Cybrary it Certificate of Cloud Security Knowledge CCSK-SNYLK

Cybrary it Certificate of Cloud Security Knowledge CCSK-SNYLK
English | Size: 3.02 GB
Category: Tutorial


This course prepares you to take the Certificate of Cloud Security Knowledge (CCSK) certification by covering material included in the exam. It explains how the exam can be taken and how CCSK certification process works.

Udemy – Cyber Security Awareness 2020

Udemy – Cyber Security Awareness 2020
English | Size: 187 MB
Category: Tutorial


How you can security connect to the Digital World
We are in the Era of Digitization. Digitization provides wide open boundary connecting the globe where any time access is feasible by any means from any device. Doing business is not a challenge now across the globe, timezone challenge is also not critical anymore.

Linux: Linux Security Masterclass: 3-in-1 | Udemy

Linux: Linux Security Masterclass: 3-in-1 | Udemy
English | Size: 3.61 GB
Category: CBTS


One-stop solution to all your Linux security problems!

Linux is the first choice for any attacker now and more administrators have started moving to the system to create networks or servers for any task. This course will help you create a more secure Linux system.

PluralSight – Managing Security in Google Cloud Platform

PluralSight – Managing Security in Google Cloud Platform Bookware-KNiSO
English | Size: 568.77 MB
Category: Tutorial


This self-paced training course gives participants broad study of security controls and techniques on Google Cloud Platform. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure GCP solution, including Cloud Identity, the GCP Resource Manager, Cloud IAM, Google Virtual Private Cloud firewalls, Google Cloud Load balancing, Cloud CDN, Cloud Storage access control technologies, Stackdriver, Security Keys, Customer-Supplied Encryption Keys, the Google Data Loss Prevention API, and Cloud Armor. Participants learn mitigations for attacks at many points in a GCP-based infrastructure, including Distributed Denial-of-Service attacks, phishing attacks, and threats involving content classification and use.