[ CoursePig.com ] Linkedin - Microsoft Cybersecurity Architect Expert (SC-100) Cert Prep - 4 Design Strategy for Data and Applications
大小
146.44 MB
文件数
24
Info Hash:
6E9AA191B6A4B314C97E27FBA6576E18C67CB17A
收录时间
2026-02-25 00:40:45
更新时间
2026-02-25 00:40:45
文件列表 (24)
Get Bonus Downloads Here.url
179 B
~Get Your Files Here !/01 - Introduction/01 - Prepping for the SC-100 exam.mp4
21.41 MB
~Get Your Files Here !/01 - Introduction/01 - Prepping for the SC-100 exam.srt
2.18 KB
~Get Your Files Here !/01 - Introduction/02 - What you should know.mp4
6.49 MB
~Get Your Files Here !/01 - Introduction/02 - What you should know.srt
3.34 KB
~Get Your Files Here !/01 - Introduction/03 - Lab setup.mp4
3.25 MB
~Get Your Files Here !/01 - Introduction/03 - Lab setup.srt
1.2 KB
~Get Your Files Here !/02 - 1. Specify Security Requirements for Applications/01 - Specify priorities for mitigating threats to applications.mp4
13.57 MB
~Get Your Files Here !/02 - 1. Specify Security Requirements for Applications/01 - Specify priorities for mitigating threats to applications.srt
7.49 KB
~Get Your Files Here !/02 - 1. Specify Security Requirements for Applications/02 - Specify a security standard for onboarding a new application.mp4
17.52 MB
~Get Your Files Here !/02 - 1. Specify Security Requirements for Applications/02 - Specify a security standard for onboarding a new application.srt
9.44 KB
~Get Your Files Here !/02 - 1. Specify Security Requirements for Applications/03 - Specify a security strategy for applications and APIs.mp4
23.77 MB
~Get Your Files Here !/02 - 1. Specify Security Requirements for Applications/03 - Specify a security strategy for applications and APIs.srt
15.22 KB
~Get Your Files Here !/03 - 2. Design a Strategy for Securing Data/01 - Specify priorities for mitigating threats to data.mp4
13.27 MB
~Get Your Files Here !/03 - 2. Design a Strategy for Securing Data/01 - Specify priorities for mitigating threats to data.srt
8.75 KB
~Get Your Files Here !/03 - 2. Design a Strategy for Securing Data/02 - Design a strategy to identify and protect sensitive data.mp4
26.33 MB
~Get Your Files Here !/03 - 2. Design a Strategy for Securing Data/02 - Design a strategy to identify and protect sensitive data.srt
17.71 KB
~Get Your Files Here !/03 - 2. Design a Strategy for Securing Data/03 - Specify an encryption standard for data at rest and in motion.mp4
15.58 MB
~Get Your Files Here !/03 - 2. Design a Strategy for Securing Data/03 - Specify an encryption standard for data at rest and in motion.srt
8.98 KB
~Get Your Files Here !/04 - Conclusion/01 - Next steps.mp4
4.82 MB
~Get Your Files Here !/04 - Conclusion/01 - Next steps.srt
2.56 KB
~Get Your Files Here !/Bonus Resources.txt
386 B
~Get Your Files Here !/Ex_Files_MSFT_Cybersecurity_Arch_Expert_SC_100_Cert_Prep_4/Exercise Files/SC-100 Exam Study Guide Course 4.pdf
46.71 KB
~Get Your Files Here !/Ex_Files_MSFT_Cybersecurity_Arch_Expert_SC_100_Cert_Prep_4/Exercise Files/Sign up for a free trial.pdf
330.45 KB