Pluralsight - Securing AWS Networks by Saravanan Dhandapani
File List
- 2. Monitoring Security in AWS/2. AWS Config- Demo.mp4 19.8 MB
- 5. AWS Security Services/0. Amazon Macie- Theory and Demo.mp4 18.8 MB
- 2. Monitoring Security in AWS/3. VPC Flow Logs.mp4 16.3 MB
- 4. AWS Encryption Technologies/1. Encryption of Data at Rest- KMS and CloudHSM.mp4 14.8 MB
- 1. AWS Compliance/1. AWS Inspector- Theory and Demo.mp4 14.2 MB
- 3. Securing Data Flow/2. Network ACLs and Security Groups.mp4 12.8 MB
- 3. Securing Data Flow/3. Amazon Route 53.mp4 12.2 MB
- 3. Securing Data Flow/1. AWS WAF and Shield.mp4 11.9 MB
- 5. AWS Security Services/2. AWS Security Hub- Theory and Demo.mp4 11.3 MB
- 4. AWS Encryption Technologies/2. Encryption of Data in Transit.mp4 11.0 MB
- 2. Monitoring Security in AWS/0. AWS Shared Responsibility Model and Penetration Testing.mp4 9.6 MB
- 1. AWS Compliance/3. AWS Organizations and AWS Artifacts.mp4 8.0 MB
- 1. AWS Compliance/0. Security Perspective of Cloud Adoption Framework.mp4 7.2 MB
- 5. AWS Security Services/1. AWS Guard Duty- Theory and Demo.mp4 7.1 MB
- 4. AWS Encryption Technologies/0. Encryption Strategies- A Primer.mp4 6.7 MB
- 3. Securing Data Flow/0. AWS Edge Locations and Content Delivery.mp4 6.5 MB
- 1. AWS Compliance/2. AWS Trusted Advisor- Theory and Demo.mp4 6.2 MB
- 5. AWS Security Services/3. Amazon Detective and AWS Firewall Manager.mp4 5.8 MB
- 2. Monitoring Security in AWS/1. AWS Config- Theory.mp4 5.0 MB
- 3. Securing Data Flow/4. AWS Certificate Manager.mp4 4.8 MB
- securing-aws-networks.zip 4.4 MB
- 0. Course Overview/0. Course Overview.mp4 3.0 MB
- content.txt 1.3 KB
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via anywarmservice[AT]gmail.com. Remember to include the full url in your complaint.