Create Tool:
Create Time:1970-01-01 08:00:00
File Size:451.79 MB
File Count:40
File Hash:52c9ed890e4f0502404559383c54ce58e8623121
0. Course Overview/0. Course Overview.mp4 | 4.62 MB |
0. Course Overview/0. Course Overview.srt | 2.74 KB |
1. Examining the AWS Security Checklist/0. Introduction.mp4 | 3.02 MB |
1. Examining the AWS Security Checklist/0. Introduction.srt | 2.81 KB |
1. Examining the AWS Security Checklist/1. Least Privilege.mp4 | 7.93 MB |
1. Examining the AWS Security Checklist/1. Least Privilege.srt | 9.44 KB |
1. Examining the AWS Security Checklist/2. Handle Keys with Care.mp4 | 8.67 MB |
1. Examining the AWS Security Checklist/2. Handle Keys with Care.srt | 6.27 KB |
1. Examining the AWS Security Checklist/3. Encrypt -All the Things-.mp4 | 3.79 MB |
1. Examining the AWS Security Checklist/3. Encrypt -All the Things-.srt | 2.85 KB |
1. Examining the AWS Security Checklist/4. Monitor Continuously.mp4 | 2.91 MB |
1. Examining the AWS Security Checklist/4. Monitor Continuously.srt | 3.04 KB |
1. Examining the AWS Security Checklist/5. Audit Regularly.mp4 | 1.21 MB |
1. Examining the AWS Security Checklist/5. Audit Regularly.srt | 1.45 KB |
2. Securing Operating Systems and Applications/0. Introduction.mp4 | 5.13 MB |
2. Securing Operating Systems and Applications/0. Introduction.srt | 4.53 KB |
2. Securing Operating Systems and Applications/1. Securing Custom AMIs.mp4 | 6.43 MB |
2. Securing Operating Systems and Applications/1. Securing Custom AMIs.srt | 5.09 KB |
2. Securing Operating Systems and Applications/2. Common AMI Maintenance.mp4 | 2.73 MB |
2. Securing Operating Systems and Applications/2. Common AMI Maintenance.srt | 3.19 KB |
2. Securing Operating Systems and Applications/3. Intervention.mp4 | 4.16 MB |
2. Securing Operating Systems and Applications/3. Intervention.srt | 4.41 KB |
2. Securing Operating Systems and Applications/4. Future.mp4 | 1.62 MB |
2. Securing Operating Systems and Applications/4. Future.srt | 1.92 KB |
3. Securing Your Infrastructure/0. Introduction.mp4 | 8.47 MB |
3. Securing Your Infrastructure/0. Introduction.srt | 5.96 KB |
3. Securing Your Infrastructure/1. Network Segmentation and Security Zones.mp4 | 6.53 MB |
3. Securing Your Infrastructure/1. Network Segmentation and Security Zones.srt | 5.62 KB |
3. Securing Your Infrastructure/2. Securing Periphery Systems- User Repositories, DNS, NTP.mp4 | 4.99 MB |
3. Securing Your Infrastructure/2. Securing Periphery Systems- User Repositories, DNS, NTP.srt | 4.95 KB |
4. Introducing the Cloud Adoption Framework/0. Introduction.mp4 | 9.02 MB |
4. Introducing the Cloud Adoption Framework/0. Introduction.srt | 4.05 KB |
4. Introducing the Cloud Adoption Framework/1. Mind the -Gap-.mp4 | 1.66 MB |
4. Introducing the Cloud Adoption Framework/1. Mind the -Gap-.srt | 1.24 KB |
4. Introducing the Cloud Adoption Framework/2. CAF Perspectives and Capabilities.mp4 | 7.03 MB |
4. Introducing the Cloud Adoption Framework/2. CAF Perspectives and Capabilities.srt | 5.03 KB |
4. Introducing the Cloud Adoption Framework/3. Summary.mp4 | 1.14 MB |
4. Introducing the Cloud Adoption Framework/3. Summary.srt | 1.21 KB |
aws-security-best-practices.zip | 360.66 MB |
content.txt | 1.10 KB |
No trackers found |
TorrentBank
Copyright © 2024