Cloud Security for Dummies By: Ted Coombs [Audiobook] | Audiobooks – Computer/Internet | MP3@128kb/s | 911.82 MiB
2022-03-29 | ASIN: B09W7JC78L | english | 16h24m
Author: Ted Coombs
Narrated by: Chris Reilly
Cloud technology has changed the way we approach technology. It’s also given rise to a new set of security challenges caused by bad actors who seek to exploit vulnerabilities in a digital infrastructure. You can put the kibosh on these hackers and their dirty deeds by hardening the walls that protect your data.
Using the practical techniques discussed in Cloud Security for Dummies, you’ll mitigate the risk of a data breach by building security into your network from the bottom up. Learn how to set your security policies to balance ease-of-use and data protection and work with tools provided by vendors trusted around the world.
This book offers step-by-step demonstrations of how to:
- Establish effective security protocols for your cloud application, network, and infrastructure
- Manage and use the security tools provided by different cloud vendors
- Deliver security audits that reveal hidden flaws in your security setup
As firms around the world continue to expand their use of cloud technology, the cloud is becoming a bigger and bigger part of our lives. You can help safeguard with the straightforward strategies discussed in this book.
348K 001 Opening Credits.mp3 404K 002 Publisher's Note.mp3 1.8M 003 Limit of Liability-Disclaimer of Warranty.mp3 4.4M 004 Introduction.mp3 1.3M 005 About this Book.mp3 600K 006 Foolish Assumptions.mp3 1.1M 007 Icons Used in this Book.mp3 1020K 008 Beyond the Book.mp3 1.1M 009 Where to Go from Here.mp3 536K 010 Part 1- Getting Started with Cloud Security.mp3 2.2M 011 Chapter 1- Clouds Aren’t Bulletproof.mp3 6.5M 012 Knowing Your Business.mp3 5.6M 013 Knowing Your SLA Agreements with Service Providers.mp3 6.0M 014 Building Your Team.mp3 8.9M 015 Creating a Risk Management Plan.mp3 22M 016 When Security Is Your Responsibility.mp3 4.7M 017 Avoiding Security Work with the Help of the Cloud.mp3 2.1M 018 Chapter 2- Getting Down to Business.mp3 9.6M 019 Negotiating the Shared Responsibility Model.mp3 12M 020 SaaS, PaaS, IaaS, AaaA!.mp3 13M 021 Managing Your Environment.mp3 5.6M 022 Managing Security for Devices Not Under Your Control.mp3 2.5M 023 Applying Security Patches.mp3 2.3M 024 Looking Ahead.mp3 1.9M 025 Chapter 3- Storing Data in the Cloud.mp3 2.6M 026 Dealing with the Data Silo Dilemma.mp3 19M 027 Cataloging Your Data.mp3 8.2M 028 Working with Sample Classification Systems.mp3 4.1M 029 Tokenizing Sensitive Data.mp3 1.3M 030 Segmenting Data.mp3 6.1M 031 Anonymizing Data.mp3 6.4M 032 Encrypting Data in Motion, in Use, and at Rest.mp3 1.7M 033 Creating Data Access Security Levels.mp3 11M 034 Controlling User Access.mp3 1.4M 035 Chapter 4- Developing Secure Software.mp3 16M 036 Turbocharging Development.mp3 22M 037 Automating Testing During Development.mp3 13M 038 Running Your Applications.mp3 14M 039 Like DevOps but for Data.mp3 12M 040 DevSecOps for DataOps.mp3 6.3M 041 Meeting the Challenges of DataSecOps.mp3 2.5M 042 Understanding that No Cloud Is Perfect.mp3 1.4M 043 Chapter 5- Restricting Access.mp3 6.9M 044 Determining the Level of Access Required.mp3 8.4M 045 Understanding Least Privilege Policy.mp3 7.2M 046 Implementing Authentication.mp3 21M 047 Introducing the Alphabet Soup of Compliance.mp3 14M 048 Maintaining Compliance and CSPM.mp3 18M 049 Controlling Access to the Cloud.mp3 8.9M 050 Getting Certified.mp3 504K 051 Part 2- Acceptance.mp3 2.2M 052 Chapter 6- Managing Cloud Resources.mp3 3.5M 053 Defending Your Cloud Resources from Attack.mp3 7.6M 054 Living in a Virtual World.mp3 5.7M 055 Securing Cloud Resources with Patch Management.mp3 