[FreeCourseSite com] Udemy - Google Certified Associate Cloud Engineer Certification

Photo unavailable
Category:
Date:
09/03/19 at 3:21pm GMT+1
Submitter:
Seeders:
6
Leechers:
0
File size:
5.4 GB in 99 files

Torrent Status:
  This torrent has NOT been verified. 

Infohash:
fa0a58a26e7ce7081ad61cdf55d8f573d3d4c97a


File list

  • [FreeCourseSite com] Udemy - Google Certified Associate Cloud Engineer Certification
  • icon 1. Course Info/1. Course Introduction (with guest Ryan Kroonenburg).mp4 70 MB
    icon 1. Course Info/1. Course Introduction (with guest Ryan Kroonenburg).vtt 5.1 KB
    icon 1. Course Info/2. Making Comparisons (with guest Ryan Kroonenburg).mp4 77 MB
    icon 1. Course Info/2. Making Comparisons (with guest Ryan Kroonenburg).vtt 5.5 KB
    icon 1. Course Info/3. Course Outline & Student Background.mp4 53.7 MB
    icon 1. Course Info/3. Course Outline & Student Background.vtt 15.3 KB
    icon 1. Course Info/3.1 Connect with Mattias on LinkedIn.html 107 B
    icon 10. Scaling/1. Managed Instance Groups (Lab).mp4 122.8 MB
    icon 10. Scaling/1. Managed Instance Groups (Lab).vtt 21.8 KB
    icon 10. Scaling/1.1 Instance Groups.html 115 B
    icon 10. Scaling/1.2 Instance Templates.html 118 B
    icon 10. Scaling/1.3 Lab Startup Script.html 169 B
    icon 10. Scaling/1.4 Autoscaling.html 110 B
    icon 10. Scaling/2. Milestone Robust Mental Model.mp4 16.7 MB
    icon 10. Scaling/2. Milestone Robust Mental Model.vtt 3.6 KB
    icon 10. Scaling/2.1 Resource Elasticity.html 119 B
    icon 11. Security/1. What is Security (Data Flow).mp4 63 MB
    icon 11. Security/1. What is Security (Data Flow).vtt 16.7 KB
    icon 11. Security/1.1 Information Security - Wikipedia.html 111 B
    icon 11. Security/1.1 Public Bucket Breach.html 113 B
    icon 11. Security/1.2 Information Security - Wikipedia.html 111 B
    icon 11. Security/1.2 Public Bucket Breach.html 113 B
    icon 11. Security/1.3 OWASP Top 10 (2017).html 129 B
    icon 11. Security/1.3 Security by Design Principles - OWASP.html 122 B
    icon 11. Security/1.4 OWASP Top 10 (2017).html 129 B
    icon 11. Security/1.4 Security by Design Principles - OWASP.html 122 B
    icon 11. Security/2. IAM Breakdown Resource Hierarchy (To which thing).mp4 21.2 MB
    icon 11. Security/2. IAM Breakdown Resource Hierarchy (To which thing).vtt 4.2 KB
    icon 11. Security/2.1 IAM Overview Docs (incl. Resource Hierarchy).html 103 B
    icon 11. Security/2.2 IAM Resource Hierarchy Docs.html 128 B
    icon 11. Security/3. IAM Breakdown Permissions and Roles (Can do what).mp4 26.3 MB
    icon 11. Security/3. IAM Breakdown Permissions and Roles (Can do what).vtt 5.4 KB
    icon 11. Security/3.1 IAM Overview Docs (incl. Permissions & Roles).html 103 B
    icon 11. Security/3.1 Understanding Custom Roles.html 121 B
    icon 11. Security/3.2 Understanding Roles.html 114 B
    icon 11. Security/3.3 IAM Overview Docs (incl. Permissions & Roles).html 103 B
    icon 11. Security/3.3 Predefined Roles List.html 131 B
    icon 11. Security/3.4 Predefined Roles List.html 131 B
    icon 11. Security/3.4 Understanding Custom Roles.html 121 B
    icon 11. Security/4. IAM Breakdown Members and Groups (Who).mp4 23.9 MB
    icon 11. Security/4. IAM Breakdown Members and Groups (Who).vtt 5.5 KB
    icon 11. Security/4.1 IAM Overview Docs (incl. Members & Groups).html 103 B
    icon 11. Security/5. IAM Breakdown Policies (Bindings).mp4 48.1 MB
    icon 11. Security/5. IAM Breakdown Policies (Bindings).vtt 9.3 KB
    icon 11. Security/5.1 Docs for gcloud's add-iam-policy-binding (many different resources!).html 146 B
    icon 11. Security/5.1 IAM Overview Docs (incl. Policies).html 103 B
    icon 11. Security/5.2 Granting, Changing and Revoking Access to Resources.html 128 B
    icon 11. Security/5.2 IAM Overview Docs (incl. Policies).html 103 B
