Google Cloud Platform1.18 млн
Следующее
Опубликовано 19 февраля 2020, 0:00
Welcome to the second episode of Cloud Security Basics, where Carter Morgan goes over the different ways that an entity can gain access to your systems. In this episode, he talks about the common strategies that are used to gain access like: Man-in-the-Middle, DDoS exploits, and phishing. Additionally, he speaks to what tools Google Cloud offers to protect its users from these attacks such as: universal two-factor authentication, encrypted traffic and load balancers, and Cloud identity-aware proxies.
Watch more episodes of Cloud Security Basics → goo.gle/2UAI69x
Subscribe to get all the episodes as they come out → goo.gle/GoogleCloudTech
Product: Cloud Identity-Aware Proxy, Cloud Phishing Protection ; fullname: Carter Morgan;
#CloudSecurityBasics
Watch more episodes of Cloud Security Basics → goo.gle/2UAI69x
Subscribe to get all the episodes as they come out → goo.gle/GoogleCloudTech
Product: Cloud Identity-Aware Proxy, Cloud Phishing Protection ; fullname: Carter Morgan;
#CloudSecurityBasics
Свежие видео
Случайные видео
You: 🎧 / 2024 Spotify Wrapped AI Podcast: pink pilates princess strut pop • Get yours now on Spotify