589689.xyz

Pluralsight - Architecting for Security on AWS by Ben Piper

  • 收录时间:2020-04-15 08:17:06
  • 文件大小:689MB
  • 下载次数:59
  • 最近下载:2021-01-14 23:02:09
  • 磁力链接:

文件列表

  1. 3. Protecting Network and Host-level Boundaries/6. Network Access Control Lists.mp4 38MB
  2. 3. Protecting Network and Host-level Boundaries/3. Using SSH Key Pairs.mp4 38MB
  3. 3. Protecting Network and Host-level Boundaries/4. Using VPC Endpoints - Part 1.mp4 34MB
  4. 3. Protecting Network and Host-level Boundaries/2. Creating and Using an IAM Instance Profile.mp4 30MB
  5. 2. Capturing and Analyzing Logs/6. Creating CloudWatch Alarms.mp4 29MB
  6. 3. Protecting Network and Host-level Boundaries/5. Using VPC Endpoints - Part 2.mp4 29MB
  7. 2. Capturing and Analyzing Logs/2. Configuring CloudTrail to Log AWS Service Operations.mp4 26MB
  8. 1. Protecting AWS Credentials/6. Creating an Administrative User.mp4 25MB
  9. 5. Protecting Data in Transit/2. Creating a Secure Application Load Balancer.mp4 25MB
  10. 2. Capturing and Analyzing Logs/4. Configuring CloudWatch Logs.mp4 24MB
  11. 1. Protecting AWS Credentials/3. Locking Down the Root User.mp4 23MB
  12. 5. Protecting Data in Transit/1. Preparing for the Load Balancer.mp4 22MB
  13. 1. Protecting AWS Credentials/8. Denying Access with User Policies.mp4 22MB
  14. 6. Configuring Data Backup, Replication, and Recovery/2. Lifecycle Management.mp4 20MB
  15. 2. Capturing and Analyzing Logs/8. Tracking Configuration Changes in AWS Config.mp4 18MB
  16. 4. Protecting Data at Rest/2. Encrypting an Unencrypted EBS Volume.mp4 18MB
  17. 4. Protecting Data at Rest/3. S3 Access Permissions - Part 1.mp4 17MB
  18. 4. Protecting Data at Rest/6. Granting Anonymous Access with Object ACLs and Bucket Policies.mp4 17MB
  19. 3. Protecting Network and Host-level Boundaries/1. Creating a Public Subnet.mp4 17MB
  20. 2. Capturing and Analyzing Logs/5. Reading CloudTrail Logs Using CloudWatch Logs.mp4 16MB
  21. 4. Protecting Data at Rest/1. Creating a Customer Master Key with KMS.mp4 16MB
  22. 4. Protecting Data at Rest/5. CloudFront Origin Access Identity.mp4 15MB
  23. 2. Capturing and Analyzing Logs/7. Searching Logs with Athena.mp4 15MB
  24. 6. Configuring Data Backup, Replication, and Recovery/1. Versioning.mp4 14MB
  25. 4. Protecting Data at Rest/7. Encrypting S3 Objects with KMS-managed Keys (SSE-KMS).mp4 12MB
  26. 6. Configuring Data Backup, Replication, and Recovery/3. Cross-region Replication.mp4 11MB
  27. 4. Protecting Data at Rest/4. S3 Access Permissions - Part 2.mp4 11MB
  28. 5. Protecting Data in Transit/0. Introduction to Protecting Data in Transit.mp4 9MB
  29. 1. Protecting AWS Credentials/9. Denying Access with Group Policies.mp4 9MB
  30. 1. Protecting AWS Credentials/0. Confidentiality, Integrity, and Availability.mp4 8MB
  31. 1. Protecting AWS Credentials/1. Course Overview.mp4 7MB
  32. 3. Protecting Network and Host-level Boundaries/0. Introduction to Protecting Network and Host-level Boundaries.mp4 7MB
  33. 1. Protecting AWS Credentials/7. Using Groups.mp4 6MB
  34. architecting-security-aws.zip 5MB
  35. 6. Configuring Data Backup, Replication, and Recovery/5. Course Summary.mp4 5MB
  36. 2. Capturing and Analyzing Logs/3. CloudTrail vs. CloudWatch Logs.mp4 5MB
  37. 1. Protecting AWS Credentials/10. Summary.mp4 4MB
  38. 1. Protecting AWS Credentials/5. Understanding Policies.mp4 4MB
  39. 4. Protecting Data at Rest/8. Summary.mp4 4MB
  40. 5. Protecting Data in Transit/3. Summary.mp4 4MB
  41. 4. Protecting Data at Rest/0. Introduction to Protecting Data at Rest.mp4 4MB
  42. 1. Protecting AWS Credentials/2. Understanding AWS Credentials.mp4 3MB
  43. 3. Protecting Network and Host-level Boundaries/7. Summary.mp4 3MB
  44. 0. Course Overview/0. Course Overview.mp4 3MB
  45. 2. Capturing and Analyzing Logs/9. Summary.mp4 3MB
  46. 2. Capturing and Analyzing Logs/1. Understanding CloudTrail.mp4 3MB
  47. 6. Configuring Data Backup, Replication, and Recovery/0. Introduction to Data Backup, Replication, and Recovery.mp4 3MB
  48. 2. Capturing and Analyzing Logs/0. Introduction to Capturing and Analyzing Logs.mp4 3MB
  49. 1. Protecting AWS Credentials/4. Introduction to Principals and Policies.mp4 3MB
