Pluralsight - Architecting for Security on AWS by Ben Piper/0. Course Overview/0. Course Overview.mp4 |
3 MB |
Pluralsight - Architecting for Security on AWS by Ben Piper/0. Course Overview/0. Course Overview.srt |
2 KB |
Pluralsight - Architecting for Security on AWS by Ben Piper/1. Protecting AWS Credentials/0. Confidentiality, Integrity, and Availability.mp4 |
8.1 MB |
Pluralsight - Architecting for Security on AWS by Ben Piper/1. Protecting AWS Credentials/0. Confidentiality, Integrity, and Availability.srt |
11 KB |
Pluralsight - Architecting for Security on AWS by Ben Piper/1. Protecting AWS Credentials/1. Course Overview.mp4 |
7.2 MB |
Pluralsight - Architecting for Security on AWS by Ben Piper/1. Protecting AWS Credentials/1. Course Overview.srt |
10 KB |
Pluralsight - Architecting for Security on AWS by Ben Piper/1. Protecting AWS Credentials/10. Summary.mp4 |
4.4 MB |
Pluralsight - Architecting for Security on AWS by Ben Piper/1. Protecting AWS Credentials/10. Summary.srt |
4 KB |
Pluralsight - Architecting for Security on AWS by Ben Piper/1. Protecting AWS Credentials/2. Understanding AWS Credentials.mp4 |
3.3 MB |
Pluralsight - Architecting for Security on AWS by Ben Piper/1. Protecting AWS Credentials/2. Understanding AWS Credentials.srt |
4 KB |
Pluralsight - Architecting for Security on AWS by Ben Piper/1. Protecting AWS Credentials/3. Locking Down the Root User.mp4 |
22.7 MB |
Pluralsight - Architecting for Security on AWS by Ben Piper/1. Protecting AWS Credentials/3. Locking Down the Root User.srt |
12 KB |
Pluralsight - Architecting for Security on AWS by Ben Piper/1. Protecting AWS Credentials/4. Introduction to Principals and Policies.mp4 |
2.5 MB |
Pluralsight - Architecting for Security on AWS by Ben Piper/1. Protecting AWS Credentials/4. Introduction to Principals and Policies.srt |
3 KB |
Pluralsight - Architecting for Security on AWS by Ben Piper/1. Protecting AWS Credentials/5. Understanding Policies.mp4 |
4.4 MB |
Pluralsight - Architecting for Security on AWS by Ben Piper/1. Protecting AWS Credentials/5. Understanding Policies.srt |
6 KB |
Pluralsight - Architecting for Security on AWS by Ben Piper/1. Protecting AWS Credentials/6. Creating an Administrative User.mp4 |
25.3 MB |
Pluralsight - Architecting for Security on AWS by Ben Piper/1. Protecting AWS Credentials/6. Creating an Administrative User.srt |
13 KB |
Pluralsight - Architecting for Security on AWS by Ben Piper/1. Protecting AWS Credentials/7. Using Groups.mp4 |
5.6 MB |
Pluralsight - Architecting for Security on AWS by Ben Piper/1. Protecting AWS Credentials/7. Using Groups.srt |
3 KB |
Pluralsight - Architecting for Security on AWS by Ben Piper/1. Protecting AWS Credentials/8. Denying Access with User Policies.mp4 |
22.1 MB |
Pluralsight - Architecting for Security on AWS by Ben Piper/1. Protecting AWS Credentials/8. Denying Access with User Policies.srt |
15 KB |
Pluralsight - Architecting for Security on AWS by Ben Piper/1. Protecting AWS Credentials/9. Denying Access with Group Policies.mp4 |
9.3 MB |
Pluralsight - Architecting for Security on AWS by Ben Piper/1. Protecting AWS Credentials/9. Denying Access with Group Policies.srt |
5 KB |
Pluralsight - Architecting for Security on AWS by Ben Piper/2. Capturing and Analyzing Logs/0. Introduction to Capturing and Analyzing Logs.mp4 |
2.6 MB |
Pluralsight - Architecting for Security on AWS by Ben Piper/2. Capturing and Analyzing Logs/0. Introduction to Capturing and Analyzing Logs.srt |
3 KB |
