| Parent directory/ | - | - |
| 99. Backups and Availability.mp4 | 43.9 MiB | 2025-Sep-26 16:47 |
| 98. Managing It All.mp4 | 32.8 MiB | 2025-Sep-26 16:47 |
| 97. Stand Alone Hosts in the Cloud.mp4 | 21.9 MiB | 2025-Sep-26 16:47 |
| 96. Operating System Security.mp4 | 22.6 MiB | 2025-Sep-26 16:47 |
| 95. Securing the Network.mp4 | 68.6 MiB | 2025-Sep-26 16:48 |
| 94. Controlling Access.mp4 | 29.6 MiB | 2025-Sep-26 16:47 |
| 93. Virtualization Toolset.mp4 | 23.4 MiB | 2025-Sep-26 16:47 |
| 92. Security Configurations.mp4 | 25.6 MiB | 2025-Sep-26 16:47 |
| 91. Hardware Specific Security Configurations.mp4 | 44.6 MiB | 2025-Sep-26 16:47 |
| 90. CASB and Secrets Management.mp4 | 35.0 MiB | 2025-Sep-26 16:48 |
| 9. Cryptography and Key Management.mp4 | 56.9 MiB | 2025-Sep-26 16:47 |
| 89. Federated Identity, MFA, OTP and SSO.mp4 | 44.3 MiB | 2025-Sep-26 16:47 |
| 88. Application Virtualization and Orchestratio..> | 54.9 MiB | 2025-Sep-26 16:47 |
| 87. Cryptography and Applications.mp4 | 56.6 MiB | 2025-Sep-26 16:47 |
| 86. Supplemental Security Components.mp4 | 82.0 MiB | 2025-Sep-26 16:47 |
| 85. Abuse Case Testing.mp4 | 22.2 MiB | 2025-Sep-26 16:47 |
| 84. Quality Assurance.mp4 | 31.5 MiB | 2025-Sep-26 16:47 |
| 83. Security Testing Methodologies.mp4 | 40.6 MiB | 2025-Sep-26 16:47 |
| 82. Functional and Non-Functional Testing.mp4 | 19.7 MiB | 2025-Sep-26 16:48 |
| 81. Cloud Development Basics.mp4 | 36.3 MiB | 2025-Sep-26 16:47 |
| 80. Common Cloud Application Vulnerabilities.mp4 | 123.8 MiB | 2025-Sep-26 16:47 |
| 8. Impact From Emerging Technologies.mp4 | 61.8 MiB | 2025-Sep-26 16:47 |
| 79. Intro.mp4 | 17.5 MiB | 2025-Sep-26 16:47 |
| 78. Secure Coding Techniques.mp4 | 27.0 MiB | 2025-Sep-26 16:48 |
| 77. Threat Modeling.mp4 | 47.9 MiB | 2025-Sep-26 16:47 |
| 76. Cloud Specific Risks.mp4 | 42.9 MiB | 2025-Sep-26 16:48 |
| 75. Development Methodologies.mp4 | 30.0 MiB | 2025-Sep-26 16:48 |
| 74. Phases of the SDLC.mp4 | 30.4 MiB | 2025-Sep-26 16:47 |
| 73. Business Requirements.mp4 | 25.1 MiB | 2025-Sep-26 16:47 |
| 72. BCDR Testing.mp4 | 33.3 MiB | 2025-Sep-26 16:47 |
| 71. BCDR Strategy and Planning.mp4 | 51.5 MiB | 2025-Sep-26 16:47 |
| 70. Business Requirements for BCDR.mp4 | 43.2 MiB | 2025-Sep-26 16:47 |
| 7. Shared Responsibility.mp4 | 31.8 MiB | 2025-Sep-26 16:47 |
| 69. Risks Related to the Cloud and BCDR.mp4 | 53.3 MiB | 2025-Sep-26 16:47 |
| 68. Audit Mechanisms.mp4 | 28.2 MiB | 2025-Sep-26 16:47 |
| 67. Identification, Authentication and Authoriz..> | 35.1 MiB | 2025-Sep-26 16:47 |
| 66. Protecting Virtualized Systems.mp4 | 52.9 MiB | 2025-Sep-26 16:47 |
| 65. System and Communication Protection.mp4 | 46.6 MiB | 2025-Sep-26 16:48 |
| 64. Physical and Environmental Protection.mp4 | 19.7 MiB | 2025-Sep-26 16:48 |
| 63. Countermeasure Strategies.mp4 | 34.6 MiB | 2025-Sep-26 16:47 |
| 62. Virtualization Risks.mp4 | 35.6 MiB | 2025-Sep-26 16:47 |
