|
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
| [TGx]Downloaded from torrentgalaxy.to .txt |
585б |
| 0 |
254.85Кб |
| 1 |
203.15Кб |
| 1. Designing Security for a Resiliency Strategy - Microsoft Cer.mp4 |
38.38Мб |
| 1. Evaluating Security Postures by Using Benchmarks - Microsoft-1.mp4 |
29.42Мб |
| 1. Examining the Microsoft Cybersecurity Reference Architecture-1.mp4 |
38.14Мб |
| 1. Guiding Principals of Zero Trust - Microsoft Certified Cyber.mp4 |
29.81Мб |
| 1. Security Baselines for SaaS, PaaS, and IaaS services - Micro.mp4 |
46.05Мб |
| 1. Security Baselines for Servers and Client Endpoints - Micros-1.mp4 |
39.02Мб |
| 1. Security Operations Strategy Overview - Microsoft Certified .mp4 |
31.36Мб |
| 1. Specify Priorities for Mitigating Threats to Apps - Microsof-1.mp4 |
59.37Мб |
| 1. Strategy for Access to Cloud Resources - Microsoft Certified.mp4 |
41.04Мб |
| 1. Translating Compliance Requirements - Microsoft Certified Cy-1.mp4 |
37.80Мб |
| 10 |
456.69Кб |
| 11 |
305.86Кб |
| 12 |
434.88Кб |
| 13 |
143.17Кб |
| 14 |
370.93Кб |
| 15 |
426.78Кб |
| 16 |
461.08Кб |
| 17 |
466.40Кб |
| 18 |
234.23Кб |
| 19 |
162.49Кб |
| 2 |
133.97Кб |
| 2. Compliance and Defender for Cloud - Microsoft Certified Cybe-1.mp4 |
31.46Мб |
| 2. Evaluating Security Postures by Using Defender for Cloud - M-1.mp4 |
26.23Мб |
| 2. Frameworks, Processes, and Procedures - Microsoft Certified .mp4 |
37.19Мб |
| 2. Hybrid Environmental Security Strategies - Microsoft Certifi.mp4 |
60.80Мб |
| 2. Identity Store Strategy - Microsoft Certified Cybersecurity .mp4 |
18.69Мб |
| 2. Onboarding New Applications - Microsoft Certified Cybersecur-1.mp4 |
36.25Мб |
| 2. Security Operations - Microsoft Certified Cybersecurity Arch-1.mp4 |
44.86Мб |
| 2. Security Requirements for IoT Workloads - Microsoft Certifie.mp4 |
25.99Мб |
| 2. Security Requirements for Servers - Microsoft Certified Cybe.mp4 |
35.73Мб |
| 2. Translating Requirements - Microsoft Certified Cybersecurity.mp4 |
44.08Мб |
| 20 |
456.80Кб |
| 21 |
488.84Кб |
| 22 |
127.39Кб |
| 23 |
371.32Кб |
| 24 |
207.67Кб |
| 25 |
386.07Кб |
| 26 |
283.76Кб |
| 27 |
317.03Кб |
| 28 |
258.03Кб |
| 29 |
30.35Кб |
| 3 |
283.04Кб |
| 3. Authentication and Authorization Strategy - Microsoft Certif-1.mp4 |
23.40Мб |
| 3. Compliance Scores and Recommendations - Microsoft Certified -1.mp4 |
27.40Мб |
| 3. Evaluate Security Posture of Cloud Workloads - Microsoft Cer-1.mp4 |
22.86Мб |
| 3. Logging and Auditing Strategy - Microsoft Certified Cybersec.mp4 |
40.34Мб |
| 3. Multi-tenant Environmental Security Strategies - Microsoft C.mp4 |
20.14Мб |
| 3. SaaS & Identity Protection - Microsoft Certified Cybersecuri.mp4 |
20.52Мб |
| 3. Security Requirements for Data Workloads - Microsoft Certifi-1.mp4 |
39.05Мб |
| 3. Security Requirements for Mobile Devices and Clients - Micro.mp4 |
37.22Мб |
| 3. Security Strategy for Applications and APIs - Microsoft Cert-1.mp4 |
42.55Мб |
| 3. Translating Business Goals into Security Requirements - Micr.mp4 |
45.70Мб |
| 30 |
275.03Кб |
| 31 |
125.82Кб |
| 32 |
207.97Кб |
| 33 |
128.13Кб |
| 34 |
319.33Кб |
| 35 |
40.76Кб |
| 36 |
110.95Кб |
| 37 |
143.18Кб |
| 38 |
280.01Кб |
| 39 |
75.23Кб |
| 4 |
381.19Кб |
| 4. Designing Security for an Azure Landing Zone - Microsoft Cer.mp4 |
40.77Мб |
| 4. Endpoints and Devices - Microsoft Certified Cybersecurity Ar-1.mp4 |
15.85Мб |
| 4. Implementing Azure Policy - Microsoft Certified Cybersecurit.mp4 |