Pluralsight - Architecting for Security on AWS by Ben Piper/2. Capturing and Analyzing Logs/1. Understanding CloudTrail.mp4 |
2.9 MB |
Pluralsight - Architecting for Security on AWS by Ben Piper/2. Capturing and Analyzing Logs/1. Understanding CloudTrail.srt |
4 KB |
Pluralsight - Architecting for Security on AWS by Ben Piper/2. Capturing and Analyzing Logs/2. Configuring CloudTrail to Log AWS Service Operations.mp4 |
26.5 MB |
Pluralsight - Architecting for Security on AWS by Ben Piper/2. Capturing and Analyzing Logs/2. Configuring CloudTrail to Log AWS Service Operations.srt |
14 KB |
Pluralsight - Architecting for Security on AWS by Ben Piper/2. Capturing and Analyzing Logs/3. CloudTrail vs. CloudWatch Logs.mp4 |
4.5 MB |
Pluralsight - Architecting for Security on AWS by Ben Piper/2. Capturing and Analyzing Logs/3. CloudTrail vs. CloudWatch Logs.srt |
5 KB |
Pluralsight - Architecting for Security on AWS by Ben Piper/2. Capturing and Analyzing Logs/4. Configuring CloudWatch Logs.mp4 |
24.2 MB |
Pluralsight - Architecting for Security on AWS by Ben Piper/2. Capturing and Analyzing Logs/4. Configuring CloudWatch Logs.srt |
13 KB |
Pluralsight - Architecting for Security on AWS by Ben Piper/2. Capturing and Analyzing Logs/5. Reading CloudTrail Logs Using CloudWatch Logs.mp4 |
15.8 MB |
Pluralsight - Architecting for Security on AWS by Ben Piper/2. Capturing and Analyzing Logs/5. Reading CloudTrail Logs Using CloudWatch Logs.srt |
6 KB |
Pluralsight - Architecting for Security on AWS by Ben Piper/2. Capturing and Analyzing Logs/6. Creating CloudWatch Alarms.mp4 |
28.9 MB |
Pluralsight - Architecting for Security on AWS by Ben Piper/2. Capturing and Analyzing Logs/6. Creating CloudWatch Alarms.srt |
15 KB |
Pluralsight - Architecting for Security on AWS by Ben Piper/2. Capturing and Analyzing Logs/7. Searching Logs with Athena.mp4 |
14.6 MB |
Pluralsight - Architecting for Security on AWS by Ben Piper/2. Capturing and Analyzing Logs/7. Searching Logs with Athena.srt |
9 KB |
Pluralsight - Architecting for Security on AWS by Ben Piper/2. Capturing and Analyzing Logs/8. Tracking Configuration Changes in AWS Config.mp4 |
18.4 MB |
Pluralsight - Architecting for Security on AWS by Ben Piper/2. Capturing and Analyzing Logs/8. Tracking Configuration Changes in AWS Config.srt |
12 KB |
Pluralsight - Architecting for Security on AWS by Ben Piper/2. Capturing and Analyzing Logs/9. Summary.mp4 |
3 MB |
Pluralsight - Architecting for Security on AWS by Ben Piper/2. Capturing and Analyzing Logs/9. Summary.srt |
3 KB |
Pluralsight - Architecting for Security on AWS by Ben Piper/3. Protecting Network and Host-level Boundaries/0. Introduction to Protecting Network and Host-level Boundaries.mp4 |
7.2 MB |
Pluralsight - Architecting for Security on AWS by Ben Piper/3. Protecting Network and Host-level Boundaries/0. Introduction to Protecting Network and Host-level Boundaries.srt |
9 KB |
Pluralsight - Architecting for Security on AWS by Ben Piper/3. Protecting Network and Host-level Boundaries/1. Creating a Public Subnet.mp4 |
16.8 MB |
Pluralsight - Architecting for Security on AWS by Ben Piper/3. Protecting Network and Host-level Boundaries/1. Creating a Public Subnet.srt |
7 KB |
Pluralsight - Architecting for Security on AWS by Ben Piper/3. Protecting Network and Host-level Boundaries/2. Creating and Using an IAM Instance Profile.mp4 |
30.1 MB |
Pluralsight - Architecting for Security on AWS by Ben Piper/3. Protecting Network and Host-level Boundaries/2. Creating and Using an IAM Instance Profile.srt |
13 KB |
