磁力链接

magnet:?xt=urn:btih:D5240E7019E9C75BC676B883774F717C1A27EDF1
推荐使用PIKPAK网盘下载资源,PIKPAK是目前最好用网盘,10T超大空间,不和谐任何资源,支持无限次数离线下载,视频在线观看

资源截图

API Integration

文件列表

  • ~Get Your Files Here !/3 - Kubernetes Cluster Component Security/4 -Kubelet (Video).mp4 69.8 MB
  • ~Get Your Files Here !/3 - Kubernetes Cluster Component Security/3 -Scheduler (Video).mp4 65.1 MB
  • ~Get Your Files Here !/2 - Overview of Cloud Native Security/4 -Artifact Repository And Image Security (Video).mp4 63.0 MB
  • ~Get Your Files Here !/2 - Overview of Cloud Native Security/5 -Controls And Frameworks (Video).mp4 60.3 MB
  • ~Get Your Files Here !/3 - Kubernetes Cluster Component Security/8 -Client Security (Video).mp4 48.1 MB
  • ~Get Your Files Here !/2 - Overview of Cloud Native Security/2 -Cloud Native Security Phases(Video).mp4 47.2 MB
  • ~Get Your Files Here !/4 - Kubernetes Security Fundamentals/4 -Authentication in Kubernetes Clusters (Video).mp4 44.7 MB
  • ~Get Your Files Here !/4 - Kubernetes Security Fundamentals/3 -Audit Logging and Monitoring (Video).mp4 42.5 MB
  • ~Get Your Files Here !/2 - Overview of Cloud Native Security/3 -Cloud Provider (Video).mp4 42.3 MB
  • ~Get Your Files Here !/3 - Kubernetes Cluster Component Security/1 -API Server Security (Video).mp4 41.9 MB
  • ~Get Your Files Here !/6 - Section 5 Platform Security in Kubernetes/1 -Supply Chain Security in Kubernetes (Video).mp4 41.6 MB
  • ~Get Your Files Here !/2 - Overview of Cloud Native Security/1 -The 4Cs of Cloud-Native Security (Video).mp4 41.4 MB
  • ~Get Your Files Here !/5 - Kubernetes Threat Model/3 -Attacker on the Network (Video).mp4 41.3 MB
  • ~Get Your Files Here !/3 - Kubernetes Cluster Component Security/10 -Storage (Video).mp4 41.0 MB
  • ~Get Your Files Here !/2 - Overview of Cloud Native Security/6 -Isolation Techniques (Video).mp4 40.5 MB
  • ~Get Your Files Here !/4 - Kubernetes Security Fundamentals/5 -Authorization (Video).mp4 39.4 MB
  • ~Get Your Files Here !/3 - Kubernetes Cluster Component Security/6 -Pod (Video).mp4 39.1 MB
  • ~Get Your Files Here !/2 - Overview of Cloud Native Security/7 -Workload and Application Code Security (Video).mp4 39.0 MB
  • ~Get Your Files Here !/3 - Kubernetes Cluster Component Security/5 -KubeProxy (Video).mp4 37.3 MB
  • ~Get Your Files Here !/6 - Section 5 Platform Security in Kubernetes/4 -Securing the Image Repository (Video).mp4 36.6 MB
  • ~Get Your Files Here !/4 - Kubernetes Security Fundamentals/1 -Pod Security Standards (Video).mp4 34.8 MB
  • ~Get Your Files Here !/7 - Section 6 Compliance and Security Frameworks/4 -Automation and Security Tooling for Kubernetes Compliance (Video).mp4 33.9 MB
  • ~Get Your Files Here !/1 - Course Introduction/1 -Course Overview and Objectives (Video Material).mp4 33.9 MB
  • ~Get Your Files Here !/4 - Kubernetes Security Fundamentals/8 -Secrets (Video).mp4 33.7 MB
  • ~Get Your Files Here !/4 - Kubernetes Security Fundamentals/6 -Isolation and Segmentation (Video).mp4 33.4 MB
  • ~Get Your Files Here !/5 - Kubernetes Threat Model/1 -Accessing and Protecting Sensitive Data (Video).mp4 33.3 MB
  • ~Get Your Files Here !/3 - Kubernetes Cluster Component Security/2 -Controller Manager (Video).mp4 31.8 MB
  • ~Get Your Files Here !/7 - Section 6 Compliance and Security Frameworks/1 -Compliance Frameworks (Video).mp4 31.5 MB
  • ~Get Your Files Here !/6 - Section 5 Platform Security in Kubernetes/6 -Implementing Service Mesh Security(Video).mp4 31.1 MB
  • ~Get Your Files Here !/7 - Section 6 Compliance and Security Frameworks/2 -Kubernetes Threat Modeling Frameworks - STRIDE (Video).mp4 30.9 MB
