17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
TORRENT DETAILS
Linkedin - AWS Advanced Security Management - Patterns And Practices
TORRENT SUMMARY
Status:
All the torrents in this section have been verified by our verification system
This course is designed for IT professionals who use AWS advanced security services, techniques, and tools. Join instructor Lynn Langit as she explores complex scenarios and shows you how to implement core security tasks and services, such as AWS Identity and Access Management, as well as other AWS tools for protecting data and infrastructure, including Amazon Macie, AWS Key Management Service, AWS Secrets Manager, AWS Detective, AWS Guard Duty, WAF, Shield, and more. By the end of this course, you’ll be equipped with the skills you need to know to identify the right patterns and practices to implement advanced security scenarios.
If You Need More Stuff, kindly Visit and Support Us -->> https://DevCourseWeb.com
Get More Tutorials and Support Us -->> https://CourseWikia.com
We upload these learning materials for the people from all over the world, who have the talent and motivation to sharpen their skills/ knowledge but do not have the financial support to afford the materials. If you like this content and if you are truly in a position that you can actually buy the materials, then Please, we repeat, Please, Support Authors. They Deserve it! Because always remember, without "Them", you and we won't be here having this conversation. Think about it! Peace...
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
~Get Your Files Here !/01 - Introduction/01 - What is your response.mp4
5.3 MB
~Get Your Files Here !/01 - Introduction/01 - What is your response.srt
1.3 KB
~Get Your Files Here !/01 - Introduction/02 - What you should know.mp4
1.3 MB
~Get Your Files Here !/01 - Introduction/02 - What you should know.srt
1.7 KB
~Get Your Files Here !/01 - Introduction/03 - About using cloud services.mp4
2.1 MB
~Get Your Files Here !/01 - Introduction/03 - About using cloud services.srt
2.9 KB
~Get Your Files Here !/02 - 1. Implement Core Security Tasks/01 - Well-architected five security principles.mp4
7.2 MB
~Get Your Files Here !/02 - 1. Implement Core Security Tasks/01 - Well-architected five security principles.srt
5.9 KB
~Get Your Files Here !/02 - 1. Implement Core Security Tasks/02 - IAM root account.mp4
8.2 MB
~Get Your Files Here !/02 - 1. Implement Core Security Tasks/02 - IAM root account.srt
6.3 KB
~Get Your Files Here !/02 - 1. Implement Core Security Tasks/03 - AWS organizations and SCPs.mp4
8.6 MB
~Get Your Files Here !/02 - 1. Implement Core Security Tasks/03 - AWS organizations and SCPs.srt
6.5 KB
~Get Your Files Here !/02 - 1. Implement Core Security Tasks/04 - Object tagging.mp4
6.1 MB
~Get Your Files Here !/02 - 1. Implement Core Security Tasks/04 - Object tagging.srt
4 KB
~Get Your Files Here !/02 - 1. Implement Core Security Tasks/05 - Cost management and billing.mp4
7.3 MB
~Get Your Files Here !/02 - 1. Implement Core Security Tasks/05 - Cost management and billing.srt
5.2 KB
~Get Your Files Here !/02 - 1. Implement Core Security Tasks/06 - Trusted Advisor security alerts.mp4
6.7 MB
~Get Your Files Here !/02 - 1. Implement Core Security Tasks/06 - Trusted Advisor security alerts.srt
4.4 KB
~Get Your Files Here !/03 - 2. Implement Identity and Access Management/01 - IAM users and groups.mp4
15.8 MB
~Get Your Files Here !/03 - 2. Implement Identity and Access Management/01 - IAM users and groups.srt
12.6 KB
~Get Your Files Here !/03 - 2. Implement Identity and Access Management/02 - IAM policies.mp4
11 MB
~Get Your Files Here !/03 - 2. Implement Identity and Access Management/02 - IAM policies.srt
7.2 KB
~Get Your Files Here !/03 - 2. Implement Identity and Access Management/03 - IAM roles.mp4
8.7 MB
~Get Your Files Here !/03 - 2. Implement Identity and Access Management/03 - IAM roles.srt
5.9 KB
~Get Your Files Here !/03 - 2. Implement Identity and Access Management/04 - IAM policy simulator.mp4
6.1 MB
~Get Your Files Here !/03 - 2. Implement Identity and Access Management/04 - IAM policy simulator.srt
4.9 KB
~Get Your Files Here !/03 - 2. Implement Identity and Access Management/05 - IAM Identity Center.mp4
4.4 MB
~Get Your Files Here !/03 - 2. Implement Identity and Access Management/05 - IAM Identity Center.srt
2.5 KB
~Get Your Files Here !/04 - 3. Implement Data Protection/01 - Amazon Macie.mp4
22.3 MB
~Get Your Files Here !/04 - 3. Implement Data Protection/01 - Amazon Macie.srt
14.4 KB
~Get Your Files Here !/04 - 3. Implement Data Protection/02 - AWS Key Management Service.mp4
8 MB
~Get Your Files Here !/04 - 3. Implement Data Protection/02 - AWS Key Management Service.srt
6.1 KB
~Get Your Files Here !/04 - 3. Implement Data Protection/03 - AWS Secrets Manager.mp4
4.8 MB
~Get Your Files Here !/04 - 3. Implement Data Protection/03 - AWS Secrets Manager.srt
3.7 KB
~Get Your Files Here !/04 - 3. Implement Data Protection/04 - Gateway Endpoints for S3.mp4
7.5 MB
~Get Your Files Here !/04 - 3. Implement Data Protection/04 - Gateway Endpoints for S3.srt
6.1 KB
~Get Your Files Here !/04 - 3. Implement Data Protection/05 - AWS Artifact.mp4
4.8 MB
~Get Your Files Here !/04 - 3. Implement Data Protection/05 - AWS Artifact.srt
2.6 KB
~Get Your Files Here !/05 - 4. Implement Infrastructure Protection/01 - AWS Detective.mp4
12.1 MB
~Get Your Files Here !/05 - 4. Implement Infrastructure Protection/01 - AWS Detective.srt
8.1 KB
~Get Your Files Here !/05 - 4. Implement Infrastructure Protection/02 - AWS Guard Duty.mp4
3.8 MB
~Get Your Files Here !/05 - 4. Implement Infrastructure Protection/02 - AWS Guard Duty.srt
2.8 KB
~Get Your Files Here !/05 - 4. Implement Infrastructure Protection/03 - WAF and Shield.mp4
4.6 MB
~Get Your Files Here !/05 - 4. Implement Infrastructure Protection/03 - WAF and Shield.srt
2.9 KB
~Get Your Files Here !/05 - 4. Implement Infrastructure Protection/04 - Security Hub Summary.mp4
8.2 MB
~Get Your Files Here !/05 - 4. Implement Infrastructure Protection/04 - Security Hub Summary.srt
5.2 KB
~Get Your Files Here !/05 - 4. Implement Infrastructure Protection/05 - Security Hub Controls.mp4
6.6 MB
~Get Your Files Here !/05 - 4. Implement Infrastructure Protection/05 - Security Hub Controls.srt
4.6 KB
~Get Your Files Here !/05 - 4. Implement Infrastructure Protection/06 - Security Hub Insights.mp4
4.3 MB
~Get Your Files Here !/05 - 4. Implement Infrastructure Protection/06 - Security Hub Insights.srt
3.5 KB
~Get Your Files Here !/06 - Conclusion/01 - Next steps.mp4
2.7 MB
~Get Your Files Here !/06 - Conclusion/01 - Next steps.srt