TorBT - Torrents and Magnet Links Search Engine

[FreeCourseSite.com] Udemy - AWS Certified Security Specialty 2023 [NEW]

File Name
Size
0. Websites you may like/[CourseClub.Me].url
122 B
0. Websites you may like/[FreeCourseSite.com].url
127 B
0. Websites you may like/[GigaCourse.Com].url
49 B
01 - Getting started with the course/001 Introduction to the Course.mp4
25 MB
01 - Getting started with the course/001 Introduction to the Course_en.srt
16 kB
01 - Getting started with the course/001 Introduction to the Course_vi.srt
19 kB
01 - Getting started with the course/002 Insights into AWS Security Specialty Exam Blueprint.mp4
66 MB
01 - Getting started with the course/002 Insights into AWS Security Specialty Exam Blueprint_en.srt
14 kB
01 - Getting started with the course/002 Insights into AWS Security Specialty Exam Blueprint_vi.srt
17 kB
01 - Getting started with the course/003 Document - Exam Blueprint PDF.html
201 B
01 - Getting started with the course/004 Important Course Resources.mp4
8.8 MB
01 - Getting started with the course/004 Important Course Resources_en.srt
5.1 kB
01 - Getting started with the course/004 Important Course Resources_vi.srt
6.2 kB
01 - Getting started with the course/005 AWS-Security-Specialty-SCS-C02-KPLABS-Central-Notes.pdf
26 MB
01 - Getting started with the course/005 PPT-Notes for Course.html
395 B
01 - Getting started with the course/006 Our Community.html
575 B
02 - Domain 1 - Threat Detection and Incident Response/0. Websites you may like/[CourseClub.Me].url
122 B
02 - Domain 1 - Threat Detection and Incident Response/0. Websites you may like/[FreeCourseSite.com].url
127 B
02 - Domain 1 - Threat Detection and Incident Response/0. Websites you may like/[GigaCourse.Com].url
49 B
02 - Domain 1 - Threat Detection and Incident Response/001 Case Study of Hacked Server.mp4
158 MB
02 - Domain 1 - Threat Detection and Incident Response/001 Case Study of Hacked Server_en.srt
29 kB
02 - Domain 1 - Threat Detection and Incident Response/001 Case Study of Hacked Server_vi.srt
34 kB
02 - Domain 1 - Threat Detection and Incident Response/002 AWS Abuse Reports.mp4
96 MB
02 - Domain 1 - Threat Detection and Incident Response/002 AWS Abuse Reports_en.srt
15 kB
02 - Domain 1 - Threat Detection and Incident Response/002 AWS Abuse Reports_vi.srt
18 kB
02 - Domain 1 - Threat Detection and Incident Response/003 Overview of Amazon GuardDuty.mp4
88 MB
02 - Domain 1 - Threat Detection and Incident Response/003 Overview of Amazon GuardDuty_en.srt
21 kB
02 - Domain 1 - Threat Detection and Incident Response/003 Overview of Amazon GuardDuty_vi.srt
25 kB
02 - Domain 1 - Threat Detection and Incident Response/004 Amazon GuardDuty Practical.mp4
26 MB
02 - Domain 1 - Threat Detection and Incident Response/004 Amazon GuardDuty Practical_en.srt
11 kB
02 - Domain 1 - Threat Detection and Incident Response/004 Amazon GuardDuty Practical_vi.srt
13 kB
02 - Domain 1 - Threat Detection and Incident Response/005 Malware Scan in Amazon GuardDuty.mp4
45 MB
02 - Domain 1 - Threat Detection and Incident Response/005 Malware Scan in Amazon GuardDuty_en.srt
15 kB
02 - Domain 1 - Threat Detection and Incident Response/005 Malware Scan in Amazon GuardDuty_vi.srt
19 kB
02 - Domain 1 - Threat Detection and Incident Response/006 Malware Scanning Practical.mp4
47 MB
02 - Domain 1 - Threat Detection and Incident Response/006 Malware Scanning Practical_en.srt
7.7 kB
02 - Domain 1 - Threat Detection and Incident Response/006 Malware Scanning Practical_vi.srt
9.5 kB
02 - Domain 1 - Threat Detection and Incident Response/007 Whitelisting Alerts in AWS GuardDuty.mp4
50 MB
02 - Domain 1 - Threat Detection and Incident Response/007 Whitelisting Alerts in AWS GuardDuty_en.srt
15 kB
02 - Domain 1 - Threat Detection and Incident Response/007 Whitelisting Alerts in AWS GuardDuty_vi.srt
18 kB
02 - Domain 1 - Threat Detection and Incident Response/008 Document - GuardDuty Alert Lists.html
90 B
02 - Domain 1 - Threat Detection and Incident Response/009 Centralized Dashboards for GuardDuty Findings.mp4
52 MB
02 - Domain 1 - Threat Detection and Incident Response/009 Centralized Dashboards for GuardDuty Findings_en.srt
9.7 kB
02 - Domain 1 - Threat Detection and Incident Response/009 Centralized Dashboards for GuardDuty Findings_vi.srt
12 kB
02 - Domain 1 - Threat Detection and Incident Response/010 Incident Response.mp4
36 MB
02 - Domain 1 - Threat Detection and Incident Response/010 Incident Response_en.srt
9.2 kB
02 - Domain 1 - Threat Detection and Incident Response/010 Incident Response_vi.srt
11 kB