  • ~Get Your Files Here !/7 - Section 6 Compliance and Security Frameworks/3 -Supply Chain Compliance in Kubernetes (Video).mp4 30.6 MB
  • ~Get Your Files Here !/5 - Kubernetes Threat Model/6 -Privilege Escalation (Video).mp4 28.3 MB
  • ~Get Your Files Here !/6 - Section 5 Platform Security in Kubernetes/5 -Observability and Monitoring in Kubernetes (Video).mp4 27.9 MB
  • ~Get Your Files Here !/4 - Kubernetes Security Fundamentals/2 -Pod Security Admissions (Video).mp4 27.5 MB
  • ~Get Your Files Here !/5 - Kubernetes Threat Model/4 -Persistence (Video).mp4 27.1 MB
  • ~Get Your Files Here !/6 - Section 5 Platform Security in Kubernetes/3 -Understanding PKI and Connectivity in Kubernetes (Video).mp4 26.8 MB
  • ~Get Your Files Here !/3 - Kubernetes Cluster Component Security/9 -Etcd (Video).mp4 25.9 MB
  • ~Get Your Files Here !/6 - Section 5 Platform Security in Kubernetes/2 -Admission Control and Dynamic Security Policies (Video).mp4 25.1 MB
  • ~Get Your Files Here !/4 - Kubernetes Security Fundamentals/7 -Network Policy (Video).mp4 21.5 MB
  • ~Get Your Files Here !/3 - Kubernetes Cluster Component Security/7 -Container (Video).mp4 20.7 MB
  • ~Get Your Files Here !/5 - Kubernetes Threat Model/7 -Malicious Code Execution in Containers (Video).mp4 19.3 MB
  • ~Get Your Files Here !/5 - Kubernetes Threat Model/5 -Denial of Service DoS Attacks (Video).mp4 18.9 MB
  • ~Get Your Files Here !/5 - Kubernetes Threat Model/2 -Kubernetes Trust Boundaries and Data Flow (Video).mp4 17.4 MB
  • ~Get Your Files Here !/8 - Section 7 Conclusion/1 -Thank you.mp4 3.7 MB
  • ~Get Your Files Here !/3 - Kubernetes Cluster Component Security/4 - Kubelet (Note) v.0.0.2.html 5.6 kB
  • ~Get Your Files Here !/2 - Overview of Cloud Native Security/6 - Isolation Techniques (Note).html 4.7 kB
  • ~Get Your Files Here !/3 - Kubernetes Cluster Component Security/10 - Storage (Note).html 4.3 kB
  • ~Get Your Files Here !/2 - Overview of Cloud Native Security/7 - Workload and Application Code Security (Note) v.0.0.2.html 4.1 kB
  • ~Get Your Files Here !/7 - Section 6 Compliance and Security Frameworks/3 - Supply Chain Compliance in Kubernetes (Note).html 4.0 kB
  • ~Get Your Files Here !/3 - Kubernetes Cluster Component Security/5 - KubeProxy (Note) v.0.0.2.html 3.9 kB
  • ~Get Your Files Here !/3 - Kubernetes Cluster Component Security/6 - Pod (Reading).html 3.7 kB
  • ~Get Your Files Here !/5 - Kubernetes Threat Model/3 - Attacker on the Network (Note).html 3.6 kB
  • ~Get Your Files Here !/2 - Overview of Cloud Native Security/3 - Cloud Provider (Note) v0.0.2.html 3.5 kB
  • ~Get Your Files Here !/6 - Section 5 Platform Security in Kubernetes/5 - Observability and Monitoring in Kubernetes (Note).html 3.5 kB
  • ~Get Your Files Here !/3 - Kubernetes Cluster Component Security/3 - Scheduler (Note) v.0.0.2.html 3.4 kB
  • ~Get Your Files Here !/1 - Course Introduction/2 - Quick Read Before Taking This Lecture (Note).html 3.3 kB
  • ~Get Your Files Here !/2 - Overview of Cloud Native Security/4 - Artifact Repository And Image Security (Note) v.0.0.2.html 3.3 kB
  • ~Get Your Files Here !/3 - Kubernetes Cluster Component Security/1 - API Server Security (Note).html 3.3 kB
  • ~Get Your Files Here !/4 - Kubernetes Security Fundamentals/4 - Authentication in Kubernetes Clusters (Note).html 3.3 kB
  • ~Get Your Files Here !/6 - Section 5 Platform Security in Kubernetes/1 - Supply Chain Security in Kubernetes (Note).html 3.3 kB