| 61. Cloud Specific Risks.mp4 | 23.5 MiB | 2025-Sep-26 16:47 |
| 60. Cloud Infrastructure Risk and Security.mp4 | 47.8 MiB | 2025-Sep-26 16:47 |
| 6. Software as a Service (SaaS).mp4 | 29.4 MiB | 2025-Sep-26 16:47 |
| 59. Risk Assessments.mp4 | 46.3 MiB | 2025-Sep-26 16:47 |
| 58. Multi-Vendor Pathway Connectivity.mp4 | 21.3 MiB | 2025-Sep-26 16:47 |
| 57. The Importance of Airflow.mp4 | 48.8 MiB | 2025-Sep-26 16:48 |
| 56. Temperature and Humidity.mp4 | 32.8 MiB | 2025-Sep-26 16:47 |
| 55. Physical Design.mp4 | 32.6 MiB | 2025-Sep-26 16:47 |
| 54. Datacenter Security.mp4 | 48.0 MiB | 2025-Sep-26 16:47 |
| 53. Datacenter Services.mp4 | 34.0 MiB | 2025-Sep-26 16:47 |
| 52. Intro.mp4 | 15.4 MiB | 2025-Sep-26 16:47 |
| 51. Management Plane.mp4 | 32.2 MiB | 2025-Sep-26 16:47 |
| 50. Virtualization.mp4 | 28.5 MiB | 2025-Sep-26 16:47 |
| 5. Platform as a Service (PaaS).mp4 | 20.4 MiB | 2025-Sep-26 16:47 |
| 49. Compute and Storage.mp4 | 50.9 MiB | 2025-Sep-26 16:47 |
| 48. Networking and Communications.mp4 | 63.1 MiB | 2025-Sep-26 16:47 |
| 47. Physical Environment.mp4 | 46.7 MiB | 2025-Sep-26 16:47 |
| 46. Intro.mp4 | 13.4 MiB | 2025-Sep-26 16:47 |
| 45. Chain of Custody and Non-Repudiation.mp4 | 26.1 MiB | 2025-Sep-26 16:48 |
| 44. Log Storage.mp4 | 26.8 MiB | 2025-Sep-26 16:47 |
| 43. Logs and Auditability.mp4 | 21.9 MiB | 2025-Sep-26 16:48 |
| 42. Data Archival.mp4 | 21.6 MiB | 2025-Sep-26 16:47 |
| 41. Data Retention and Deletion.mp4 | 20.1 MiB | 2025-Sep-26 16:47 |
| 40. Information Rights Management (IRM).mp4 | 43.3 MiB | 2025-Sep-26 16:47 |
| 4. Infrastructure as a Service (IaaS).mp4 | 30.1 MiB | 2025-Sep-26 16:47 |
| 39. Data Classification.mp4 | 34.0 MiB | 2025-Sep-26 16:47 |
| 38. Data Discovery Techniques and Issues.mp4 | 28.8 MiB | 2025-Sep-26 16:47 |
| 37. Data Discovery -.mp4 | 24.8 MiB | 2025-Sep-26 16:47 |
| 36. Data Loss Prevention (DLP).mp4 | 36.9 MiB | 2025-Sep-26 16:47 |
| 35. Data Obfuscation and Anonymization.mp4 | 47.3 MiB | 2025-Sep-26 16:47 |
| 34. Data Hashing - (ISC)² CCSP.mp4 | 34.1 MiB | 2025-Sep-26 16:47 |
| 33. Key Management.mp4 | 45.0 MiB | 2025-Sep-26 16:47 |
| 32. IaaS Data Encryption Options.mp4 | 32.8 MiB | 2025-Sep-26 16:47 |
| 31. The Encryption Process and the Cloud.mp4 | 36.0 MiB | 2025-Sep-26 16:48 |
| 30. Threats to Storage.mp4 | 37.7 MiB | 2025-Sep-26 16:47 |
| 3. Cloud Deployment Models.mp4 | 53.4 MiB | 2025-Sep-26 16:47 |
| 29. Cloud Storage Types.mp4 | 47.4 MiB | 2025-Sep-26 16:48 |
| 28. Data Dispersion.mp4 | 31.3 MiB | 2025-Sep-26 16:48 |
| 27. Data Functions.mp4 | 53.5 MiB | 2025-Sep-26 16:48 |
| 26. Cloud Data Lifecycle.mp4 | 47.0 MiB | 2025-Sep-26 16:47 |
| 25. Additional Standards.mp4 | 74.1 MiB | 2025-Sep-26 16:47 |
| 24. CSA STAR.mp4 | 56.6 MiB | 2025-Sep-26 16:47 |
| 23. ENISA.mp4 | 71.3 MiB | 2025-Sep-26 16:47 |
| 22. PCI-DSS.mp4 | 25.8 MiB | 2025-Sep-26 16:47 |
| 21. ISOIEC 27017.mp4 | 44.5 MiB | 2025-Sep-26 16:47 |
