Pluralsight - Managing AWS Security and Identity by Brian Eiler and John Hales 收录时间:2018-02-26 08:00:02 文件大小:815MB 下载次数:191 最近下载:2020-09-14 23:37:47 磁力链接: magnet:?xt=urn:btih:867be82193a3a09e22345ea1b190b01bff8c443a 立即下载 复制链接 文件列表 06.When to Use Roles Instead of Users/06.Demo - Assigning a Role.mp4 21MB 03.Creating and Managing IAM Users/09.Demo - Creating and Using Access Keys.mp4 21MB 02.User Security and Identity and Access Management/10.Demo - Getting Started with an AWS Free Account.mp4 21MB 04.IAM Groups and Best Practices/07.User and Groups Best Practices.mp4 20MB 07.Auditing User Account Access/03.AWS Cloud Trail.mp4 19MB 05.Assigning Policies to Users and Groups/08.Demo - Introducing Policies.mp4 19MB 08.Federating Multiple AWS Accounts/05.Demo - Preparing the Backup AWS Account.mp4 18MB 08.Federating Multiple AWS Accounts/12.Demo - Setting up Centralized Logging.mp4 17MB 02.User Security and Identity and Access Management/12.Demo - Navigating the AWS Web Console.mp4 17MB 05.Assigning Policies to Users and Groups/14.Demo - Policy Simulator.mp4 17MB 06.When to Use Roles Instead of Users/05.Demo - Creating a Role.mp4 15MB 08.Federating Multiple AWS Accounts/08.Demo - Assuming a Role in the CLI.mp4 15MB 02.User Security and Identity and Access Management/11.Demo - Creating a New AWS Account.mp4 15MB 02.User Security and Identity and Access Management/13.Demo - Introducing IAM in the AWS Web Console.mp4 15MB 03.Creating and Managing IAM Users/10.Multi-factor Authentication.mp4 13MB 08.Federating Multiple AWS Accounts/06.Demo - Setting up the Role.mp4 13MB 02.User Security and Identity and Access Management/02.Understanding AWS Shared Responsibilities.mp4 13MB 02.User Security and Identity and Access Management/09.Scenario - Globomantics.mp4 13MB 04.IAM Groups and Best Practices/04.Demo - Creating an IAM Group.mp4 13MB 03.Creating and Managing IAM Users/11.Demo - Enabling Multi-factor Authentication.mp4 13MB 08.Federating Multiple AWS Accounts/10.Demo - Setting up Consolidated Billing.mp4 12MB 09.Federating with External Identity Providers/08.Demo - Creating a Simple AD.mp4 12MB 04.IAM Groups and Best Practices/01.IAM Groups.mp4 12MB 05.Assigning Policies to Users and Groups/06.In-line Policies.mp4 11MB 06.When to Use Roles Instead of Users/03.Benefits of Roles.mp4 11MB 05.Assigning Policies to Users and Groups/09.Demo - Creating a Policy.mp4 11MB 09.Federating with External Identity Providers/04.STS Action APIs.mp4 11MB 07.Auditing User Account Access/08.Demo - Generating Credential Reports.mp4 11MB 03.Creating and Managing IAM Users/04.Demo - Creating IAM Users.mp4 11MB 09.Federating with External Identity Providers/05.Corporate Identities - Simple AD.mp4 11MB 05.Assigning Policies to Users and Groups/13.Policy Simulator.mp4 11MB 03.Creating and Managing IAM Users/12.Permissions.mp4 11MB 05.Assigning Policies to Users and Groups/12.Demo - In-line Policies.mp4 10MB 03.Creating and Managing IAM Users/03.IAM Users.mp4 10MB 07.Auditing User Account Access/10.Demo - Using Trusted Advisor.mp4 10MB 07.Auditing User Account Access/09.AWS Trusted Advisor.mp4 10MB 06.When to Use Roles Instead of Users/04.Creating a Role.mp4 10MB 08.Federating Multiple AWS Accounts/03.Cross-account Access.mp4 10MB 08.Federating Multiple AWS Accounts/04.Backup and Disaster Recovery.mp4 10MB 03.Creating and Managing IAM Users/06.Configuring the IAM Password Policy.mp4 9MB 02.User Security and Identity and Access Management/08.Scenario - Wired Brain Coffee.mp4 9MB 07.Auditing User Account Access/05.Access Advisor.mp4 9MB 07.Auditing User Account Access/02.Auditing and AWS Auditing Tools.mp4 9MB 09.Federating with External Identity Providers/03.Fundamentals of Federation.mp4 9MB 05.Assigning Policies to Users