Pluralsight - AWS Cloud Security Best Practices by Joseph Hunsaker
File List
- aws-security-best-practices.zip 360.7 MB
- 4. Introducing the Cloud Adoption Framework/0. Introduction.mp4 9.0 MB
- 1. Examining the AWS Security Checklist/2. Handle Keys with Care.mp4 8.7 MB
- 3. Securing Your Infrastructure/0. Introduction.mp4 8.5 MB
- 1. Examining the AWS Security Checklist/1. Least Privilege.mp4 7.9 MB
- 4. Introducing the Cloud Adoption Framework/2. CAF Perspectives and Capabilities.mp4 7.0 MB
- 3. Securing Your Infrastructure/1. Network Segmentation and Security Zones.mp4 6.5 MB
- 2. Securing Operating Systems and Applications/1. Securing Custom AMIs.mp4 6.4 MB
- 2. Securing Operating Systems and Applications/0. Introduction.mp4 5.1 MB
- 3. Securing Your Infrastructure/2. Securing Periphery Systems- User Repositories, DNS, NTP.mp4 5.0 MB
- 0. Course Overview/0. Course Overview.mp4 4.6 MB
- 2. Securing Operating Systems and Applications/3. Intervention.mp4 4.2 MB
- 1. Examining the AWS Security Checklist/3. Encrypt -All the Things-.mp4 3.8 MB
- 1. Examining the AWS Security Checklist/0. Introduction.mp4 3.0 MB
- 1. Examining the AWS Security Checklist/4. Monitor Continuously.mp4 2.9 MB
- 2. Securing Operating Systems and Applications/2. Common AMI Maintenance.mp4 2.7 MB
- 4. Introducing the Cloud Adoption Framework/1. Mind the -Gap-.mp4 1.7 MB
- 2. Securing Operating Systems and Applications/4. Future.mp4 1.6 MB
- 1. Examining the AWS Security Checklist/5. Audit Regularly.mp4 1.2 MB
- 4. Introducing the Cloud Adoption Framework/3. Summary.mp4 1.1 MB
- 1. Examining the AWS Security Checklist/1. Least Privilege.srt 9.4 KB
- 1. Examining the AWS Security Checklist/2. Handle Keys with Care.srt 6.3 KB
- 3. Securing Your Infrastructure/0. Introduction.srt 6.0 KB
- 3. Securing Your Infrastructure/1. Network Segmentation and Security Zones.srt 5.6 KB
- 2. Securing Operating Systems and Applications/1. Securing Custom AMIs.srt 5.1 KB
- 4. Introducing the Cloud Adoption Framework/2. CAF Perspectives and Capabilities.srt 5.0 KB
- 3. Securing Your Infrastructure/2. Securing Periphery Systems- User Repositories, DNS, NTP.srt 5.0 KB
- 2. Securing Operating Systems and Applications/0. Introduction.srt 4.5 KB
- 2. Securing Operating Systems and Applications/3. Intervention.srt 4.4 KB
- 4. Introducing the Cloud Adoption Framework/0. Introduction.srt 4.1 KB
- 2. Securing Operating Systems and Applications/2. Common AMI Maintenance.srt 3.2 KB
- 1. Examining the AWS Security Checklist/4. Monitor Continuously.srt 3.0 KB
- 1. Examining the AWS Security Checklist/3. Encrypt -All the Things-.srt 2.9 KB
- 1. Examining the AWS Security Checklist/0. Introduction.srt 2.8 KB
- 0. Course Overview/0. Course Overview.srt 2.7 KB
- 2. Securing Operating Systems and Applications/4. Future.srt 1.9 KB
- 1. Examining the AWS Security Checklist/5. Audit Regularly.srt 1.5 KB
- 4. Introducing the Cloud Adoption Framework/1. Mind the -Gap-.srt 1.2 KB
- 4. Introducing the Cloud Adoption Framework/3. Summary.srt 1.2 KB
- content.txt 1.1 KB
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via anywarmservice[AT]gmail.com. Remember to include the full url in your complaint.