23 WebHD 720p
вася простовася
23 WebHD 720p
7:15
22 WebHD 720p
вася простовася
22 WebHD 720p
12:13
20 WebHD 720p
вася простовася
20 WebHD 720p
4:04
19 WebHD 720p
вася простовася
19 WebHD 720p
8:24
18 WebHD 720p
вася простовася
18 WebHD 720p
3:04
17 WebHD 720p
вася простовася
17 WebHD 720p
2:57
14 WebHD 720p
вася простовася
14 WebHD 720p
7:33
13 WebHD 720p
вася простовася
13 WebHD 720p
4:16
12 WebHD 720p
вася простовася
12 WebHD 720p
11:07
11 WebHD 720p
вася простовася
11 WebHD 720p
6:00
10 WebHD 720p
вася простовася
10 WebHD 720p
13:20
1 WebHD 720p
вася простовася
1 WebHD 720p
1:59
2 WebHD 720p
вася простовася
2 WebHD 720p
2:49
3 WebHD 720p
вася простовася
3 WebHD 720p
4:00
4 WebHD 720p
вася простовася
4 WebHD 720p
8:07
6 WebHD 720p
вася простовася
6 WebHD 720p
11:58
7 WebHD 720p
вася простовася
7 WebHD 720p
3:37
8 WebHD 720p
вася простовася
8 WebHD 720p
11:24
9 WebHD 720p
вася простовася
9 WebHD 720p
14:31
6  Review
вася простовася
6 Review
2:03
5  Redacting Sensitive Data with Data Loss Prevention API
вася простовася
5 Redacting Sensitive Data with Data Loss Prevention API
0:10
4  Threat Mitigation Strategies for Content
вася простовася
4 Threat Mitigation Strategies for Content
2:44
3  Misuse of Data and Content
вася простовася
3 Misuse of Data and Content
1:57
2  Mitigating the Threat of Ransomware
вася простовася
2 Mitigating the Threat of Ransomware
3:27
1  What is Ransomware
вася простовася
1 What is Ransomware
0:56
0  Overview
вася простовася
0 Overview
1:02
8  Review
вася простовася
8 Review
2:56
7  Configuring Identity Aware Proxy to Protect a Project
вася простовася
7 Configuring Identity Aware Proxy to Protect a Project
0:10
6  Cloud Identity Aware Proxy Cloud IAP
вася простовася
6 Cloud Identity Aware Proxy Cloud IAP
1:59
5  Types of Phishing Attacks
вася простовася
5 Types of Phishing Attacks
2:51
4  Using Cloud Security Scanner to find vulnerabilities in an App Engine application
вася простовася
4 Using Cloud Security Scanner to find vulnerabilities in an App Engine application
0:10
3  Avoiding Unwanted Impact
вася простовася
3 Avoiding Unwanted Impact
1:34
2  How Cloud Security Scanner Works
вася простовася
2 How Cloud Security Scanner Works
2:52
1  Application Vulnerabilities
вася простовася
1 Application Vulnerabilities
3:34
0  Overview
вася простовася
0 Overview
1:01
7  Review
вася простовася
7 Review
1:49
6  Configuring GCLB, CDN, traffic blacklisting with Cloud Armor
вася простовася
6 Configuring GCLB, CDN, traffic blacklisting with Cloud Armor
0:10
5  Infrastructure, Data Protection, Logging and Compliance Partners
вася простовася
5 Infrastructure, Data Protection, Logging and Compliance Partners
1:06
4  Security Partner Products
вася простовася
4 Security Partner Products
1:13
3  Using Cloud Armor
вася простовася
3 Using Cloud Armor
1:27
2  DDoS Mitigation and Prevention on GCP
вася простовася
2 DDoS Mitigation and Prevention on GCP
5:14
1  DDoS Attack Overview
вася простовася
1 DDoS Attack Overview
1:22
0  Overview
вася простовася
0 Overview
0:53
11  Review
вася простовася
11 Review
2:22
10  Big Query Storage Best Practices
вася простовася
10 Big Query Storage Best Practices
1:02
9  Cloud Storage Best Practices
вася простовася
9 Cloud Storage Best Practices
2:06
8  Creating a BigQuery authorized view
вася простовася
8 Creating a BigQuery authorized view
0:10
7  BigQuery IAM Roles and Authorized Views
вася простовася
7 BigQuery IAM Roles and Authorized Views
1:57
6  Using Customer Supplied Encryption Keys with Cloud Storage
вася простовася
6 Using Customer Supplied Encryption Keys with Cloud Storage
0:10
5  Using Customer Managed Encryption Keys with Cloud Storage and Cloud KMS
вася простовася
5 Using Customer Managed Encryption Keys with Cloud Storage and Cloud KMS
0:10
4  Encryption, CSEK, CMEK Review
