Securing Windows Server 2016 Virtualization
-
收录时间:2018-02-05
文档个数:27
文档大小:386.7 MB
最近下载:2025-05-13
人气:1318
磁力链接
01 - Course Overview.mp4 3.3 MB
02 - What Is Server Virtualization.mp4 7.0 MB
03 - Configuring a Windows Server for Virtualization.mp4 11.2 MB
04 - Installing a Virtual Server in Hyper-V.mp4 32.8 MB
05 - Running the Best Practices Analyzer.mp4 12.2 MB
06 - What Is a Trusted Platform.mp4 8.6 MB
07 - Demonstration of Disk Encryption.mp4 30.1 MB
08 - Server Patching and Updating.mp4 37.2 MB
09 - Malware Protection.mp4 9.5 MB
10 - Installation and Configuration of the Host Guardian Service.mp4 14.7 MB
11 - Guarded Fabric.mp4 3.5 MB
12 - Protection of User Credentials.mp4 14.3 MB
13 - Datacenter Firewall.mp4 7.1 MB
14 - Configure Protection Using Windows Advanced Firewall Service.mp4 35.1 MB
15 - Demonstration in Securing Network Traffic.mp4 23.2 MB
16 - Implement an Enhanced Security Administrative Environment Approach.mp4 7.2 MB
17 - Just in Time Administration.mp4 4.5 MB
18 - Just Enough Administration.mp4 8.1 MB
19 - Demonstrate Privileged Access Workstations.mp4 16.2 MB
20 - Local Administrator Password Solution.mp4 3.3 MB
猜你喜欢:
Pluralsight
Securing
Windows
Server
Virtualization
2016
- 【影视】 Lynda - Securing Windows Server 2016 Server Hardening Solutions
-
收录时间:2018-03-10
文档个数:20
文档大小:146.6 MB
最近下载:2025-05-12
人气:1310
磁力链接
1. Disk and File Encryption/03 - Plan and implement BitLocker.mp4 29.5 MB
1. Disk and File Encryption/02 - Plan and implement encryption.mp4 15.2 MB
1. Disk and File Encryption/01 - Cryptography.mp4 15.1 MB
1. Disk and File Encryption/03 - Plan and implement BitLocker.en.srt 20.4 kB
1. Disk and File Encryption/01 - Cryptography.en.srt 16.2 kB
1. Disk and File Encryption/02 - Plan and implement encryption.en.srt 15.1 kB
2. Server Patching and Updating/02 - Deploy updates using WSUS.mp4 42.4 MB
2. Server Patching and Updating/01 - WSUS overview.mp4 13.3 MB
2. Server Patching and Updating/02 - Deploy updates using WSUS.en.srt 27.5 kB
2. Server Patching and Updating/01 - WSUS overview.en.srt 14.9 kB
3. Malware Protection/02 - Restricting software.mp4 14.2 MB
3. Malware Protection/01 - Using Windows Defender.mp4 12.2 MB
3. Malware Protection/02 - Restricting software.en.srt 13.9 kB
3. Malware Protection/01 - Using Windows Defender.en.srt 9.6 kB
Conclusion/01 - Next steps.mp4 912.7 kB
Conclusion/01 - Next steps.en.srt 620 Bytes
Introduction/01 - Welcome.mp4 2.6 MB
Introduction/02 - What you should know.mp4 994.4 kB
Introduction/02 - What you should know.en.srt 1.2 kB
Introduction/01 - Welcome.en.srt 853 Bytes
猜你喜欢:
Server
Hardening
Securing
Windows
Lynda
Solutions
2016
- 【影视】 Securing SQL Server Applications
-
收录时间:2024-12-30
文档个数:53
文档大小:268.3 MB
最近下载:2025-05-15
人气:1285
磁力链接
03. Auditing/02. Setting up SQL Server Auditing at the Instance Level.mp4 22.1 MB
03. Auditing/04. Reading and Interpreting Audit Logs.mp4 18.1 MB
04. Encryption in SQL Server/06. Using Always Encrypted.mp4 17.8 MB
sql-server-securing-applications.zip 17.0 MB
03. Auditing/01. Purpose and Advantages of Auditing and Logging.mp4 16.5 MB
04. Encryption in SQL Server/03. Encrypting Data in SQL Server.mp4 14.0 MB
06. Tools for Compliance Regulations/03. Keeping History Using Temporal Tables.mp4 13.4 MB
04. Encryption in SQL Server/07. Setting up Always Encrypted with Secure Enclaves.mp4 12.4 MB
