BITCQ

Pluralsight - Architecting for Security on AWS by Ben Piper

Size: 689 MB
Magnet link

Name Size
Pluralsight - Architecting for Security on AWS by Ben Piper/0. Course Overview/0. Course Overview.mp4 3 MB
Pluralsight - Architecting for Security on AWS by Ben Piper/0. Course Overview/0. Course Overview.srt 2 KB
Pluralsight - Architecting for Security on AWS by Ben Piper/1. Protecting AWS Credentials/0. Confidentiality, Integrity, and Availability.mp4 8.1 MB
Pluralsight - Architecting for Security on AWS by Ben Piper/1. Protecting AWS Credentials/0. Confidentiality, Integrity, and Availability.srt 11 KB
Pluralsight - Architecting for Security on AWS by Ben Piper/1. Protecting AWS Credentials/1. Course Overview.mp4 7.2 MB
Pluralsight - Architecting for Security on AWS by Ben Piper/1. Protecting AWS Credentials/1. Course Overview.srt 10 KB
Pluralsight - Architecting for Security on AWS by Ben Piper/1. Protecting AWS Credentials/10. Summary.mp4 4.4 MB
Pluralsight - Architecting for Security on AWS by Ben Piper/1. Protecting AWS Credentials/10. Summary.srt 4 KB
Pluralsight - Architecting for Security on AWS by Ben Piper/1. Protecting AWS Credentials/2. Understanding AWS Credentials.mp4 3.3 MB
Pluralsight - Architecting for Security on AWS by Ben Piper/1. Protecting AWS Credentials/2. Understanding AWS Credentials.srt 4 KB
Pluralsight - Architecting for Security on AWS by Ben Piper/1. Protecting AWS Credentials/3. Locking Down the Root User.mp4 22.7 MB
Pluralsight - Architecting for Security on AWS by Ben Piper/1. Protecting AWS Credentials/3. Locking Down the Root User.srt 12 KB
Pluralsight - Architecting for Security on AWS by Ben Piper/1. Protecting AWS Credentials/4. Introduction to Principals and Policies.mp4 2.5 MB
Pluralsight - Architecting for Security on AWS by Ben Piper/1. Protecting AWS Credentials/4. Introduction to Principals and Policies.srt 3 KB
Pluralsight - Architecting for Security on AWS by Ben Piper/1. Protecting AWS Credentials/5. Understanding Policies.mp4 4.4 MB
Pluralsight - Architecting for Security on AWS by Ben Piper/1. Protecting AWS Credentials/5. Understanding Policies.srt 6 KB
Pluralsight - Architecting for Security on AWS by Ben Piper/1. Protecting AWS Credentials/6. Creating an Administrative User.mp4 25.3 MB
Pluralsight - Architecting for Security on AWS by Ben Piper/1. Protecting AWS Credentials/6. Creating an Administrative User.srt 13 KB
Pluralsight - Architecting for Security on AWS by Ben Piper/1. Protecting AWS Credentials/7. Using Groups.mp4 5.6 MB
Pluralsight - Architecting for Security on AWS by Ben Piper/1. Protecting AWS Credentials/7. Using Groups.srt 3 KB
Pluralsight - Architecting for Security on AWS by Ben Piper/1. Protecting AWS Credentials/8. Denying Access with User Policies.mp4 22.1 MB
Pluralsight - Architecting for Security on AWS by Ben Piper/1. Protecting AWS Credentials/8. Denying Access with User Policies.srt 15 KB
Pluralsight - Architecting for Security on AWS by Ben Piper/1. Protecting AWS Credentials/9. Denying Access with Group Policies.mp4 9.3 MB
Pluralsight - Architecting for Security on AWS by Ben Piper/1. Protecting AWS Credentials/9. Denying Access with Group Policies.srt 5 KB
Pluralsight - Architecting for Security on AWS by Ben Piper/2. Capturing and Analyzing Logs/0. Introduction to Capturing and Analyzing Logs.mp4 2.6 MB
Pluralsight - Architecting for Security on AWS by Ben Piper/2. Capturing and Analyzing Logs/0. Introduction to Capturing and Analyzing Logs.srt 3 KB
Pluralsight - Architecting for Security on AWS by Ben Piper/2. Capturing and Analyzing Logs/1. Understanding CloudTrail.mp4 2.9 MB
Pluralsight - Architecting for Security on AWS by Ben Piper/2. Capturing and Analyzing Logs/1. Understanding CloudTrail.srt 4 KB
