搜索
DevSpecOps Bootcamp
磁力链接/BT种子名称
DevSpecOps Bootcamp
磁力链接/BT种子简介
种子哈希:
88dc074e788f63cf598e3e26e6eab5f76d207d43
文件大小:
3.07G
已经下载:
5355
次
下载速度:
极快
收录时间:
2023-12-18
最近下载:
2024-12-11
移花宫入口
移花宫.com
邀月.com
怜星.com
花无缺.com
yhgbt.icu
yhgbt.top
磁力链接下载
magnet:?xt=urn:btih:88DC074E788F63CF598E3E26E6EAB5F76D207D43
推荐使用
PIKPAK网盘
下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看
下载BT种子文件
磁力链接
迅雷下载
PIKPAK在线播放
91视频
含羞草
欲漫涩
逼哩逼哩
成人快手
51品茶
抖阴破解版
暗网禁地
91短视频
TikTok成人版
PornHub
草榴社区
乱伦社区
少女初夜
萝莉岛
最近搜索
窗洞
迷药
山河月明
重磅女神下海
聊斋艳谭Ⅱ之五通神
超美御姐!
fc2-ppv-4126848+
batman hindi
眼镜+反差
stacy.saint
小○生*
technology, mind, and behavior
菜1
高颜大奶美女+我来完大姨妈下面特别紧
叫起床
managing up
klb-501
徐雅
djne-74
drslumpx
耶香
腰太细了
ai wakana jpngirl
ktv玩游戏
001 第一会所
t3u3.com
小千教学日记
バレない
cd装
中学露脸
文件列表
part 1/1 - Security Essentials/6 - OWASP top 10 - Part 1.mp4
110.6 MB
part 1/4 - Vulnerability Management and Remediation/3 - Automate Uploading Security Scan Results to DefectDojo.mp4
107.1 MB
part 1/4 - Vulnerability Management and Remediation/2 - Introduction to DefectDojo, Managing Security Findings, CWEs.mp4
105.8 MB
part 1/11 - Logging & Monitoring for Security/4 - Configure Multi-Region Trail in CloudTrail & Forward Logs to CloudWatch.mp4
99.3 MB
part 1/0 - Getting Started with the DevSecOps Bootcamp/3 - DevSecOps Bootcamp Curriculum Overview.mp4
87.2 MB
part 1/6 - Build a CD Pipeline/7 - Build Application Images on Self-Managed Runner, Leverage Docker Caching.mp4
86.8 MB
part 1/1 - Security Essentials/7 - OWASP top 10 - Part 2.mp4
83.6 MB
part 1/7 - Image Scanning - Build Secure Docker Images/3 - Analyze & Fix Security Issues from Findings in Application Image.mp4
83.5 MB
part 1/3 - Application Vulnerability Scanning/6 - Integrate SAST Scans in Release Pipeline.mp4
83.3 MB
part 1/1 - Security Essentials/4 - Types of Security Attacks - Part 1.mp4
77.8 MB
part 1/1 - Security Essentials/5 - Types of Security Attacks - Part 2.mp4
76.8 MB
part 1/9 - Secure Continuous Deployment & DAST/8 - Configure Automated DAST Scans in CICD Pipeline.mp4
76.3 MB
part 1/6 - Build a CD Pipeline/3 - Integrate CICD Pipeline with AWS ECR.mp4
73.4 MB
part 1/3 - Application Vulnerability Scanning/1 - Build a Continuous Integration Pipeline (3 - Application Vulnerability Scanning).mp4
73.0 MB
part 1/9 - Secure Continuous Deployment & DAST/4 - Secure Continuous Deployment to Server using SSM.mp4
68.6 MB
part 1/7 - Image Scanning - Build Secure Docker Images/2 - Configure Automated Security Scanning in Application Image.mp4
67.3 MB
part 1/3 - Application Vulnerability Scanning/4 - Pre-commit Hook for Secret Scanning & Integrating GitLeaks in CI Pipeline.mp4
67.2 MB
part 1/4 - Vulnerability Management and Remediation/4 - Fix Security Issues Discovered in the DevSecOps Pipeline.mp4
66.2 MB
part 1/11 - Logging & Monitoring for Security/5 - Create CloudWatch Alarm for EC2 Instance.mp4
65.7 MB
part 1/3 - Application Vulnerability Scanning/5 - False Positives & Fixing Security Vulnerabilities.mp4
64.7 MB
part 1/10 - IaC and GitOps for DevSecOps/2 - Terraform Script for AWS Infrastructure Provisioning.mp4
64.2 MB
part 1/9 - Secure Continuous Deployment & DAST/5 - Secure Access to AWS with IAM Roles & Short-Lived Credentials.mp4
60.7 MB
part 1/6 - Build a CD Pipeline/5 - Deploy Application to EC2 Server with Release Pipeline.mp4
59.0 MB