вася простовася
4 Encryption, CSEK, CMEK Review
1:49
3  Signed URLS and Signed Policy Documents
вася простовася
3 Signed URLS and Signed Policy Documents
4:06
2  Auditing Storage Buckets
вася простовася
2 Auditing Storage Buckets
1:49
1  Cloud Storage Permissions and Roles
вася простовася
1 Cloud Storage Permissions and Roles
2:33
0  Overview
вася простовася
0 Overview
1:33
11  Review
вася простовася
11 Review
2:54
10  Encrypting Disks with Customer Supplied Encryption Keys
вася простовася
10 Encrypting Disks with Customer Supplied Encryption Keys
0:10
9  Customer Supplied and Managed Keys
вася простовася
9 Customer Supplied and Managed Keys
1:50
8  Encryption Overview
вася простовася
8 Encryption Overview
3:26
7  Configuring, using, and auditing VM service accounts and scopes
вася простовася
7 Configuring, using, and auditing VM service accounts and scopes
0:10
6  Compute Engine Security
вася простовася
6 Compute Engine Security
3:43
5  Organization Policy Constraints
вася простовася
5 Organization Policy Constraints
1:53
4  Organization Policy Service
вася простовася
4 Organization Policy Service
1:38
3  Connecting to Virtual Machines
вася простовася
3 Connecting to Virtual Machines
5:55
2  VM and API Scopes
вася простовася
2 VM and API Scopes
2:12
1  Compute Engine Identity and API Access
вася простовася
1 Compute Engine Identity and API Access
1:52
0  Overview
вася простовася
0 Overview
1:10
0  Getting Started with Google Cloud Platform and Qwiklabs
вася простовася
0 Getting Started with Google Cloud Platform and Qwiklabs
3:59
25  Automating Burp
вася простовася
25 Automating Burp
3:54
24  Custom Burp Plugins
вася простовася
24 Custom Burp Plugins
6:29
23  Burp and File Downloads
вася простовася
23 Burp and File Downloads
2:46
22  Burp and File Uploads
вася простовася
22 Burp and File Uploads
1:40
21  Burp Extenders Sampling
вася простовася
21 Burp Extenders Sampling
3:15
20  Burp Extenders Explained
вася простовася
20 Burp Extenders Explained
2:32
19  Using Burp to Determine Clickjacking Vulnerabilities
вася простовася
19 Using Burp to Determine Clickjacking Vulnerabilities
1:58
18  Using Burp to Perform Cross site Request Forgery CSRF Attacks
вася простовася
18 Using Burp to Perform Cross site Request Forgery CSRF Attacks
3:29
17  Using Burp to Perform Parameter Tampering
вася простовася
17 Using Burp to Perform Parameter Tampering
5:00
16  Using Burp to Uncover Cookie Session Management Issues
вася простовася
16 Using Burp to Uncover Cookie Session Management Issues
3:01
15  Using Burp to Perform XSS Injection Attacks
вася простовася
15 Using Burp to Perform XSS Injection Attacks
2:49
14  Using Burp to Perform SQL Injection SQLi Attacks
вася простовася
14 Using Burp to Perform SQL Injection SQLi Attacks
4:58
13  Using Burp to Find Common Vulnerabilities
вася простовася
13 Using Burp to Find Common Vulnerabilities
2:18
12  Scanning Your Target
вася простовася
12 Scanning Your Target
2:00
11  Directory Brute forcing
вася простовася
11 Directory Brute forcing
2:13
10  Privilege Escalation Discovery
вася простовася
10 Privilege Escalation Discovery
3:31
09  Spidering Your Scoped Target
вася простовася
09 Spidering Your Scoped Target
4:58
08  Scoping Your Target
вася простовася
08 Scoping Your Target
1:06
07  Gray Box Testing
вася простовася
07 Gray Box Testing
3:30
06  Setting up Your Options Configurations
вася простовася
06 Setting up Your Options Configurations
2:36
05  Setting up Your Project File
вася простовася
05 Setting up Your Project File
2:31
04  Free vs  Professional Editions
вася простовася
04 Free vs Professional Editions
1:27
03  Rules of Engagement
вася простовася
03 Rules of Engagement
5:00
02  Audience and Purpose
вася простовася
02 Audience and Purpose
0:56
01  Course Overview
вася простовася
01 Course Overview
1:50