Pluralsight - AWS Cloud Security Best Practices by Joseph Hunsaker
File Information:
- Magnet Link:Magnet Link
- File Size:462.64 MB
- Creat Time:2024-06-16
- Active Degree:60
- Last Active:2024-11-24
- File Tags:Pluralsight AWS Cloud Security Best Practices by Joseph Hunsaker
- Statement:This site does not provide download links, only text displays, and does not contain any infringement.
File List:
- aws-security-best-practices.zip 369.32 MB
- 4. Introducing the Cloud Adoption Framework/0. Introduction.mp4 9.24 MB
- 1. Examining the AWS Security Checklist/2. Handle Keys with Care.mp4 8.88 MB
- 3. Securing Your Infrastructure/0. Introduction.mp4 8.67 MB
- 1. Examining the AWS Security Checklist/1. Least Privilege.mp4 8.12 MB
- 4. Introducing the Cloud Adoption Framework/2. CAF Perspectives and Capabilities.mp4 7.20 MB
- 3. Securing Your Infrastructure/1. Network Segmentation and Security Zones.mp4 6.69 MB
- 2. Securing Operating Systems and Applications/1. Securing Custom AMIs.mp4 6.58 MB
- 2. Securing Operating Systems and Applications/0. Introduction.mp4 5.25 MB
- 3. Securing Your Infrastructure/2. Securing Periphery Systems- User Repositories, DNS, NTP.mp4 5.11 MB
- 0. Course Overview/0. Course Overview.mp4 4.73 MB
- 2. Securing Operating Systems and Applications/3. Intervention.mp4 4.26 MB
- 1. Examining the AWS Security Checklist/3. Encrypt -All the Things-.mp4 3.88 MB
- 1. Examining the AWS Security Checklist/0. Introduction.mp4 3.09 MB
- 1. Examining the AWS Security Checklist/4. Monitor Continuously.mp4 2.98 MB
- 2. Securing Operating Systems and Applications/2. Common AMI Maintenance.mp4 2.80 MB
- 4. Introducing the Cloud Adoption Framework/1. Mind the -Gap-.mp4 1.70 MB
- 2. Securing Operating Systems and Applications/4. Future.mp4 1.66 MB
- 1. Examining the AWS Security Checklist/5. Audit Regularly.mp4 1.24 MB
- 4. Introducing the Cloud Adoption Framework/3. Summary.mp4 1.17 MB
- 1. Examining the AWS Security Checklist/1. Least Privilege.srt 9 KB
- 1. Examining the AWS Security Checklist/2. Handle Keys with Care.srt 6 KB
- 3. Securing Your Infrastructure/0. Introduction.srt 6 KB
- 3. Securing Your Infrastructure/1. Network Segmentation and Security Zones.srt 5 KB
- 2. Securing Operating Systems and Applications/1. Securing Custom AMIs.srt 5 KB
- 4. Introducing the Cloud Adoption Framework/2. CAF Perspectives and Capabilities.srt 5 KB
- 3. Securing Your Infrastructure/2. Securing Periphery Systems- User Repositories, DNS, NTP.srt 5 KB
- 2. Securing Operating Systems and Applications/0. Introduction.srt 4 KB
- 2. Securing Operating Systems and Applications/3. Intervention.srt 4 KB
- 4. Introducing the Cloud Adoption Framework/0. Introduction.srt 4 KB
- 2. Securing Operating Systems and Applications/2. Common AMI Maintenance.srt 3 KB
- 1. Examining the AWS Security Checklist/4. Monitor Continuously.srt 3 KB
- 1. Examining the AWS Security Checklist/3. Encrypt -All the Things-.srt 2 KB
- 1. Examining the AWS Security Checklist/0. Introduction.srt 2 KB
- 0. Course Overview/0. Course Overview.srt 2 KB
- 2. Securing Operating Systems and Applications/4. Future.srt 1 KB
- 1. Examining the AWS Security Checklist/5. Audit Regularly.srt 1 KB
- 4. Introducing the Cloud Adoption Framework/1. Mind the -Gap-.srt 1 KB
- 4. Introducing the Cloud Adoption Framework/3. Summary.srt 1 KB
- content.txt 1 KB
Pluralsight - AWS Cloud Security Best Practices by Joseph Hunsaker
Hot Tags: