:Search:

ISC2 Certified Cloud Security Professional CCSP Cert Prep

Torrent:
Info Hash: 0DB7C1E228FA8E4F42D52921931AF454AE73BB03
Similar Posts:
Uploader: freecoursewb
Source: 1 Logo 1337x
Downloads: 738
Type: Tutorials
Language: English
Category: Other
Size: 1.3 GB
Added: July 10, 2025, 7:01 a.m.
Peers: Seeders: 7, Leechers: 0 (Last updated: 3 weeks, 1 day ago)
Tracker Data:
Tracker Seeders Leechers Completed
udp://tracker.rarbg.torrentbay.st:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.opentrackr.org:1337/announce 3 0 545
udp://open.demonoid.ch:6969/announce 0 0 0
udp://open.demonii.com:1337/announce 0 0 0
udp://open.stealth.si:80/announce 2 0 193
udp://explodie.org:6969/announce 2 0 0
udp://exodus.desync.com:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://wepzone.net:6969/announce 0 0 0
udp://tracker1.myporn.club:9337/announce 0 0 0
udp://tracker.srv00.com:6969/announce (Invalid scrape response) 0 0 0
Files:
  1. Get Bonus Downloads Here.url 180 bytes
  2. 01 - Introduction to CCSP.mp4 11.3 MB
  3. 01 - Introduction to CCSP.srt 9.2 KB
  4. 01 - Domain 1 overview.mp4 2.2 MB
  5. 01 - Domain 1 overview.srt 2.1 KB
  6. 02 - Cloud computing definitions, roles, and responsibilities.mp4 25.0 MB
  7. 02 - Cloud computing definitions, roles, and responsibilities.srt 20.1 KB
  8. 03 - Key cloud computing characteristics.mp4 16.0 MB
  9. 03 - Key cloud computing characteristics.srt 11.8 KB
  10. 04 - Building block technologies.mp4 13.0 MB
  11. 04 - Building block technologies.srt 12.3 KB
  12. 05 - Cloud activities, service capabilities and categories, and deployment models.mp4 16.2 MB
  13. 05 - Cloud activities, service capabilities and categories, and deployment models.srt 14.5 KB
  14. 06 - Cloud shared considerations.mp4 14.4 MB
  15. 06 - Cloud shared considerations.srt 12.8 KB
  16. 07 - Impact of related technologies.mp4 21.7 MB
  17. 07 - Impact of related technologies.srt 18.6 KB
  18. 08 - Cryptography and key management.mp4 6.9 MB
  19. 08 - Cryptography and key management.srt 6.8 KB
  20. 09 - Identity and access control.mp4 10.3 MB
  21. 09 - Identity and access control.srt 9.9 KB
  22. 10 - Data and media sanitization.mp4 6.8 MB
  23. 10 - Data and media sanitization.srt 6.6 KB
  24. 11 - Network security.mp4 16.3 MB
  25. 11 - Network security.srt 13.3 KB
  26. 12 - Virtualization security.mp4 17.1 MB
  27. 12 - Virtualization security.srt 15.9 KB
  28. 13 - Common threats.mp4 7.5 MB
  29. 13 - Common threats.srt 6.0 KB
  30. 14 - Security hygiene.mp4 12.1 MB
  31. 14 - Security hygiene.srt 11.2 KB
  32. 15 - Cloud secure data lifecycle.mp4 6.9 MB
  33. 15 - Cloud secure data lifecycle.srt 6.5 KB
  34. 16 - Business continuity and disaster recovery in the cloud.mp4 14.2 MB
  35. 16 - Business continuity and disaster recovery in the cloud.srt 12.1 KB
  36. 17 - Business impact analysis and functional security requirements.mp4 16.1 MB
  37. 17 - Business impact analysis and functional security requirements.srt 11.9 KB
  38. 18 - Service model security considerations and cloud design patterns.mp4 12.9 MB
  39. 18 - Service model security considerations and cloud design patterns.srt 9.7 KB
  40. 19 - DevOps security.mp4 6.4 MB
  41. 19 - DevOps security.srt 4.6 KB
  42. 20 - Verifications and certifications using common standards.mp4 13.8 MB
  43. 20 - Verifications and certifications using common standards.srt 9.7 KB
  44. 01 - Domain 2 overview.mp4 1.4 MB
  45. 01 - Domain 2 overview.srt 1.2 KB
  46. 02 - Cloud data life cycle, data dispersion, and data flows.mp4 14.7 MB
  47. 02 - Cloud data life cycle, data dispersion, and data flows.srt 14.3 KB
  48. 03 - Storage types.mp4 20.9 MB
  49. 03 - Storage types.srt 15.4 KB
  50. 04 - Storage threats.mp4 15.2 MB
  51. 04 - Storage threats.srt 12.0 KB
  52. 05 - Encryption and key management.mp4 25.3 MB
  53. 05 - Encryption and key management.srt 17.4 KB
