Pluralsight - AWS Cloud Security Best Practices by Joseph Hunsaker

File Information:
  1. Magnet Link:Magnet LinkMagnet Link
  2. File Size:462.64 MB
  3. Creat Time:2024-06-16
  4. Active Degree:60
  5. Last Active:2024-11-24
  6. File Tags:Pluralsight  AWS  Cloud  Security  Best  Practices  by  Joseph  Hunsaker  
  7. Statement:This site does not provide download links, only text displays, and does not contain any infringement.
File List:

    Pluralsight - AWS Cloud Security Best Practices by Joseph Hunsaker

  1. aws-security-best-practices.zip 369.32 MB
  2. 4. Introducing the Cloud Adoption Framework/0. Introduction.mp4 9.24 MB
  3. 1. Examining the AWS Security Checklist/2. Handle Keys with Care.mp4 8.88 MB
  4. 3. Securing Your Infrastructure/0. Introduction.mp4 8.67 MB
  5. 1. Examining the AWS Security Checklist/1. Least Privilege.mp4 8.12 MB
  6. 4. Introducing the Cloud Adoption Framework/2. CAF Perspectives and Capabilities.mp4 7.20 MB
  7. 3. Securing Your Infrastructure/1. Network Segmentation and Security Zones.mp4 6.69 MB
  8. 2. Securing Operating Systems and Applications/1. Securing Custom AMIs.mp4 6.58 MB
  9. 2. Securing Operating Systems and Applications/0. Introduction.mp4 5.25 MB
  10. 3. Securing Your Infrastructure/2. Securing Periphery Systems- User Repositories, DNS, NTP.mp4 5.11 MB
  11. 0. Course Overview/0. Course Overview.mp4 4.73 MB
  12. 2. Securing Operating Systems and Applications/3. Intervention.mp4 4.26 MB
  13. 1. Examining the AWS Security Checklist/3. Encrypt -All the Things-.mp4 3.88 MB
  14. 1. Examining the AWS Security Checklist/0. Introduction.mp4 3.09 MB
  15. 1. Examining the AWS Security Checklist/4. Monitor Continuously.mp4 2.98 MB
  16. 2. Securing Operating Systems and Applications/2. Common AMI Maintenance.mp4 2.80 MB
  17. 4. Introducing the Cloud Adoption Framework/1. Mind the -Gap-.mp4 1.70 MB
  18. 2. Securing Operating Systems and Applications/4. Future.mp4 1.66 MB
  19. 1. Examining the AWS Security Checklist/5. Audit Regularly.mp4 1.24 MB
  20. 4. Introducing the Cloud Adoption Framework/3. Summary.mp4 1.17 MB
  21. 1. Examining the AWS Security Checklist/1. Least Privilege.srt 9 KB
  22. 1. Examining the AWS Security Checklist/2. Handle Keys with Care.srt 6 KB
  23. 3. Securing Your Infrastructure/0. Introduction.srt 6 KB
  24. 3. Securing Your Infrastructure/1. Network Segmentation and Security Zones.srt 5 KB
  25. 2. Securing Operating Systems and Applications/1. Securing Custom AMIs.srt 5 KB
  26. 4. Introducing the Cloud Adoption Framework/2. CAF Perspectives and Capabilities.srt 5 KB
  27. 3. Securing Your Infrastructure/2. Securing Periphery Systems- User Repositories, DNS, NTP.srt 5 KB
  28. 2. Securing Operating Systems and Applications/0. Introduction.srt 4 KB
  29. 2. Securing Operating Systems and Applications/3. Intervention.srt 4 KB
  30. 4. Introducing the Cloud Adoption Framework/0. Introduction.srt 4 KB
  31. 2. Securing Operating Systems and Applications/2. Common AMI Maintenance.srt 3 KB
  32. 1. Examining the AWS Security Checklist/4. Monitor Continuously.srt 3 KB
  33. 1. Examining the AWS Security Checklist/3. Encrypt -All the Things-.srt 2 KB
  34. 1. Examining the AWS Security Checklist/0. Introduction.srt 2 KB
  35. 0. Course Overview/0. Course Overview.srt 2 KB
  36. 2. Securing Operating Systems and Applications/4. Future.srt 1 KB
  37. 1. Examining the AWS Security Checklist/5. Audit Regularly.srt 1 KB
  38. 4. Introducing the Cloud Adoption Framework/1. Mind the -Gap-.srt 1 KB
  39. 4. Introducing the Cloud Adoption Framework/3. Summary.srt 1 KB
  40. content.txt 1 KB