Pluralsight - Architecting for Security on AWS by Ben Piper/2. Capturing and Analyzing Logs/2. Configuring CloudTrail to Log AWS Service Operations.mp4 26.5 MB
Pluralsight - Architecting for Security on AWS by Ben Piper/2. Capturing and Analyzing Logs/2. Configuring CloudTrail to Log AWS Service Operations.srt 14 KB
Pluralsight - Architecting for Security on AWS by Ben Piper/2. Capturing and Analyzing Logs/3. CloudTrail vs. CloudWatch Logs.mp4 4.5 MB
Pluralsight - Architecting for Security on AWS by Ben Piper/2. Capturing and Analyzing Logs/3. CloudTrail vs. CloudWatch Logs.srt 5 KB
Pluralsight - Architecting for Security on AWS by Ben Piper/2. Capturing and Analyzing Logs/4. Configuring CloudWatch Logs.mp4 24.2 MB
Pluralsight - Architecting for Security on AWS by Ben Piper/2. Capturing and Analyzing Logs/4. Configuring CloudWatch Logs.srt 13 KB
Pluralsight - Architecting for Security on AWS by Ben Piper/2. Capturing and Analyzing Logs/5. Reading CloudTrail Logs Using CloudWatch Logs.mp4 15.8 MB
Pluralsight - Architecting for Security on AWS by Ben Piper/2. Capturing and Analyzing Logs/5. Reading CloudTrail Logs Using CloudWatch Logs.srt 6 KB
Pluralsight - Architecting for Security on AWS by Ben Piper/2. Capturing and Analyzing Logs/6. Creating CloudWatch Alarms.mp4 28.9 MB
Pluralsight - Architecting for Security on AWS by Ben Piper/2. Capturing and Analyzing Logs/6. Creating CloudWatch Alarms.srt 15 KB
Pluralsight - Architecting for Security on AWS by Ben Piper/2. Capturing and Analyzing Logs/7. Searching Logs with Athena.mp4 14.6 MB
Pluralsight - Architecting for Security on AWS by Ben Piper/2. Capturing and Analyzing Logs/7. Searching Logs with Athena.srt 9 KB
Pluralsight - Architecting for Security on AWS by Ben Piper/2. Capturing and Analyzing Logs/8. Tracking Configuration Changes in AWS Config.mp4 18.4 MB
Pluralsight - Architecting for Security on AWS by Ben Piper/2. Capturing and Analyzing Logs/8. Tracking Configuration Changes in AWS Config.srt 12 KB
Pluralsight - Architecting for Security on AWS by Ben Piper/2. Capturing and Analyzing Logs/9. Summary.mp4 3 MB
Pluralsight - Architecting for Security on AWS by Ben Piper/2. Capturing and Analyzing Logs/9. Summary.srt 3 KB
Pluralsight - Architecting for Security on AWS by Ben Piper/3. Protecting Network and Host-level Boundaries/0. Introduction to Protecting Network and Host-level Boundaries.mp4 7.2 MB
Pluralsight - Architecting for Security on AWS by Ben Piper/3. Protecting Network and Host-level Boundaries/0. Introduction to Protecting Network and Host-level Boundaries.srt 9 KB
Pluralsight - Architecting for Security on AWS by Ben Piper/3. Protecting Network and Host-level Boundaries/1. Creating a Public Subnet.mp4 16.8 MB
Pluralsight - Architecting for Security on AWS by Ben Piper/3. Protecting Network and Host-level Boundaries/1. Creating a Public Subnet.srt 7 KB
Pluralsight - Architecting for Security on AWS by Ben Piper/3. Protecting Network and Host-level Boundaries/2. Creating and Using an IAM Instance Profile.mp4 30.1 MB
Pluralsight - Architecting for Security on AWS by Ben Piper/3. Protecting Network and Host-level Boundaries/2. Creating and Using an IAM Instance Profile.srt 13 KB
Pluralsight - Architecting for Security on AWS by Ben Piper/3. Protecting Network and Host-level Boundaries/3. Using SSH Key Pairs.mp4 38.3 MB
Pluralsight - Architecting for Security on AWS by Ben Piper/3. Protecting Network and Host-level Boundaries/3. Using SSH Key Pairs.srt 13 KB
Pluralsight - Architecting for Security on AWS by Ben Piper/3. Protecting Network and Host-level Boundaries/4. Using VPC Endpoints - Part 1.mp4 33.8 MB