6.8M 056 Keeping Your Cloud Assets Straight in Your Mind.mp3 15M 057 Keeping Tabs with Logs.mp3 9.0M 058 Building Your Own Defenses.mp3 1.8M 059 Chapter 7- The Role of AIOps in Cloud Security.mp3 28M 060 Taking the AIOps Route.mp3 6.1M 061 Making Things Visible.mp3 5.8M 062 Managing Resources, CMDB-Style.mp3 5.1M 063 Using AIOps.mp3 16M 064 Using Splunk to Manage Clouds.mp3 9.2M 065 Putting ServiceNow Through Its Paces.mp3 4.2M 066 Getting the Job Done with IT Service Management.mp3 2.0M 067 Changing Your Team.mp3 1.4M 068 A (Not So Final) Word.mp3 1.7M 069 Chapter 8- Implementing Zero Trust.mp3 3.2M 070 Making the Shift from Perimeter Security.mp3 28M 071 Examining the Foundations of Zero Trust Philosophy.mp3 24M 072 Dealing with Zero Trust Challenges.mp3 3.1M 073 Chapter 9- Dealing with Hybrid Cloud Environments.mp3 6.8M 074 Public Clouds Make Pretty Sunsets.mp3 4.4M 075 Private Clouds for Those Special Needs.mp3 6.2M 076 Wrapping Your Mind Around Hybrid Cloud Options.mp3 13M 077 Gauging the Advantages of the Hybrid Cloud Setup.mp3 5.7M 078 Struggling with Hybrid Challenges.mp3 13M 079 Overcoming Hybrid Challenges.mp3 8.7M 080 On the Move- Migrating to a Hybrid Cloud.mp3 3.6M 081 Using a Package.mp3 4.2M 082 Chapter 10- Data Loss and Disaster Recovery.mp3 11M 083 Linking Email with Data Loss.mp3 16M 084 Crafting Data Loss Prevention Strategies.mp3 8.3M 085 Minimizing Cloud Data Loss.mp3 13M 086 Recovering from Disaster.mp3 14M 087 Chaos Engineering.mp3 496K 088 Part 3- Business as Usual.mp3 1.7M 089 Chapter 11- Using Cloud Security Services.mp3 1.5M 090 Customizing Your Data Protection.mp3 19M 091 Validating Your Cloud.mp3 23M 092 HSM- Hardware Security Modules for the Big Kids.mp3 9.3M 093 KMS- Key Management Services for Everyone Else.mp3 2.5M 094 Setting Up Crypto Service Gateways.mp3 1.6M 095 Chapter 12- When Things Go Wrong.mp3 3.0M 096 Finding Your Focus.mp3 31M 097 Stealing Data 101.mp3 13M 098 Preventing the Preventable and Managing Employee Security.mp3 23M 099 Navigating Cloud Native Breaches.mp3 2.6M 100 Chapter 13- Security Frameworks.mp3 24M 101 Looking at Common Frameworks.mp3 19M 102 Introducing SASE Architecture.mp3 7.1M 103 The Cloud Native Application Protection Platform.mp3 8.8M 104 NIST Risk Management Framework.mp3 1.7M 105 Chapter 14- Security Consortiums.mp3 4.5M 106 Doing the Right Thing.mp3 7.8M 107 Membership in the Cloud Security Alliance.mp3 7.0M 108 Getting that Stamp of Approval.mp3 7.0M 109 Information Security Alliances, Groups, and Consortiums.mp3 1.9M 110 Words for the Road.mp3 384K 111 Part 4- The Part of Tens.mp3 1.5M 112 Chapter 15- Ten Steps to Better Cloud Security.mp3 4.2M 113 Scoping Out the Dangers.mp3 3.5M 114 Inspiring the Right People to Do the Right Thing.mp3 2.4M 115 Keeping Configuration Management on the Straight and Narrow.mp3 2.4M 116 Adopting AIOps.mp3 1.2M 117 Getting on Board with DataOps.mp3 2.3M 118 Befriending Zero Trust.mp3 1.9M 119 Keeping the Barn Door Closed.mp3 3.0M 120 Complying with Compliance Mandates.mp3 1.3M 121 Joining the Cloud Security Club.mp3 4.4M 122 Preparing for the Future.mp3 1.2M 123 Chapter 16- Cloud Security Solutions.mp3 912K 124 Checkpoint CloudGuard.mp3 912K 125 CloudPassage Halo.mp3 756K 126 Threat Stack Cloud Security Platform.mp3 1.3M 127 Symantec Cloud Workload Protection.mp3 1.3M 128 Datadog Monitoring Software.mp3 1.3M 129 Azure AD.mp3 932K 130 Palo Alto Prisma.mp3 1.1M 131 Fortinet Cloud Security.mp3 1.7M 132 ServiceNow AIOps.mp3 1.9M 133 Lacework.mp3 860K 134 End Credits.mp3 48K cover.jpg 913M total
Download from Nitroflare
1 Link/s
Download https://nitroflare.com/view/18EAF2433FC19EE/Cloud_Security_for_Dummies_By_Ted_Coombs-ReleaseHive.zip
Download from Rapidgator
1 Link/s
Download