  54. 06 - Hashing, data obfuscation, and tokenization.mp4 18.8 MB
  55. 06 - Hashing, data obfuscation, and tokenization.srt 16.1 KB
  56. 07 - Data loss prevention, keys, secrets, and certificates.mp4 21.4 MB
  57. 07 - Data loss prevention, keys, secrets, and certificates.srt 16.6 KB
  58. 08 - Different structures of data and data location.mp4 14.1 MB
  59. 08 - Different structures of data and data location.srt 12.7 KB
  60. 09 - Data classification policies.mp4 9.4 MB
  61. 09 - Data classification policies.srt 8.5 KB
  62. 10 - Data mapping and labeling.mp4 7.6 MB
  63. 10 - Data mapping and labeling.srt 7.5 KB
  64. 11 - Information rights management.mp4 12.8 MB
  65. 11 - Information rights management.srt 11.1 KB
  66. 12 - Data retention policies.mp4 15.7 MB
  67. 12 - Data retention policies.srt 13.7 KB
  68. 13 - Data deletion, archiving, and legal hold.mp4 16.6 MB
  69. 13 - Data deletion, archiving, and legal hold.srt 11.3 KB
  70. 14 - Enable data audit, trace, and accountability.mp4 16.6 MB
  71. 14 - Enable data audit, trace, and accountability.srt 12.7 KB
  72. 01 - Domain 3 overview.mp4 1.6 MB
  73. 02 - Physical environment.mp4 10.2 MB
  74. 02 - Physical environment.srt 7.6 KB
  75. 03 - Network communications and computing.mp4 9.7 MB
  76. 04 - Virtualization.mp4 13.0 MB
  77. 04 - Virtualization.srt 11.5 KB
  78. 05 - Storage.mp4 8.3 MB
  79. 05 - Storage.srt 7.3 KB
  80. 06 - Management plane.mp4 13.6 MB
  81. 06 - Management plane.srt 11.4 KB
  82. 07 - Design a secure data center.mp4 21.3 MB
  83. 07 - Design a secure data center.srt 16.3 KB
  84. 08 - Risk analysis.mp4 9.6 MB
  85. 08 - Risk analysis.srt 7.8 KB
  86. 09 - Cloud vulnerabilities, threats, attacks, and risk mitigation.mp4 12.5 MB
  87. 09 - Cloud vulnerabilities, threats, attacks, and risk mitigation.srt 11.2 KB
  88. 10 - Physical and environmental protection.mp4 9.4 MB
  89. 11 - System, storage, and communication protection.mp4 5.9 MB
  90. 11 - System, storage, and communication protection.srt 4.8 KB
  91. 12 - Identification, authentication, and authorization in the cloud.mp4 13.8 MB
  92. 12 - Identification, authentication, and authorization in the cloud.srt 10.5 KB
  93. 13 - Audit mechanisms.mp4 14.7 MB
  94. 13 - Audit mechanisms.srt 10.9 KB
  95. 14 - Business continuity (BC) and disaster recovery (DR) strategies.mp4 8.2 MB
  96. 14 - Business continuity (BC) and disaster recovery (DR) strategies.srt 6.5 KB
  97. 15 - Business requirements.mp4 11.8 MB
  98. 16 - BC and DR planning and testing.mp4 17.1 MB
  99. 16 - BC and DR planning and testing.srt 11.6 KB
  100. 01 - Domain 4 overview.mp4 3.6 MB
  101. 01 - Domain 4 overview.srt 3.6 KB
  102. 02 - Cloud development basics, common pitfalls, and vulnerabilities.mp4 28.4 MB
  103. 02 - Cloud development basics, common pitfalls, and vulnerabilities.srt 21.8 KB
  104. 03 - Secure software development.mp4 9.2 MB
  105. 03 - Secure software development.srt 6.9 KB
  106. 04 - Business requirements, phases, and methodologies.mp4 10.9 MB
  107. 04 - Business requirements, phases, and methodologies.srt 8.1 KB
  108. 05 - Cloud specific risks.mp4 20.9 MB
  109. 05 - Cloud specific risks.srt 16.7 KB
  110. 06 - Threat modeling.mp4 13.5 MB
  111. 06 - Threat modeling.srt 11.4 KB
  112. 07 - Layered security, secure coding, and configuration.mp4 8.8 MB
  113. 07 - Layered security, secure coding, and configuration.srt 6.1 KB
  114. 08 - Cloud software assurance and validation.mp4 15.0 MB
  115. 08 - Cloud software assurance and validation.srt 11.3 KB
  116. 09 - Application testing.mp4 12.4 MB
  117. 09 - Application testing.srt 8.4 KB
  118. 10 - Securing APIs and supply chains.mp4 7.0 MB
  119. 10 - Securing APIs and supply chains.srt 4.9 KB
  120. 11 - Validating and managing third-party and open-source software.mp4 7.7 MB
  121. 11 - Validating and managing third-party and open-source software.srt 6.1 KB