Pluralsight - Architecting for Security on AWS by Ben Piper/3. Protecting Network and Host-level Boundaries/4. Using VPC Endpoints - Part 1.srt 11 KB
Pluralsight - Architecting for Security on AWS by Ben Piper/3. Protecting Network and Host-level Boundaries/5. Using VPC Endpoints - Part 2.mp4 28.6 MB
Pluralsight - Architecting for Security on AWS by Ben Piper/3. Protecting Network and Host-level Boundaries/5. Using VPC Endpoints - Part 2.srt 10 KB
Pluralsight - Architecting for Security on AWS by Ben Piper/3. Protecting Network and Host-level Boundaries/6. Network Access Control Lists.mp4 38.4 MB
Pluralsight - Architecting for Security on AWS by Ben Piper/3. Protecting Network and Host-level Boundaries/6. Network Access Control Lists.srt 15 KB
Pluralsight - Architecting for Security on AWS by Ben Piper/3. Protecting Network and Host-level Boundaries/7. Summary.mp4 3.1 MB
Pluralsight - Architecting for Security on AWS by Ben Piper/3. Protecting Network and Host-level Boundaries/7. Summary.srt 3 KB
Pluralsight - Architecting for Security on AWS by Ben Piper/4. Protecting Data at Rest/0. Introduction to Protecting Data at Rest.mp4 3.6 MB
Pluralsight - Architecting for Security on AWS by Ben Piper/4. Protecting Data at Rest/0. Introduction to Protecting Data at Rest.srt 4 KB
Pluralsight - Architecting for Security on AWS by Ben Piper/4. Protecting Data at Rest/1. Creating a Customer Master Key with KMS.mp4 15.7 MB
Pluralsight - Architecting for Security on AWS by Ben Piper/4. Protecting Data at Rest/1. Creating a Customer Master Key with KMS.srt 9 KB
Pluralsight - Architecting for Security on AWS by Ben Piper/4. Protecting Data at Rest/2. Encrypting an Unencrypted EBS Volume.mp4 17.7 MB
Pluralsight - Architecting for Security on AWS by Ben Piper/4. Protecting Data at Rest/2. Encrypting an Unencrypted EBS Volume.srt 9 KB
Pluralsight - Architecting for Security on AWS by Ben Piper/4. Protecting Data at Rest/3. S3 Access Permissions - Part 1.mp4 17 MB
Pluralsight - Architecting for Security on AWS by Ben Piper/4. Protecting Data at Rest/3. S3 Access Permissions - Part 1.srt 11 KB
Pluralsight - Architecting for Security on AWS by Ben Piper/4. Protecting Data at Rest/4. S3 Access Permissions - Part 2.mp4 11.2 MB
Pluralsight - Architecting for Security on AWS by Ben Piper/4. Protecting Data at Rest/4. S3 Access Permissions - Part 2.srt 6 KB
Pluralsight - Architecting for Security on AWS by Ben Piper/4. Protecting Data at Rest/5. CloudFront Origin Access Identity.mp4 15.3 MB
Pluralsight - Architecting for Security on AWS by Ben Piper/4. Protecting Data at Rest/5. CloudFront Origin Access Identity.srt 9 KB
Pluralsight - Architecting for Security on AWS by Ben Piper/4. Protecting Data at Rest/6. Granting Anonymous Access with Object ACLs and Bucket Policies.mp4 16.9 MB
Pluralsight - Architecting for Security on AWS by Ben Piper/4. Protecting Data at Rest/6. Granting Anonymous Access with Object ACLs and Bucket Policies.srt 10 KB
Pluralsight - Architecting for Security on AWS by Ben Piper/4. Protecting Data at Rest/7. Encrypting S3 Objects with KMS-managed Keys (SSE-KMS).mp4 12.3 MB
Pluralsight - Architecting for Security on AWS by Ben Piper/4. Protecting Data at Rest/7. Encrypting S3 Objects with KMS-managed Keys (SSE-KMS).srt 7 KB
Pluralsight - Architecting for Security on AWS by Ben Piper/4. Protecting Data at Rest/8. Summary.mp4 4.1 MB
Pluralsight - Architecting for Security on AWS by Ben Piper/4. Protecting Data at Rest/8. Summary.srt 4 KB
Pluralsight - Architecting for Security on AWS by Ben Piper/5. Protecting Data in Transit/0. Introduction to Protecting Data in Transit.mp4 9.4 MB