and Groups/03.IAM Policy Structure.mp4 9MB 04.IAM Groups and Best Practices/06.Demo - Editing Group Membership.mp4 8MB 09.Federating with External Identity Providers/06.Corporate Identities - Microsoft AD.mp4 8MB 07.Auditing User Account Access/07.Credential Report.mp4 8MB 08.Federating Multiple AWS Accounts/07.Demo - How to Assume a Role.mp4 8MB 05.Assigning Policies to Users and Groups/05.AWS Managed Policies.mp4 8MB 07.Auditing User Account Access/11.Amazon Inspector.mp4 8MB 05.Assigning Policies to Users and Groups/04.Creating a New Policy.mp4 7MB 03.Creating and Managing IAM Users/13.Demo - Assigning Permissions.mp4 7MB 05.Assigning Policies to Users and Groups/10.Demo - Troubleshooting Policies.mp4 7MB 03.Creating and Managing IAM Users/07.Access Keys.mp4 7MB 03.Creating and Managing IAM Users/08.Creating Access Keys.mp4 7MB 09.Federating with External Identity Providers/07.Corporate Identities - AD Connector.mp4 7MB 03.Creating and Managing IAM Users/02.IAM Users Overview.mp4 7MB 07.Auditing User Account Access/04.Demo - Configuring Cloud Trail.mp4 7MB 04.IAM Groups and Best Practices/02.Scenario Examples for IAM Groups.mp4 7MB 09.Federating with External Identity Providers/02.Understanding Federation.mp4 7MB 05.Assigning Policies to Users and Groups/02.IAM Policies.mp4 7MB 08.Federating Multiple AWS Accounts/11.Centralized Logging.mp4 6MB 08.Federating Multiple AWS Accounts/02.Multiple AWS Accounts.mp4 6MB 02.User Security and Identity and Access Management/04.The Misfortune of a Compromised Root User Account.mp4 6MB 02.User Security and Identity and Access Management/05.The Disadvantages of Sharing the Root User Account.mp4 5MB 08.Federating Multiple AWS Accounts/09.Consolidated Billing.mp4 5MB 05.Assigning Policies to Users and Groups/07.Policy Versioning.mp4 5MB 01.Course Overview/01.Course Overview.mp4 5MB 07.Auditing User Account Access/06.Demo - Using Access Advisor.mp4 5MB 03.Creating and Managing IAM Users/05.Password Policies.mp4 5MB 02.User Security and Identity and Access Management/03.What Is the AWS Root User Account.mp4 5MB 09.Federating with External Identity Providers/10.Social Identities.mp4 4MB 06.When to Use Roles Instead of Users/07.Cross-account Access with Roles.mp4 4MB 04.IAM Groups and Best Practices/05.Benefits of Using IAM Groups.mp4 4MB 09.Federating with External Identity Providers/09.Non-AD Environments.mp4 4MB 02.User Security and Identity and Access Management/06.How IAM Interacts with Other AWS Resources.mp4 4MB 05.Assigning Policies to Users and Groups/11.Demo - Policy Versions.mp4 3MB 03.Creating and Managing IAM Users/14.Conclusion.mp4 3MB 06.When to Use Roles Instead of Users/02.Understanding Roles.mp4 3MB 02.User Security and Identity and Access Management/07.Scenario - Introduction.mp4 3MB 04.IAM Groups and Best Practices/03.Creating IAM Groups.mp4 2MB 07.Auditing User Account Access/12.Conclusion.mp4 2MB 05.Assigning Policies to Users and Groups/15.Conclusion.mp4 2MB 02.User Security and Identity and Access Management/01.Introduction.mp4 2MB 08.Federating Multiple AWS Accounts/13.Conclusion.mp4 2MB 03.Creating and Managing IAM Users/01.Introduction.mp4 1MB 09.Federating with External Identity Providers/11.Conclusion.mp4 1MB 06.When to Use Roles Instead of Users/08.Conclusion.mp4 1MB 05.Assigning Policies to Users and Groups/01.Introduction.mp4 1MB 07.Auditing User Account Access/01.Introduction.mp4 1MB 08.Federating Multiple AWS Accounts/01.Introduction.mp4 1MB 06.When to Use Roles Instead of Users/01.Introduction.mp4 1001KB 02.User Security and Identity and Access Management/14.Conclusion.mp4 970KB 04.IAM Groups and Best Practices/08.Conclusion.mp4 934KB 09.Federating with External Identity Providers/01.Introduction.mp4 914KB content.txt 4KB