Pluralsight - Architecting for Security on AWS by Ben Piper/3. Protecting Network and Host-level Boundaries/3. Using SSH Key Pairs.mp4 |
38.3 MB |
Pluralsight - Architecting for Security on AWS by Ben Piper/3. Protecting Network and Host-level Boundaries/3. Using SSH Key Pairs.srt |
13 KB |
Pluralsight - Architecting for Security on AWS by Ben Piper/3. Protecting Network and Host-level Boundaries/4. Using VPC Endpoints - Part 1.mp4 |
33.8 MB |
Pluralsight - Architecting for Security on AWS by Ben Piper/3. Protecting Network and Host-level Boundaries/4. Using VPC Endpoints - Part 1.srt |
11 KB |
Pluralsight - Architecting for Security on AWS by Ben Piper/3. Protecting Network and Host-level Boundaries/5. Using VPC Endpoints - Part 2.mp4 |
28.6 MB |
Pluralsight - Architecting for Security on AWS by Ben Piper/3. Protecting Network and Host-level Boundaries/5. Using VPC Endpoints - Part 2.srt |
10 KB |
Pluralsight - Architecting for Security on AWS by Ben Piper/3. Protecting Network and Host-level Boundaries/6. Network Access Control Lists.mp4 |
38.4 MB |
Pluralsight - Architecting for Security on AWS by Ben Piper/3. Protecting Network and Host-level Boundaries/6. Network Access Control Lists.srt |
15 KB |
Pluralsight - Architecting for Security on AWS by Ben Piper/3. Protecting Network and Host-level Boundaries/7. Summary.mp4 |
3.1 MB |
Pluralsight - Architecting for Security on AWS by Ben Piper/3. Protecting Network and Host-level Boundaries/7. Summary.srt |
3 KB |
Pluralsight - Architecting for Security on AWS by Ben Piper/4. Protecting Data at Rest/0. Introduction to Protecting Data at Rest.mp4 |
3.6 MB |
Pluralsight - Architecting for Security on AWS by Ben Piper/4. Protecting Data at Rest/0. Introduction to Protecting Data at Rest.srt |
4 KB |
Pluralsight - Architecting for Security on AWS by Ben Piper/4. Protecting Data at Rest/1. Creating a Customer Master Key with KMS.mp4 |
15.7 MB |
Pluralsight - Architecting for Security on AWS by Ben Piper/4. Protecting Data at Rest/1. Creating a Customer Master Key with KMS.srt |
9 KB |
Pluralsight - Architecting for Security on AWS by Ben Piper/4. Protecting Data at Rest/2. Encrypting an Unencrypted EBS Volume.mp4 |
17.7 MB |
Pluralsight - Architecting for Security on AWS by Ben Piper/4. Protecting Data at Rest/2. Encrypting an Unencrypted EBS Volume.srt |
9 KB |
Pluralsight - Architecting for Security on AWS by Ben Piper/4. Protecting Data at Rest/3. S3 Access Permissions - Part 1.mp4 |
17 MB |
Pluralsight - Architecting for Security on AWS by Ben Piper/4. Protecting Data at Rest/3. S3 Access Permissions - Part 1.srt |
11 KB |
Pluralsight - Architecting for Security on AWS by Ben Piper/4. Protecting Data at Rest/4. S3 Access Permissions - Part 2.mp4 |
11.2 MB |
Pluralsight - Architecting for Security on AWS by Ben Piper/4. Protecting Data at Rest/4. S3 Access Permissions - Part 2.srt |
6 KB |
Pluralsight - Architecting for Security on AWS by Ben Piper/4. Protecting Data at Rest/5. CloudFront Origin Access Identity.mp4 |
15.3 MB |
Pluralsight - Architecting for Security on AWS by Ben Piper/4. Protecting Data at Rest/5. CloudFront Origin Access Identity.srt |
9 KB |
Pluralsight - Architecting for Security on AWS by Ben Piper/4. Protecting Data at Rest/6. Granting Anonymous Access with Object ACLs and Bucket Policies.mp4 |
16.9 MB |
Pluralsight - Architecting for Security on AWS by Ben Piper/4. Protecting Data at Rest/6. Granting Anonymous Access with Object ACLs and Bucket Policies.srt |
10 KB |
Pluralsight - Architecting for Security on AWS by Ben Piper/4. Protecting Data at Rest/7. Encrypting S3 Objects with KMS-managed Keys (SSE-KMS).mp4 |