    icon 11. Security/5.3 Docs for gcloud's add-iam-policy-binding (many different resources!).html 146 B
    icon 11. Security/5.3 Granting, Changing and Revoking Access to Resources.html 128 B
    icon 11. Security/6. IAM Breakdown Wrap-Up.mp4 16.7 MB
    icon 11. Security/6. IAM Breakdown Wrap-Up.vtt 2.7 KB
    icon 11. Security/6.1 IAM Overview Documentation.html 103 B
    icon 11. Security/6.1 Using IAM Securely (Best Practices).html 113 B
    icon 11. Security/6.2 IAM FAQ.html 98 B
    icon 11. Security/6.2 Using IAM Securely (Best Practices).html 113 B
    icon 11. Security/6.3 IAM FAQ.html 98 B
    icon 11. Security/6.3 IAM Overview Documentation.html 103 B
    icon 11. Security/7. Billing Access Control.mp4 54.1 MB
    icon 11. Security/7. Billing Access Control.vtt 12.3 KB
    icon 11. Security/7.1 Invoiced Billing.html 122 B
    icon 11. Security/7.1 Overview of Billing Access Control.html 120 B
    icon 11. Security/7.2 Invoiced Billing.html 122 B
    icon 11. Security/7.2 Overview of Billing Access Control.html 120 B
    icon 11. Security/8. Milestone Secure All The Things!.mp4 16.9 MB
    icon 11. Security/8. Milestone Secure All The Things!.vtt 3.1 KB
    icon 12. Networking/1. Routing Overview.mp4 25.8 MB
    icon 12. Networking/1. Routing Overview.vtt 4.6 KB
    icon 12. Networking/1.1 OSI Model of Networking - Webopedia.html 111 B
    icon 12. Networking/1.2 Routing - Wikipedia.html 98 B
    icon 12. Networking/10. Custom-Mode VPCs Challenge Lab Solution - Main Setup.mp4 43.7 MB
    icon 12. Networking/10. Custom-Mode VPCs Challenge Lab Solution - Main Setup.vtt 9.1 KB
    icon 12. Networking/11. Custom-Mode VPCs Challenge Lab Solution - Firewall Rules.mp4 131.2 MB
    icon 12. Networking/11. Custom-Mode VPCs Challenge Lab Solution - Firewall Rules.vtt 22.3 KB
    icon 12. Networking/12. Networking Exam Tips.mp4 16.7 MB
    icon 12. Networking/12. Networking Exam Tips.vtt 3.9 KB
    icon 12. Networking/12.1 Shared VPCs.html 105 B
    icon 12. Networking/2. Routing To Google's Network (Premium Routing Tier).mp4 28.9 MB
    icon 12. Networking/2. Routing To Google's Network (Premium Routing Tier).vtt 4 KB
    icon 12. Networking/2.1 Hot-Potato and Cold-Potato Routing.html 125 B
    icon 12. Networking/2.2 Premium Routing Tier Blog Post.html 165 B
    icon 12. Networking/3. Routing To the Right Resource (Load Balancing).mp4 53.2 MB
    icon 12. Networking/3. Routing To the Right Resource (Load Balancing).vtt 11.9 KB
    icon 12. Networking/3.1 Load Balancing in GCP.html 129 B
    icon 12. Networking/4. Routing Among Resources (VPC).mp4 35.7 MB
    icon 12. Networking/4. Routing Among Resources (VPC).vtt 6.5 KB
    icon 12. Networking/4.1 Classless Inter-Domain Routing (CIDR) Blocks - Wikipedia.html 121 B
    icon 12. Networking/4.1 RFC1918 Private Networks - Wikipedia.html 106 B
    icon 12. Networking/4.2 Classless Inter-Domain Routing (CIDR) Blocks - Wikipedia.html 121 B
    icon 12. Networking/4.2 RFC1918 Private Networks - Wikipedia.html 106 B
    icon 12. Networking/5. Creating Auto-Mode VPCs (Lab).mp4 32.9 MB
    icon 12. Networking/5. Creating Auto-Mode VPCs (Lab).vtt 32.9 MB
    icon 12. Networking/5.1 VPC Subnet Creation Mode.html 112 B
    icon 12. Networking/6. Custom-Mode VPCs (Lab) - Part 1 Creating the VPC.mp4 18.7 MB
    icon 12. Networking/6. Custom-Mode VPCs (Lab) - Part 1 Creating the VPC.vtt 3.6 KB
    icon 12. Networking/6.1 VPC Overview Docs (Comprehensive).html 98 B
    icon 12. Networking/7. Custom-Mode VPCs (Lab) - Part 2 Creating the Custom IAM Role & Service Account.mp4 30.6 MB
    icon 12. Networking/7. Custom-Mode VPCs (Lab) - Part 2 Creating the Custom IAM Role & Service Account.vtt 5.3 KB
    icon 12. Networking/7.1 Creating and Managing Custom Roles.html 116 B

Similar Torrents