Pluralsight - AWS Security Operations - Securing Core AWS Infrastructure Services by Mark Wilkins
File List
- 03.Securing Core Infrastructure/10.EBS Volume and Snapshot Security.mp4 27.4 MB
- 04.Securing Access to Edge Locations/07.Elastic Load Balancer Setup.mp4 22.7 MB
- 03.Securing Core Infrastructure/08.Dedicated Instances and Hosts.mp4 19.5 MB
- 02.Managing Access Control/05.Managing Multiple Accounts.mp4 18.7 MB
- 03.Securing Core Infrastructure/05.EC2 Security Options.mp4 18.2 MB
- 03.Securing Core Infrastructure/15.VPC Security Considerations.mp4 18.0 MB
- 02.Managing Access Control/07.Defining IAM Policy for the User.mp4 17.0 MB
- 03.Securing Core Infrastructure/02.Securing EC2 Infrastructure.mp4 16.9 MB
- 02.Managing Access Control/13.IAM Policy Types.mp4 15.7 MB
- 02.Managing Access Control/04.Controlling Root Account Security.mp4 15.6 MB
- 03.Securing Core Infrastructure/11.VPC Architecture.mp4 15.3 MB
- 03.Securing Core Infrastructure/14.VPC Security and Connectivity - Part B.mp4 15.0 MB
- 02.Managing Access Control/10.Security Tools.mp4 14.6 MB
- 04.Securing Access to Edge Locations/06.Application Load Balancer.mp4 14.4 MB
- 03.Securing Core Infrastructure/07.Network Interfaces and Addresses.mp4 13.9 MB
- 03.Securing Core Infrastructure/06.Interfaces and Addresses.mp4 13.9 MB
- 02.Managing Access Control/14.Delegation and Federation.mp4 13.3 MB
- 02.Managing Access Control/03.Defining Security Controls.mp4 13.3 MB
- 03.Securing Core Infrastructure/13.VPC Security - Part A.mp4 12.6 MB
- 02.Managing Access Control/12.IAM Policies - The Basics.mp4 12.4 MB
- 04.Securing Access to Edge Locations/10.Configuring the Web Application Firewall.mp4 11.6 MB
- 03.Securing Core Infrastructure/16.Best Practices.mp4 11.0 MB
- 03.Securing Core Infrastructure/12.VPC Setup Options.mp4 10.7 MB
- 04.Securing Access to Edge Locations/03.(Classic) Load Balancer.mp4 10.7 MB
- 04.Securing Access to Edge Locations/11.Best Practices for Securing Access.mp4 10.4 MB
- 04.Securing Access to Edge Locations/08.Route 53.mp4 9.8 MB
- 04.Securing Access to Edge Locations/04.Elastic Load Balancer Operation.mp4 9.2 MB
- 04.Securing Access to Edge Locations/09.AWS Web Application Firewall.mp4 8.9 MB
- 03.Securing Core Infrastructure/03.Amazon Machine Instances.mp4 8.0 MB
- 02.Managing Access Control/02.Identity and Access Management.mp4 7.8 MB
- 03.Securing Core Infrastructure/09.Securing EBS Volumes.mp4 7.6 MB
- 02.Managing Access Control/15.Best Practices for Planning Access Control.mp4 7.6 MB
- 02.Managing Access Control/09.Access Keys and Passwords.mp4 7.3 MB
- 02.Managing Access Control/01.Securing Core Infrastructure Services.mp4 7.1 MB
- 02.Managing Access Control/08.Controlling Access to Resources.mp4 7.1 MB
- 02.Managing Access Control/06.IAM Users and Security Controls.mp4 6.7 MB
- 04.Securing Access to Edge Locations/02.Elastic Load Balancing.mp4 5.0 MB
- 03.Securing Core Infrastructure/01.Securing Core Infrastructure.mp4 4.8 MB
- 03.Securing Core Infrastructure/04.AMI Storage Choices and Key Pairs.mp4 4.7 MB
- 04.Securing Access to Edge Locations/01.Securing Access to Edge Locations.mp4 4.2 MB
- 01.Course Overview/01.Course Overview.mp4 3.8 MB
- 04.Securing Access to Edge Locations/05.Classic ELB Security Features.mp4 3.3 MB
- 02.Managing Access Control/11.IAM Groups.mp4 2.2 MB
- content.txt 2.0 KB
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via anywarmservice[AT]gmail.com. Remember to include the full url in your complaint.