12.3 MB |
Pluralsight - Architecting for Security on AWS by Ben Piper/4. Protecting Data at Rest/7. Encrypting S3 Objects with KMS-managed Keys (SSE-KMS).srt |
7 KB |
Pluralsight - Architecting for Security on AWS by Ben Piper/4. Protecting Data at Rest/8. Summary.mp4 |
4.1 MB |
Pluralsight - Architecting for Security on AWS by Ben Piper/4. Protecting Data at Rest/8. Summary.srt |
4 KB |
Pluralsight - Architecting for Security on AWS by Ben Piper/5. Protecting Data in Transit/0. Introduction to Protecting Data in Transit.mp4 |
9.4 MB |
Pluralsight - Architecting for Security on AWS by Ben Piper/5. Protecting Data in Transit/0. Introduction to Protecting Data in Transit.srt |
10 KB |
Pluralsight - Architecting for Security on AWS by Ben Piper/5. Protecting Data in Transit/1. Preparing for the Load Balancer.mp4 |
22.3 MB |
Pluralsight - Architecting for Security on AWS by Ben Piper/5. Protecting Data in Transit/1. Preparing for the Load Balancer.srt |
11 KB |
Pluralsight - Architecting for Security on AWS by Ben Piper/5. Protecting Data in Transit/2. Creating a Secure Application Load Balancer.mp4 |
24.5 MB |
Pluralsight - Architecting for Security on AWS by Ben Piper/5. Protecting Data in Transit/2. Creating a Secure Application Load Balancer.srt |
12 KB |
Pluralsight - Architecting for Security on AWS by Ben Piper/5. Protecting Data in Transit/3. Summary.mp4 |
3.8 MB |
Pluralsight - Architecting for Security on AWS by Ben Piper/5. Protecting Data in Transit/3. Summary.srt |
4 KB |
Pluralsight - Architecting for Security on AWS by Ben Piper/6. Configuring Data Backup, Replication, and Recovery/0. Introduction to Data Backup, Replication, and Recovery.mp4 |
2.7 MB |
Pluralsight - Architecting for Security on AWS by Ben Piper/6. Configuring Data Backup, Replication, and Recovery/0. Introduction to Data Backup, Replication, and Recovery.srt |
4 KB |
Pluralsight - Architecting for Security on AWS by Ben Piper/6. Configuring Data Backup, Replication, and Recovery/1. Versioning.mp4 |
13.5 MB |
Pluralsight - Architecting for Security on AWS by Ben Piper/6. Configuring Data Backup, Replication, and Recovery/1. Versioning.srt |
8 KB |
Pluralsight - Architecting for Security on AWS by Ben Piper/6. Configuring Data Backup, Replication, and Recovery/2. Lifecycle Management.mp4 |
20.3 MB |
Pluralsight - Architecting for Security on AWS by Ben Piper/6. Configuring Data Backup, Replication, and Recovery/2. Lifecycle Management.srt |
14 KB |
Pluralsight - Architecting for Security on AWS by Ben Piper/6. Configuring Data Backup, Replication, and Recovery/3. Cross-region Replication.mp4 |
11.4 MB |
Pluralsight - Architecting for Security on AWS by Ben Piper/6. Configuring Data Backup, Replication, and Recovery/3. Cross-region Replication.srt |
7 KB |
Pluralsight - Architecting for Security on AWS by Ben Piper/6. Configuring Data Backup, Replication, and Recovery/4. Summary.mp4 |
1.7 MB |
Pluralsight - Architecting for Security on AWS by Ben Piper/6. Configuring Data Backup, Replication, and Recovery/4. Summary.srt |
2 KB |
Pluralsight - Architecting for Security on AWS by Ben Piper/6. Configuring Data Backup, Replication, and Recovery/5. Course Summary.mp4 |
4.6 MB |
Pluralsight - Architecting for Security on AWS by Ben Piper/6. Configuring Data Backup, Replication, and Recovery/5. Course Summary.srt |
6 KB |
Pluralsight - Architecting for Security on AWS by Ben Piper/architecting-security-aws.zip |
4.7 MB |
Pluralsight - Architecting for Security on AWS by Ben Piper/content.txt |
3 KB |