02. Introduction to Advanced Security Topics/05. Using SSL with Client Connections.mp4 12.2 MB
04. Encryption in SQL Server/05. Encrypting Data at Rest.mp4 11.2 MB
06. Tools for Compliance Regulations/05. Using SQL Server Ledger.mp4 11.0 MB
02. Introduction to Advanced Security Topics/01. SQL Server Security Overview.mp4 10.2 MB
04. Encryption in SQL Server/04. Encrypting Column Data.mp4 10.2 MB
05. Fighting SQL Injection Attacks/04. Using Properly Stored Procedures and Dynamic SQL.mp4 9.4 MB
03. Auditing/03. Setting up SQL Server Auditing in a Database.mp4 8.7 MB
04. Encryption in SQL Server/02. Using Hash Functions for Password Storage.mp4 8.5 MB
05. Fighting SQL Injection Attacks/02. Real World Injection Threats.mp4 8.0 MB
06. Tools for Compliance Regulations/02. Masking Sensitive Data Using Dynamic Data Masking.mp4 7.8 MB
05. Fighting SQL Injection Attacks/01. Understanding SQL Injections.mp4 7.7 MB
05. Fighting SQL Injection Attacks/03. Protecting T-SQL Code Against Injections.mp4 6.5 MB
猜你喜欢:
Applications
Server
Securing
SQL
- 【影视】 [ CoursePig.com ] Securing a Spring Boot REST API Using Spring Security with iPad Pro and Raspberry Pi 4
-
收录时间:2022-02-04
文档个数:18
文档大小:745.3 MB
最近下载:2025-05-11
人气:1275
磁力链接
~Get Your Files Here !/04-Secure the API.mp4 163.3 MB
~Get Your Files Here !/06-Add Authentication Support to Services.mp4 158.0 MB
~Get Your Files Here !/07-Add Authentication Support to Controllers.mp4 157.1 MB
~Get Your Files Here !/03-Build JWT Support.mp4 137.0 MB
~Get Your Files Here !/05-Overview of Security Payload.mp4 50.9 MB
~Get Your Files Here !/08-Testing the API.mp4 43.7 MB
~Get Your Files Here !/02-Introduction.mp4 30.1 MB
~Get Your Files Here !/01-Summary.mp4 5.1 MB
~Get Your Files Here !/04-Secure the API.en.srt 14.4 kB
~Get Your Files Here !/03-Build JWT Support.en.srt 13.7 kB
~Get Your Files Here !/07-Add Authentication Support to Controllers.en.srt 12.5 kB
~Get Your Files Here !/06-Add Authentication Support to Services.en.srt 11.5 kB
~Get Your Files Here !/08-Testing the API.en.srt 7.6 kB
~Get Your Files Here !/02-Introduction.en.srt 6.9 kB
~Get Your Files Here !/05-Overview of Security Payload.en.srt 6.7 kB
~Get Your Files Here !/01-Summary.en.srt 1.2 kB
~Get Your Files Here !/Bonus Resources.txt 386 Bytes
Get Bonus Downloads Here.url 179 Bytes
猜你喜欢:
Spring
iPad
Pi
Securing
CoursePig
Pro
Boot
REST
API
Using
- 【影视】 [ TutGator.com ] Oreilly - Securing ASP.NET Core Endpoints - Using Signal Sign On
-
收录时间:2023-12-18
文档个数:13
文档大小:273.5 MB
最近下载:2025-05-16
人气:1273
磁力链接
~Get Your Files Here !/006. Securing REST API Endpoints.mp4 60.2 MB
~Get Your Files Here !/009. Securing gRPC Services.mp4 36.7 MB
~Get Your Files Here !/004. Securing Razor Pages.mp4 36.7 MB
~Get Your Files Here !/010. Securing SignalR Hubs.mp4 35.4 MB
~Get Your Files Here !/008. Securing Blazor WebAssembly Applications.mp4 30.7 MB
~Get Your Files Here !/005. Securing MVC Endpoints.mp4 20.0 MB
~Get Your Files Here !/003. Preparing your Environment.mp4 16.2 MB
~Get Your Files Here !/007. Securing Blazor Server Applications.mp4 15.7 MB
~Get Your Files Here !/002. OpenID Connect and OAuth Overview.mp4 12.0 MB
~Get Your Files Here !/001. Introduction.mp4 6.0 MB
~Get Your Files Here !/011. Summary.mp4 3.9 MB
~Get Your Files Here !/Bonus Resources.txt 386 Bytes
Get Bonus Downloads Here.url 178 Bytes
猜你喜欢:
Core
ASP
TutGator
Securing
Signal
Sign
Using
NET
Endpoints
com