  50. 6. Configuring Data Backup, Replication, and Recovery/4. Summary.mp4 2MB
  51. 2. Capturing and Analyzing Logs/6. Creating CloudWatch Alarms.srt 15KB
  52. 3. Protecting Network and Host-level Boundaries/6. Network Access Control Lists.srt 15KB
  53. 1. Protecting AWS Credentials/8. Denying Access with User Policies.srt 15KB
  54. 2. Capturing and Analyzing Logs/2. Configuring CloudTrail to Log AWS Service Operations.srt 14KB
  55. 6. Configuring Data Backup, Replication, and Recovery/2. Lifecycle Management.srt 14KB
  56. 2. Capturing and Analyzing Logs/4. Configuring CloudWatch Logs.srt 13KB
  57. 1. Protecting AWS Credentials/6. Creating an Administrative User.srt 13KB
  58. 3. Protecting Network and Host-level Boundaries/2. Creating and Using an IAM Instance Profile.srt 13KB
  59. 3. Protecting Network and Host-level Boundaries/3. Using SSH Key Pairs.srt 13KB
  60. 5. Protecting Data in Transit/2. Creating a Secure Application Load Balancer.srt 12KB
  61. 1. Protecting AWS Credentials/3. Locking Down the Root User.srt 12KB
  62. 2. Capturing and Analyzing Logs/8. Tracking Configuration Changes in AWS Config.srt 12KB
  63. 3. Protecting Network and Host-level Boundaries/4. Using VPC Endpoints - Part 1.srt 11KB
  64. 5. Protecting Data in Transit/1. Preparing for the Load Balancer.srt 11KB
  65. 1. Protecting AWS Credentials/0. Confidentiality, Integrity, and Availability.srt 11KB
  66. 4. Protecting Data at Rest/3. S3 Access Permissions - Part 1.srt 11KB
  67. 5. Protecting Data in Transit/0. Introduction to Protecting Data in Transit.srt 10KB
  68. 4. Protecting Data at Rest/6. Granting Anonymous Access with Object ACLs and Bucket Policies.srt 10KB
  69. 3. Protecting Network and Host-level Boundaries/5. Using VPC Endpoints - Part 2.srt 10KB
  70. 1. Protecting AWS Credentials/1. Course Overview.srt 10KB
  71. 4. Protecting Data at Rest/5. CloudFront Origin Access Identity.srt 9KB
  72. 2. Capturing and Analyzing Logs/7. Searching Logs with Athena.srt 9KB
  73. 4. Protecting Data at Rest/1. Creating a Customer Master Key with KMS.srt 9KB
  74. 3. Protecting Network and Host-level Boundaries/0. Introduction to Protecting Network and Host-level Boundaries.srt 9KB
  75. 4. Protecting Data at Rest/2. Encrypting an Unencrypted EBS Volume.srt 9KB
  76. 6. Configuring Data Backup, Replication, and Recovery/1. Versioning.srt 8KB
  77. 3. Protecting Network and Host-level Boundaries/1. Creating a Public Subnet.srt 7KB
  78. 6. Configuring Data Backup, Replication, and Recovery/3. Cross-region Replication.srt 7KB
  79. 4. Protecting Data at Rest/7. Encrypting S3 Objects with KMS-managed Keys (SSE-KMS).srt 7KB
  80. 4. Protecting Data at Rest/4. S3 Access Permissions - Part 2.srt 6KB
  81. 2. Capturing and Analyzing Logs/5. Reading CloudTrail Logs Using CloudWatch Logs.srt 6KB
  82. 6. Configuring Data Backup, Replication, and Recovery/5. Course Summary.srt 6KB
  83. 1. Protecting AWS Credentials/5. Understanding Policies.srt 6KB
  84. 1. Protecting AWS Credentials/9. Denying Access with Group Policies.srt 5KB
  85. 2. Capturing and Analyzing Logs/3. CloudTrail vs. CloudWatch Logs.srt 5KB
  86. 4. Protecting Data at Rest/8. Summary.srt 4KB
  87. 5. Protecting Data in Transit/3. Summary.srt 4KB
  88. 4. Protecting Data at Rest/0. Introduction to Protecting Data at Rest.srt 4KB
  89. 1. Protecting AWS Credentials/10. Summary.srt 4KB
  90. 1. Protecting AWS Credentials/2. Understanding AWS Credentials.srt 4KB
  91. 6. Configuring Data Backup, Replication, and Recovery/0. Introduction to Data Backup, Replication, and Recovery.srt 4KB
  92. 2. Capturing and Analyzing Logs/1. Understanding CloudTrail.srt 4KB
  93. 1. Protecting AWS Credentials/7. Using Groups.srt 3KB
  94. 2. Capturing and Analyzing Logs/9. Summary.srt 3KB
  95. 1. Protecting AWS Credentials/4. Introduction to Principals and Policies.srt 3KB
  96. 3. Protecting Network and Host-level Boundaries/7. Summary.srt 3KB
  97. 2. Capturing and Analyzing Logs/0. Introduction to Capturing and Analyzing Logs.srt 3KB
  98. content.txt 3KB
  99. 0. Course Overview/0. Course Overview.srt 2KB
  100. 6. Configuring Data Backup, Replication, and Recovery/4. Summary.srt 2KB