part 1/6 - Build a CD Pipeline/6 - Configure Self-Managed GitLab Runner for Pipeline Jobs.mp4
58.9 MB
part 1/5 - Vulnerability Scanning for Application Dependencies/1 - Software Composition Analysis - Security Issues in Application Dependencies (5 - Vulnerability Scanning for Application Dependencies).mp4
56.0 MB
part 1/3 - Application Vulnerability Scanning/3 - Secret Scanning with GitLeaks - Local Environment.mp4
52.2 MB
part 1/1 - Security Essentials/2 - Importance of Security & Impact of Security Breaches.mp4
50.5 MB
part 1/8 - AWS Cloud Security & Access Management/5 - Secure Access from CICD Pipeline to AWS.mp4
49.1 MB
part 1/9 - Secure Continuous Deployment & DAST/3 - AWS SSM Commands in Release Pipeline for Server Access.mp4
48.4 MB
part 1/2 - Introduction to DevSecOps/2 - Understand DevSecOps.mp4
47.5 MB
part 1/7 - Image Scanning - Build Secure Docker Images/6 - Configure Automated Image Security Scanning in ECR Image Repository.mp4
46.1 MB
part 1/5 - Vulnerability Scanning for Application Dependencies/2 - Import SCA Scan Reports in DefectDojo, Fixing SCA Findings, CVEs.mp4
44.7 MB
part 1/9 - Secure Continuous Deployment & DAST/2 - Configure AWS Systems Manager for EC2 Server.mp4
43.5 MB
part 1/11 - Logging & Monitoring for Security/6 - Create Custom Metric Filter for Failed Login Metrics.mp4
43.5 MB
part 1/7 - Image Scanning - Build Secure Docker Images/5 - Docker Security Best Practices.mp4
40.4 MB
part 1/2 - Introduction to DevSecOps/1 - Issues with Traditional Approach to Security (2 - Introduction to DevSecOps).mp4
40.1 MB
part 1/10 - IaC and GitOps for DevSecOps/4 - Build CICD Pipeline for Infrastructure Code using GitOps Principles.mp4
39.1 MB
part 1/11 - Logging & Monitoring for Security/7 - Configure Alarm for Failed Login Attempts.mp4
37.9 MB
part 1/1 - Security Essentials/8 - Security in Layers.mp4
37.5 MB
part 1/6 - Build a CD Pipeline/4 - Configure Application Deployment Environment on EC2 Server.mp4
37.5 MB
part 1/10 - IaC and GitOps for DevSecOps/6 - Add Automated Security Scan to TF Infrastructure Code.mp4
37.3 MB
part 1/7 - Image Scanning - Build Secure Docker Images/4 - Automate Uploading Image Scanning Results in DefectDojo.mp4
34.7 MB
part 1/11 - Logging & Monitoring for Security/3 - CloudTrail Event History.mp4
33.9 MB
part 1/4 - Vulnerability Management and Remediation/1 - Generate Security Scanning Reports (4 - Vulnerability Management and Remediation).mp4
33.3 MB
part 1/9 - Secure Continuous Deployment & DAST/7 - Understand Dynamic Application Security Testing (DAST).mp4
32.7 MB
part 1/2 - Introduction to DevSecOps/3 - Roles & Responsibilities in DevSecOps.mp4
32.0 MB
part 1/6 - Build a CD Pipeline/2 - Introduction to Security Layers for AWS Access.mp4
31.7 MB
part 1/9 - Secure Continuous Deployment & DAST/1 - Security Essentials for Accessing Deployment Server (9 - Secure Continuous Deployment & DAST).mp4
29.3 MB
part 1/10 - IaC and GitOps for DevSecOps/5 - Configure Remote State for Terraform.mp4
28.5 MB
part 1/8 - AWS Cloud Security & Access Management/4 - IAM Users, Groups & Policies.mp4
28.3 MB
part 1/8 - AWS Cloud Security & Access Management/1 - AWS Security Essentials (8 - AWS Cloud Security & Access Management).mp4
28.3 MB
part 1/10 - IaC and GitOps for DevSecOps/1 - Understand Impact of IaC in Security & DevSecOps (10 - IaC and GitOps for DevSecOps).mp4
26.9 MB