  • ~Get Your Files Here !/4 - Kubernetes Security Fundamentals/3 - Audit Logging and Monitoring (Note).html 3.2 kB
  • ~Get Your Files Here !/5 - Kubernetes Threat Model/4 - Persistence (Note).html 3.2 kB
  • ~Get Your Files Here !/3 - Kubernetes Cluster Component Security/9 - Etcd (Note) v.0.0.2.html 3.0 kB
  • ~Get Your Files Here !/7 - Section 6 Compliance and Security Frameworks/2 - Kubernetes Threat Modeling Frameworks - STRIDE (Note).html 3.0 kB
  • ~Get Your Files Here !/4 - Kubernetes Security Fundamentals/8 - Secrets (Note).html 3.0 kB
  • ~Get Your Files Here !/2 - Overview of Cloud Native Security/5 - Controls And Frameworks (Note).html 3.0 kB
  • ~Get Your Files Here !/7 - Section 6 Compliance and Security Frameworks/4 - Automation and Security Tooling for Kubernetes Compliance (Note).html 2.9 kB
  • ~Get Your Files Here !/4 - Kubernetes Security Fundamentals/6 - Isolation and Segmentation (Note).html 2.9 kB
  • ~Get Your Files Here !/5 - Kubernetes Threat Model/2 - Kubernetes Trust Boundaries and Data Flow (Note).html 2.9 kB
  • ~Get Your Files Here !/3 - Kubernetes Cluster Component Security/8 - Client Security (Note).html 2.8 kB
  • ~Get Your Files Here !/7 - Section 6 Compliance and Security Frameworks/1 - Compliance Frameworks (Note).html 2.8 kB
  • ~Get Your Files Here !/2 - Overview of Cloud Native Security/2 - Cloud Native Security Phases(Note) v0.0.2.html 2.8 kB
  • ~Get Your Files Here !/5 - Kubernetes Threat Model/1 - Accessing and Protecting Sensitive Data (Note).html 2.8 kB
  • ~Get Your Files Here !/5 - Kubernetes Threat Model/6 - Privilege Escalation (Note).html 2.7 kB
  • ~Get Your Files Here !/4 - Kubernetes Security Fundamentals/5 - Authorization (Note).html 2.6 kB
  • ~Get Your Files Here !/6 - Section 5 Platform Security in Kubernetes/6 - Implementing Service Mesh Security(Note).html 2.6 kB
  • ~Get Your Files Here !/6 - Section 5 Platform Security in Kubernetes/3 - Understanding PKI and Connectivity in Kubernetes (Note).html 2.5 kB
  • ~Get Your Files Here !/6 - Section 5 Platform Security in Kubernetes/4 - Securing the Image Repository (Note).html 2.5 kB
  • ~Get Your Files Here !/4 - Kubernetes Security Fundamentals/2 - Pod Security Admissions (Note).html 2.5 kB
  • ~Get Your Files Here !/6 - Section 5 Platform Security in Kubernetes/2 - Admission Control and Dynamic Security Policies (Note).html 2.4 kB
  • ~Get Your Files Here !/4 - Kubernetes Security Fundamentals/7 - Network Policy (Note).html 2.4 kB
  • ~Get Your Files Here !/5 - Kubernetes Threat Model/5 - Denial of Service DoS Attacks (Note).html 2.2 kB
  • ~Get Your Files Here !/4 - Kubernetes Security Fundamentals/1 - Pod Security Standards (Note).html 2.1 kB
  • ~Get Your Files Here !/3 - Kubernetes Cluster Component Security/2 - Controller Manager (Note) v.0.0.2.html 2.0 kB
  • ~Get Your Files Here !/5 - Kubernetes Threat Model/7 - Malicious Code Execution in Containers (Note).html 1.8 kB
  • ~Get Your Files Here !/3 - Kubernetes Cluster Component Security/7 - Container (Note).html 1.7 kB
  • ~Get Your Files Here !/2 - Overview of Cloud Native Security/1 - The 4Cs of Cloud-Native Security (Note).html 1.6 kB
  • ~Get Your Files Here !/1 - Course Introduction/1 - Disclaimer for the Lecture.html 1.6 kB
  • ~Get Your Files Here !/1 - Course Introduction/1 - Course Overview and Objectives (Reading Material).html 1.3 kB
  • ~Get Your Files Here !/1 - Course Introduction/2 - Version (Note).html 761 Bytes
  • Get Bonus Downloads Here.url 180 Bytes
  • ~Get Your Files Here !/Bonus Resources.txt 70 Bytes

温馨提示

本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!