| 20. Evaluating Cloud Service Providers.mp4 | 24.2 MiB | 2025-Sep-26 16:48 |
| 2. Cloud Computing Characteristics.mp4 | 53.3 MiB | 2025-Sep-26 16:47 |
| 19. Security Considerations for Different Cloud..> | 42.9 MiB | 2025-Sep-26 16:48 |
| 18. Functional Requirements.mp4 | 27.0 MiB | 2025-Sep-26 16:47 |
| 17. Cost Benefit Analysis.mp4 | 38.0 MiB | 2025-Sep-26 16:47 |
| 16. Cloud Based DR and BC.mp4 | 57.8 MiB | 2025-Sep-26 16:47 |
| 15. Data Governance.mp4 | 43.3 MiB | 2025-Sep-26 16:47 |
| 14. Cloud Secure Data Lifecycle.mp4 | 31.3 MiB | 2025-Sep-26 16:47 |
| 13. Common Threats in the Cloud.mp4 | 44.8 MiB | 2025-Sep-26 16:47 |
| 126. Supply Chain Management.mp4 | 32.6 MiB | 2025-Sep-26 16:47 |
| 125. Contract Management.mp4 | 32.1 MiB | 2025-Sep-26 16:47 |
| 124. Business Requirements and Vendor Managemen..> | 54.9 MiB | 2025-Sep-26 16:47 |
| 123. Risk Frameworks, Metrics and Environments.mp4 | 32.3 MiB | 2025-Sep-26 16:47 |
| 122. Regulatory Transparency and Risk Treatment..> | 37.2 MiB | 2025-Sep-26 16:47 |
| 121. Assessing Risk Management and Data Roles.mp4 | 31.4 MiB | 2025-Sep-26 16:47 |
| 120. Impact of a Distributed IT Model.mp4 | 23.9 MiB | 2025-Sep-26 16:48 |
| 12. Network and Virtualization Security.mp4 | 68.5 MiB | 2025-Sep-26 16:47 |
| 119. Specialized Compliance Requirements.mp4 | 23.8 MiB | 2025-Sep-26 16:47 |
| 118. identification and Involvement of Relevant..> | 18.4 MiB | 2025-Sep-26 16:47 |
| 117. Policies.mp4 | 18.9 MiB | 2025-Sep-26 16:47 |
| 116. ISMS and ISCS.mp4 | 20.5 MiB | 2025-Sep-26 16:47 |
| 115. Gap Analysis and Audit Planning.mp4 | 24.6 MiB | 2025-Sep-26 16:47 |
| 114. Audit Reports.mp4 | 13.8 MiB | 2025-Sep-26 16:47 |
| 113. Audit Controls and Assurance.mp4 | 32.2 MiB | 2025-Sep-26 16:47 |
| 112. Intro Auditing in the Cloud.mp4 | 6.7 MiB | 2025-Sep-26 16:47 |
| 111. Skill Review.mp4 | 71.2 MiB | 2025-Sep-26 16:47 |
| 110. Privacy Standards and PIAs.mp4 | 45.5 MiB | 2025-Sep-26 16:47 |
| 11. Data and Media Sanitization.mp4 | 32.5 MiB | 2025-Sep-26 16:47 |
| 109. Country-Specific Legislation of Data Priva..> | 46.2 MiB | 2025-Sep-26 16:47 |
| 108. Contractual vs Regulated Private Data.mp4 | 17.2 MiB | 2025-Sep-26 16:47 |
| 107. E-Discovery and Forensic Requirements.mp4 | 35.4 MiB | 2025-Sep-26 16:48 |
| 106. Legal Frameworks and Guidelines.mp4 | 17.4 MiB | 2025-Sep-26 16:47 |
| 105. Legal Requirements and Unique Risks in the..> | 20.6 MiB | 2025-Sep-26 16:47 |
| 104. Intro to Legal, Risk and Privacy in the Cl..> | 12.2 MiB | 2025-Sep-26 16:47 |
| 103. Managing Security Operations.mp4 | 41.1 MiB | 2025-Sep-26 16:47 |
| 102. Managing Communications.mp4 | 25.5 MiB | 2025-Sep-26 16:47 |
| 101. Supporting Digital Forensics.mp4 | 53.7 MiB | 2025-Sep-26 16:47 |
| 100. Operational Controls and Standards.mp4 | 34.0 MiB | 2025-Sep-26 16:47 |
| 10. Access Control with IAM.mp4 | 39.2 MiB | 2025-Sep-26 16:47 |
| 1. Cloud Computing Roles.mp4 | 20.6 MiB | 2025-Sep-26 16:47 |