Pluralsight - Architecting for Security on AWS by Ben Piper/5. Protecting Data in Transit/0. Introduction to Protecting Data in Transit.srt 10 KB
Pluralsight - Architecting for Security on AWS by Ben Piper/5. Protecting Data in Transit/1. Preparing for the Load Balancer.mp4 22.3 MB
Pluralsight - Architecting for Security on AWS by Ben Piper/5. Protecting Data in Transit/1. Preparing for the Load Balancer.srt 11 KB
Pluralsight - Architecting for Security on AWS by Ben Piper/5. Protecting Data in Transit/2. Creating a Secure Application Load Balancer.mp4 24.5 MB
Pluralsight - Architecting for Security on AWS by Ben Piper/5. Protecting Data in Transit/2. Creating a Secure Application Load Balancer.srt 12 KB
Pluralsight - Architecting for Security on AWS by Ben Piper/5. Protecting Data in Transit/3. Summary.mp4 3.8 MB
Pluralsight - Architecting for Security on AWS by Ben Piper/5. Protecting Data in Transit/3. Summary.srt 4 KB
Pluralsight - Architecting for Security on AWS by Ben Piper/6. Configuring Data Backup, Replication, and Recovery/0. Introduction to Data Backup, Replication, and Recovery.mp4 2.7 MB
Pluralsight - Architecting for Security on AWS by Ben Piper/6. Configuring Data Backup, Replication, and Recovery/0. Introduction to Data Backup, Replication, and Recovery.srt 4 KB
Pluralsight - Architecting for Security on AWS by Ben Piper/6. Configuring Data Backup, Replication, and Recovery/1. Versioning.mp4 13.5 MB
Pluralsight - Architecting for Security on AWS by Ben Piper/6. Configuring Data Backup, Replication, and Recovery/1. Versioning.srt 8 KB
Pluralsight - Architecting for Security on AWS by Ben Piper/6. Configuring Data Backup, Replication, and Recovery/2. Lifecycle Management.mp4 20.3 MB
Pluralsight - Architecting for Security on AWS by Ben Piper/6. Configuring Data Backup, Replication, and Recovery/2. Lifecycle Management.srt 14 KB
Pluralsight - Architecting for Security on AWS by Ben Piper/6. Configuring Data Backup, Replication, and Recovery/3. Cross-region Replication.mp4 11.4 MB
Pluralsight - Architecting for Security on AWS by Ben Piper/6. Configuring Data Backup, Replication, and Recovery/3. Cross-region Replication.srt 7 KB
Pluralsight - Architecting for Security on AWS by Ben Piper/6. Configuring Data Backup, Replication, and Recovery/4. Summary.mp4 1.7 MB
Pluralsight - Architecting for Security on AWS by Ben Piper/6. Configuring Data Backup, Replication, and Recovery/4. Summary.srt 2 KB
Pluralsight - Architecting for Security on AWS by Ben Piper/6. Configuring Data Backup, Replication, and Recovery/5. Course Summary.mp4 4.6 MB
Pluralsight - Architecting for Security on AWS by Ben Piper/6. Configuring Data Backup, Replication, and Recovery/5. Course Summary.srt 6 KB
Pluralsight - Architecting for Security on AWS by Ben Piper/architecting-security-aws.zip 4.7 MB
Pluralsight - Architecting for Security on AWS by Ben Piper/content.txt 3 KB
Name
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.open-internet.nl:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://exodus.desync.com:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2710/announce
udp://9.rarbg.me:2710/announce
http://tracker3.itzmx.com:6961/announce
http://tracker1.itzmx.com:8080/announce
udp://thetracker.org:80/announce
udp://open.demonii.si:1337/announce
udp://bt.xxx-tracker.com:2710/announce
udp://tracker.torrent.eu.org:451/announce
udp://tracker.cyberia.is:6969/announce
udp://tracker.tiny-vps.com:6969/announce
udp://denis.stalker.upeer.me:6969/announce
http://open.acgnxtracker.com:80/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://tracker.zer0day.to:1337/announce
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://mgtracker.org:6969/announce
udp://explodie.org:6969/announce

Loading...