  122. 12 - Supplemental security components.mp4 16.8 MB
  123. 12 - Supplemental security components.srt 12.6 KB
  124. 13 - Cryptography, sandboxing, virtualization, and orchestration.mp4 22.2 MB
  125. 13 - Cryptography, sandboxing, virtualization, and orchestration.srt 14.9 KB
  126. 14 - Federated identity, identity providers (IdP), and SSO.mp4 13.4 MB
  127. 14 - Federated identity, identity providers (IdP), and SSO.srt 9.9 KB
  128. 15 - MFA, cloud access security brokers, and secrets management.mp4 12.9 MB
  129. 15 - MFA, cloud access security brokers, and secrets management.srt 9.4 KB
  130. 01 - Domain 5 overview.mp4 3.8 MB
  131. 01 - Domain 5 overview.srt 3.2 KB
  132. 02 - Hardware security.mp4 9.4 MB
  133. 02 - Hardware security.srt 6.9 KB
  134. 03 - Virtualization management, security, and tool sets.mp4 11.4 MB
  135. 03 - Virtualization management, security, and tool sets.srt 8.2 KB
  136. 04 - Remote access.mp4 9.3 MB
  137. 04 - Remote access.srt 7.1 KB
  138. 05 - Secure network configurations and controls.mp4 29.9 MB
  139. 05 - Secure network configurations and controls.srt 18.7 KB
  140. 06 - Operating system hardening and configuration.mp4 14.8 MB
  141. 06 - Operating system hardening and configuration.srt 10.4 KB
  142. 07 - Availability of hosts and guest operating systems.mp4 23.9 MB
  143. 07 - Availability of hosts and guest operating systems.srt 14.0 KB
  144. 08 - Performance, capacity, and hardware monitoring.mp4 14.4 MB
  145. 08 - Performance, capacity, and hardware monitoring.srt 10.2 KB
  146. 09 - Infrastructure as code and the management plane.mp4 14.3 MB
  147. 09 - Infrastructure as code and the management plane.srt 9.4 KB
  148. 10 - Program management, part 1.mp4 17.3 MB
  149. 10 - Program management, part 1.srt 12.6 KB
  150. 11 - Program management, part 2.mp4 17.1 MB
  151. 11 - Program management, part 2.srt 12.5 KB
  152. 12 - Program management, part 3.mp4 17.3 MB
  153. 12 - Program management, part 3.srt 12.4 KB
  154. 13 - Program management, part 4.mp4 14.1 MB
  155. 13 - Program management, part 4.srt 10.4 KB
  156. 14 - Forensics, evidence collection, and preservation.mp4 27.4 MB
  157. 14 - Forensics, evidence collection, and preservation.srt 20.3 KB
  158. 15 - Communication and cloud stakeholders.mp4 12.3 MB
  159. 15 - Communication and cloud stakeholders.srt 10.9 KB
  160. 16 - Security operations and intelligent monitoring.mp4 16.6 MB
  161. 16 - Security operations and intelligent monitoring.srt 10.3 KB
  162. 17 - Logging, incident management, and vulnerability assessments.mp4 30.2 MB
  163. 17 - Logging, incident management, and vulnerability assessments.srt 22.9 KB
  164. 01 - Domain 6 overview.mp4 3.7 MB
  165. 01 - Domain 6 overview.srt 3.5 KB
  166. 02 - Cloud legal requirements.mp4 10.0 MB
  167. 02 - Cloud legal requirements.srt 9.2 KB
  168. 03 - Legal frameworks and forensics.mp4 25.2 MB
  169. 03 - Legal frameworks and forensics.srt 20.5 KB
  170. 04 - Privacy in the cloud, part 1.mp4 14.0 MB
  171. 04 - Privacy in the cloud, part 1.srt 8.1 KB
  172. 05 - Privacy in the cloud, part 2.mp4 13.5 MB
  173. 05 - Privacy in the cloud, part 2.srt 8.7 KB
  174. 06 - Cloud auditing.mp4 19.0 MB
  175. 06 - Cloud auditing.srt 13.2 KB
  176. 07 - Audit analysis.mp4 17.7 MB
  177. 07 - Audit analysis.srt 12.8 KB
  178. 08 - Distributed infrastructure and compliance.mp4 20.6 MB
  179. 08 - Distributed infrastructure and compliance.srt 13.8 KB
  180. 09 - Enterprise risk management, part 1.mp4 13.8 MB
  181. 09 - Enterprise risk management, part 1.srt 10.9 KB
  182. 10 - Enterprise risk management, part 2.mp4 15.8 MB
  183. 10 - Enterprise risk management, part 2.srt 11.4 KB
  184. 11 - Outsourcing and cloud contracts.mp4 14.0 MB
  185. 11 - Outsourcing and cloud contracts.srt 10.4 KB
  186. Bonus Resources.txt 70 bytes

Discussion