Autoplay
Autocomplete
Previous Lesson
Complete and Continue
IT Security Gumbo-Cloud Based Security with Linux
1.UNDERSTANDING LINUX
1.History of Linux (3:44)
2.Interacting with Linux (4:24)
3.Linux Architecture (5:08)
4.Linux Command Shell Concepts (13:09)
5.Root and Sudo (3:43)
6.Shutting down the System (2:37)
7.System Initialization (5:26)
2.CLOUD SECURITY OVERVIEW
1.Cloud Essential Characteristics (7:31)
2.Cloud Service Models (8:40)
3.Cloud Deployment Models (9:36)
4.Cloud Benefits (6:32)
5.Cloud Risk-Concerns (6:28)
6.Cloud Risk-Concerns Part 2 (6:26)
7.Cloud Risk-Concerns Part 3 (6:26)
8.Cloud Assurance (7:29)
9.CSA-The Notorious Nine (6:59)
10.CSA-The Notorious Nine Part 2 (6:06)
11.CSA- The Notorious Nine Part 3 (5:02)
Teach online with
10.CSA-The Notorious Nine Part 2
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock