Pluralsight - AWS Cloud Security Best Practices by Joseph Hunsaker - TorrentBank

File Name:Pluralsight - AWS Cloud Security Best Practices by Joseph Hunsaker

Create Tool:

Create Time:1970-01-01 08:00:00

File Size:451.79 MB

File Count:40

File Hash:52c9ed890e4f0502404559383c54ce58e8623121

Magnet Link:

Magnet Link:

Torrent File:

0. Course Overview/0. Course Overview.mp4 4.62 MB
0. Course Overview/0. Course Overview.srt 2.74 KB
1. Examining the AWS Security Checklist/0. Introduction.mp4 3.02 MB
1. Examining the AWS Security Checklist/0. Introduction.srt 2.81 KB
1. Examining the AWS Security Checklist/1. Least Privilege.mp4 7.93 MB
1. Examining the AWS Security Checklist/1. Least Privilege.srt 9.44 KB
1. Examining the AWS Security Checklist/2. Handle Keys with Care.mp4 8.67 MB
1. Examining the AWS Security Checklist/2. Handle Keys with Care.srt 6.27 KB
1. Examining the AWS Security Checklist/3. Encrypt -All the Things-.mp4 3.79 MB
1. Examining the AWS Security Checklist/3. Encrypt -All the Things-.srt 2.85 KB
1. Examining the AWS Security Checklist/4. Monitor Continuously.mp4 2.91 MB
1. Examining the AWS Security Checklist/4. Monitor Continuously.srt 3.04 KB
1. Examining the AWS Security Checklist/5. Audit Regularly.mp4 1.21 MB
1. Examining the AWS Security Checklist/5. Audit Regularly.srt 1.45 KB
2. Securing Operating Systems and Applications/0. Introduction.mp4 5.13 MB
2. Securing Operating Systems and Applications/0. Introduction.srt 4.53 KB
2. Securing Operating Systems and Applications/1. Securing Custom AMIs.mp4 6.43 MB
2. Securing Operating Systems and Applications/1. Securing Custom AMIs.srt 5.09 KB
2. Securing Operating Systems and Applications/2. Common AMI Maintenance.mp4 2.73 MB
2. Securing Operating Systems and Applications/2. Common AMI Maintenance.srt 3.19 KB
2. Securing Operating Systems and Applications/3. Intervention.mp4 4.16 MB
2. Securing Operating Systems and Applications/3. Intervention.srt 4.41 KB
2. Securing Operating Systems and Applications/4. Future.mp4 1.62 MB
2. Securing Operating Systems and Applications/4. Future.srt 1.92 KB
3. Securing Your Infrastructure/0. Introduction.mp4 8.47 MB
3. Securing Your Infrastructure/0. Introduction.srt 5.96 KB
3. Securing Your Infrastructure/1. Network Segmentation and Security Zones.mp4 6.53 MB
3. Securing Your Infrastructure/1. Network Segmentation and Security Zones.srt 5.62 KB
3. Securing Your Infrastructure/2. Securing Periphery Systems- User Repositories, DNS, NTP.mp4 4.99 MB
3. Securing Your Infrastructure/2. Securing Periphery Systems- User Repositories, DNS, NTP.srt 4.95 KB
4. Introducing the Cloud Adoption Framework/0. Introduction.mp4 9.02 MB
4. Introducing the Cloud Adoption Framework/0. Introduction.srt 4.05 KB
4. Introducing the Cloud Adoption Framework/1. Mind the -Gap-.mp4 1.66 MB
4. Introducing the Cloud Adoption Framework/1. Mind the -Gap-.srt 1.24 KB
4. Introducing the Cloud Adoption Framework/2. CAF Perspectives and Capabilities.mp4 7.03 MB
4. Introducing the Cloud Adoption Framework/2. CAF Perspectives and Capabilities.srt 5.03 KB
4. Introducing the Cloud Adoption Framework/3. Summary.mp4 1.14 MB
4. Introducing the Cloud Adoption Framework/3. Summary.srt 1.21 KB
aws-security-best-practices.zip 360.66 MB
content.txt 1.10 KB
No trackers found

TorrentBank
Copyright © 2024