56.22Мб |
| 4. Priorities For Mitigating Threats To Data - Microsoft Certif-1.mp4 |
50.94Мб |
| 4. Requirements to Secure Active Directory Domain Services - Mi-1.mp4 |
33.88Мб |
| 4. SecOps for a Hybrid or Multi-cloud Environment - Microsoft C-1.mp4 |
15.99Мб |
| 4. Security Requirements for Web Workloads - Microsoft Certifie.mp4 |
25.48Мб |
| 4. Strategy for Conditional Access - Microsoft Certified Cybers.mp4 |
31.69Мб |
| 4. Technical Solutions Basics - Microsoft Certified Cybersecuri.mp4 |
15.56Мб |
| 4. Traffic Filtering and Segmentation Strategies - Microsoft Ce-1.mp4 |
50.97Мб |
| 40 |
8.12Кб |
| 41 |
199.65Кб |
| 42 |
77.39Кб |
| 43 |
402.07Кб |
| 44 |
40.41Кб |
| 45 |
473.22Кб |
| 46 |
424.16Кб |
| 47 |
85.69Кб |
| 48 |
102.44Кб |
| 49 |
285.35Кб |
| 5 |
29.46Кб |
| 5. Azure Best Practices for Network Security - Microsoft Certif-1.mp4 |
49.76Мб |
| 5. Azure Security Top 10 - Microsoft Certified Cybersecurity Ar.mp4 |
31.23Мб |
| 5. Data Residency Requirements - Microsoft Certified Cybersecur.mp4 |
30.93Мб |
| 5. Hybrid Infrastructure - Microsoft Certified Cybersecurity Ar-1.mp4 |
48.06Мб |
| 5. Identify and Protect Sensitive Data - Microsoft Certified Cy.mp4 |
31.39Мб |
| 5. Interpret Technical Threat Intelligence - Microsoft Certifie-1.mp4 |
29.99Мб |
| 5. Role Assignment and Delegation - Microsoft Certified Cyberse-1.mp4 |
26.72Мб |
| 5. Security Requirements for Storage Workloads - Microsoft Cert-1.mp4 |
28.61Мб |
| 5. SIEMSOAR Strategy - Microsoft Certified Cybersecurity Archit.mp4 |
44.14Мб |
| 5. Strategy to Manage Secrets, Keys, and Certificates - Microso-1.mp4 |
35.97Мб |
| 50 |
278.29Кб |
| 51 |
11.24Кб |
| 52 |
18.38Кб |
| 53 |
281.10Кб |
| 54 |
74.67Кб |
| 55 |
106.67Кб |
| 56 |
144.93Кб |
| 57 |
235.09Кб |
| 58 |
487.61Кб |
| 59 |
368.76Кб |
| 6 |
65.49Кб |
| 6. Azure Security Benchmark - Microsoft Certified Cybersecurity-1.mp4 |
108.25Мб |
| 6. Encryption Standards for Data at Rest and In Motion - Micros-1.mp4 |
37.62Мб |
| 6. Evaluating Security Workflows - Microsoft Certified Cybersec-1.mp4 |
27.42Мб |
| 6. Information Protection - Microsoft Certified Cybersecurity A.mp4 |
23.93Мб |
| 6. Mitigating Identified Risks - Microsoft Certified Cybersecur-1.mp4 |
51.13Мб |
| 6. Privileged Role Access to Infrastructure - Microsoft Certifi-1.mp4 |
28.04Мб |
| 6. Security Requirements for Containers and Orchestration - Mic-1.mp4 |
32.80Мб |
| 6. Strategy for Securing Remote Access - Microsoft Certified Cy.mp4 |
27.59Мб |
| 6. Translating Privacy Requirements - Microsoft Certified Cyber.mp4 |
47.41Мб |
| 60 |
316.64Кб |
| 61 |
440.27Кб |
| 62 |
6.49Кб |
| 63 |
82.22Кб |
| 64 |
158.16Кб |
| 65 |
235.91Кб |
| 7 |
247.66Кб |
| 7. Azure Data Security and Encryption Best Practices - Microsof.mp4 |
21.27Мб |
| 7. Incident Management - Microsoft Certified Cybersecurity Arch.mp4 |
15.77Мб |
| 7. IoT and Operational Technology (OT) - Microsoft Certified Cy-1.mp4 |
16.57Мб |
| 7. Securing Privileged Access Using RaMP - Microsoft Certified -1.mp4 |
45.58Мб |
| 7. Strategy for Privileged Activities - Microsoft Certified Cyb.mp4 |
28.46Мб |
| 8 |
449.04Кб |
| 8. People Security - Microsoft Certified Cybersecurity Architec.mp4 |
15.92Мб |
| 8. Strategy for Sharing Technical Threat Intelligence - Microso.mp4 |
24.23Мб |
| 9 |
93.70Кб |
| 9. Other Resources - Microsoft Certified Cybersecurity Architec.mp4 |
31.87Мб |
| TutsNode.net.txt |
63б |