Pluralsight - Design a Data Protection Strategy with Microsoft Azure by John Savill
File List
- 3. Protecting Data Access/4. Data Scalability.mp4 30.9 MB
- 1. Covering Data Protection Basics/5. Protecting User Data.mp4 24.5 MB
- 3. Protecting Data Access/5. Data Availability.mp4 19.9 MB
- 1. Covering Data Protection Basics/2. Why Data Needs to Be Protected.mp4 19.7 MB
- 2. Utilizing Data Encryption Technologies/4. Azure Database Service Encryption.mp4 18.7 MB
- 2. Utilizing Data Encryption Technologies/2. Azure Key Vault.mp4 15.7 MB
- 2. Utilizing Data Encryption Technologies/5. Encryption in Transit.mp4 14.2 MB
- 2. Utilizing Data Encryption Technologies/3. Azure Storage Service Encryption.mp4 14.2 MB
- 3. Protecting Data Access/3. Limiting Resource Access.mp4 13.7 MB
- 2. Utilizing Data Encryption Technologies/1. Types of Encryption.mp4 12.3 MB
- 1. Covering Data Protection Basics/3. How Data Can Be Protected.mp4 11.7 MB
- 1. Covering Data Protection Basics/6. Enterprise Data Loss Prevention for Cloud Resources.mp4 11.3 MB
- 3. Protecting Data Access/2. Secure Data Access.mp4 10.9 MB
- 3. Protecting Data Access/1. Requirements for Data Access.mp4 7.8 MB
- 1. Covering Data Protection Basics/7. Network Security.mp4 7.4 MB
- 2. Utilizing Data Encryption Technologies/6. Encryption in Use.mp4 5.3 MB
- 1. Covering Data Protection Basics/4. Where Is the Data-.mp4 4.1 MB
- microsoft-azure-data-protection-strategy-design.zip 2.7 MB
- 1. Covering Data Protection Basics/1. Why This Is important.mp4 2.2 MB
- 0. Course Overview/0. Course Overview.mp4 2.1 MB
- 1. Covering Data Protection Basics/0. Module Introduction.mp4 1.0 MB
- 2. Utilizing Data Encryption Technologies/0. Module Introduction.mp4 903.2 KB
- 3. Protecting Data Access/6. Module Summary.mp4 719.3 KB
- 3. Protecting Data Access/0. Module Introduction.mp4 546.4 KB
- 2. Utilizing Data Encryption Technologies/7. Module Summary.mp4 458.1 KB
- 1. Covering Data Protection Basics/8. Module Summary.mp4 437.7 KB
- 1. Covering Data Protection Basics/5. Protecting User Data.srt 14.4 KB
- 3. Protecting Data Access/4. Data Scalability.srt 12.5 KB
- 3. Protecting Data Access/5. Data Availability.srt 10.0 KB
- 1. Covering Data Protection Basics/2. Why Data Needs to Be Protected.srt 9.3 KB
- 1. Covering Data Protection Basics/3. How Data Can Be Protected.srt 9.0 KB
- 3. Protecting Data Access/2. Secure Data Access.srt 8.8 KB
- 2. Utilizing Data Encryption Technologies/2. Azure Key Vault.srt 8.0 KB
- 2. Utilizing Data Encryption Technologies/3. Azure Storage Service Encryption.srt 7.2 KB
- 2. Utilizing Data Encryption Technologies/1. Types of Encryption.srt 6.9 KB
- 1. Covering Data Protection Basics/7. Network Security.srt 6.8 KB
- 1. Covering Data Protection Basics/6. Enterprise Data Loss Prevention for Cloud Resources.srt 6.7 KB
- 2. Utilizing Data Encryption Technologies/5. Encryption in Transit.srt 6.5 KB
- 2. Utilizing Data Encryption Technologies/4. Azure Database Service Encryption.srt 6.3 KB
- 3. Protecting Data Access/3. Limiting Resource Access.srt 6.1 KB
- 3. Protecting Data Access/1. Requirements for Data Access.srt 5.6 KB
- 2. Utilizing Data Encryption Technologies/6. Encryption in Use.srt 3.4 KB
- 1. Covering Data Protection Basics/4. Where Is the Data-.srt 2.8 KB
- 1. Covering Data Protection Basics/1. Why This Is important.srt 1.9 KB
- 0. Course Overview/0. Course Overview.srt 1.3 KB
- content.txt 1.3 KB
- 1. Covering Data Protection Basics/0. Module Introduction.srt 1.0 KB
- 3. Protecting Data Access/6. Module Summary.srt 958 bytes
- 2. Utilizing Data Encryption Technologies/0. Module Introduction.srt 932 bytes
- 3. Protecting Data Access/0. Module Introduction.srt 491 bytes
- 2. Utilizing Data Encryption Technologies/7. Module Summary.srt 489 bytes
- 1. Covering Data Protection Basics/8. Module Summary.srt 407 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via anywarmservice[AT]gmail.com. Remember to include the full url in your complaint.