part 1/10 - IaC and GitOps for DevSecOps/3 - Replace Manually Created Infrastructure with Automatically Provisioned Resources.mp4
26.2 MB
part 1/8 - AWS Cloud Security & Access Management/3 - Securing AWS Root User Account.mp4
24.9 MB
part 1/11 - Logging & Monitoring for Security/8 - Configure AWS Budgets for Monthly Usage Costs.mp4
23.6 MB
part 1/8 - AWS Cloud Security & Access Management/6 - Understand Importance of IAM Roles in AWS Cloud Security.mp4
19.0 MB
part 1/11 - Logging & Monitoring for Security/2 - Introduction to CloudTrail and CloudWatch.mp4
15.7 MB
part 1/11 - Logging & Monitoring for Security/1 - Understand Need for Logging and Monitoring in Security (11 - Logging & Monitoring for Security).mp4
15.5 MB
part 1/1 - Security Essentials/3 - How to Secure Systems Against Attacks.mp4
13.4 MB
part 1/0 - Getting Started with the DevSecOps Bootcamp/2 - Pre-Requisites of Bootcamp.mp4
11.8 MB
part 1/10 - IaC and GitOps for DevSecOps/7 - Understand IaC Concept Cattle vs Pets.mp4
11.3 MB
part 1/9 - Secure Continuous Deployment & DAST/6 - Overview of AWS Security Measures and Continuous Security Improvements.mp4
10.9 MB
part 1/3 - Application Vulnerability Scanning/2 - Impact of Missing Security Insights.mp4
10.5 MB
part 1/01 - Security Essentials.pdf
10.3 MB
part 1/0 - Getting Started with the DevSecOps Bootcamp/1 - Why learn DevSecOps.mp4
9.7 MB
part 1/8 - AWS Cloud Security & Access Management/7 - Overview of IAM Resources & Secure Access Management in AWS.mp4
9.6 MB
part 1/02 - Intro to DevSecOps.pdf
9.5 MB
part 1/6 - Build a CD Pipeline/1 - Overview of a CICD Pipeline (6 - Build a CD Pipeline).mp4
8.5 MB
part 1/11 - Logging & Monitoring for Security.pdf
7.9 MB
part 1/0 - Getting Started with the DevSecOps Bootcamp/4 - Support and Other Bootcamp Materials.mp4
7.9 MB
part 1/9 - Secure Continuous Deployment & DAST/9 - Overview of Complete DevSecOps Pipeline with Static and Dynamic Security Scans.mp4
7.8 MB
part 1/8 - AWS Cloud Security & Access Management/2 - Understand AWS Access Management using IAM Service.mp4
7.6 MB
part 1/07 - Image Scanning.pdf
7.6 MB
part 1/09 - Secure Continuous Deployment & DAST.pdf
7.5 MB
part 1/10 - IaC and GitOps for DevSecOps.pdf
7.5 MB
part 1/03 - App Vulnerability Scanning.pdf
7.2 MB
part 1/0 - Getting Started with the DevSecOps Bootcamp/5 - Certified DevSecOps Practitioner - Applying for Digital Badge.mp4
6.6 MB
part 1/06 - Set up CD Pipeline.pdf
5.9 MB
part 1/7 - Image Scanning - Build Secure Docker Images/1 - Overview of Image Security (7 - Image Scanning - Build Secure Docker Images).mp4
5.7 MB
part 1/1 - Security Essentials/1 - Introduction to Security (1 - Security Essentials).mp4
5.6 MB
part 1/04 - Vulnerability Management.pdf
5.1 MB
part 1/08 - AWS Cloud Security and Access Management.pdf
4.9 MB
part 1/11 - Logging & Monitoring for Security/9 - Complete Bootcamp Part 1 - Next Steps.mp4
4.8 MB
part 1/05 - Vulnerability Scanning for App Dependencies.pdf
4.4 MB
part 1/5 - Vulnerability Scanning for Application Dependencies/3 - Overview of Static Security Scans in CI Pipeline.mp4
4.3 MB
part 1/7 - Image Scanning - Build Secure Docker Images/7 - Overview of Automated Application Code and Image Scanning Steps.mp4
3.1 MB
part 1/DevSpecOps Bootcamp.txt
4.5 kB
part 1/links.txt
3.9 kB
随机展示
相关说明
本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!
>