02 - Domain 1 - Threat Detection and Incident Response/011 Scenario - Exposed IAM AccessSecret Keys in GitHub.mp4
82 MB
02 - Domain 1 - Threat Detection and Incident Response/011 Scenario - Exposed IAM AccessSecret Keys in GitHub_en.srt
18 kB
02 - Domain 1 - Threat Detection and Incident Response/011 Scenario - Exposed IAM AccessSecret Keys in GitHub_vi.srt
22 kB
02 - Domain 1 - Threat Detection and Incident Response/012 Document - Deny Based IAM Policy.html
245 B
02 - Domain 1 - Threat Detection and Incident Response/013 Use Case - Dealing with Exposed Access Keys - NEW.mp4
148 MB
02 - Domain 1 - Threat Detection and Incident Response/013 Use Case - Dealing with Exposed Access Keys - NEW_en.srt
28 kB
02 - Domain 1 - Threat Detection and Incident Response/013 Use Case - Dealing with Exposed Access Keys - NEW_vi.srt
34 kB
02 - Domain 1 - Threat Detection and Incident Response/014 Document - Reference Data.html
851 B
02 - Domain 1 - Threat Detection and Incident Response/015 Use Case - Dealing with compromised EC2 Instances.mp4
55 MB
02 - Domain 1 - Threat Detection and Incident Response/015 Use Case - Dealing with compromised EC2 Instances_en.srt
8.1 kB
02 - Domain 1 - Threat Detection and Incident Response/015 Use Case - Dealing with compromised EC2 Instances_vi.srt
9.8 kB
02 - Domain 1 - Threat Detection and Incident Response/016 Amazon Detective.mp4
88 MB
02 - Domain 1 - Threat Detection and Incident Response/016 Amazon Detective_en.srt
15 kB
02 - Domain 1 - Threat Detection and Incident Response/016 Amazon Detective_vi.srt
18 kB
02 - Domain 1 - Threat Detection and Incident Response/017 Incident Response in Cloud.mp4
124 MB
02 - Domain 1 - Threat Detection and Incident Response/017 Incident Response in Cloud_en.srt
18 kB
02 - Domain 1 - Threat Detection and Incident Response/017 Incident Response in Cloud_vi.srt
22 kB
02 - Domain 1 - Threat Detection and Incident Response/018 Penetration Testing in AWS (New).mp4
42 MB
02 - Domain 1 - Threat Detection and Incident Response/018 Penetration Testing in AWS (New)_en.srt
11 kB
02 - Domain 1 - Threat Detection and Incident Response/018 Penetration Testing in AWS (New)_vi.srt
14 kB
03 - Domain 2 -Security Logging and Monitoring/001 Introduction to Vulnerability, Exploit, Payload.mp4
23 MB
03 - Domain 2 -Security Logging and Monitoring/001 Introduction to Vulnerability, Exploit, Payload_en.srt
9.8 kB
03 - Domain 2 -Security Logging and Monitoring/001 Introduction to Vulnerability, Exploit, Payload_vi.srt
12 kB
03 - Domain 2 -Security Logging and Monitoring/002 VEP Practical - Hacking inside a test farm.mp4
166 MB
03 - Domain 2 -Security Logging and Monitoring/002 VEP Practical - Hacking inside a test farm_en.srt
12 kB
03 - Domain 2 -Security Logging and Monitoring/002 VEP Practical - Hacking inside a test farm_vi.srt
14 kB
03 - Domain 2 -Security Logging and Monitoring/003 Overview of Amazon Inspector.mp4
25 MB
03 - Domain 2 -Security Logging and Monitoring/003 Overview of Amazon Inspector_en.srt
9.1 kB
03 - Domain 2 -Security Logging and Monitoring/003 Overview of Amazon Inspector_vi.srt
11 kB
03 - Domain 2 -Security Logging and Monitoring/004 AWS Inspector Vulnerability Scans.mp4
114 MB
03 - Domain 2 -Security Logging and Monitoring/004 AWS Inspector Vulnerability Scans_en.srt
19 kB
03 - Domain 2 -Security Logging and Monitoring/004 AWS Inspector Vulnerability Scans_vi.srt
23 kB
03 - Domain 2 -Security Logging and Monitoring/005 Common Vulnerabilities Exposures _ CVSS - NEW.mp4
103 MB
03 - Domain 2 -Security Logging and Monitoring/005 Common Vulnerabilities Exposures _ CVSS - NEW_en.srt
18 kB
03 - Domain 2 -Security Logging and Monitoring/005 Common Vulnerabilities Exposures _ CVSS - NEW_vi.srt
22 kB
03 - Domain 2 -Security Logging and Monitoring/006 AWS Security Hub.mp4
117 MB
03 - Domain 2 -Security Logging and Monitoring/006 AWS Security Hub_en.srt
16 kB
03 - Domain 2 -Security Logging and Monitoring/006 AWS Security Hub_vi.srt
19 kB
03 - Domain 2 -Security Logging and Monitoring/007 Overview of Layer 7 Firewalls.mp4
91 MB
03 - Domain 2 -Security Logging and Monitoring/007 Overview of Layer 7 Firewalls_en.srt
10 kB
03 - Domain 2 -Security Logging and Monitoring/007 Overview of Layer 7 Firewalls_vi.srt
12 kB
03 - Domain 2 -Security Logging and Monitoring/008 Understanding AWS WAF.mp4
134 MB
03 - Domain 2 -Security Logging and Monitoring/008 Understanding AWS WAF_en.srt
21 kB
03 - Domain 2 -Security Logging and Monitoring/008 Understanding AWS WAF_vi.srt
25 kB
03 - Domain 2 -Security Logging and Monitoring/009 Deploying AWS WAF.mp4
248 MB
03 - Domain 2 -Security Logging and Monitoring/009 Deploying AWS WAF_en.srt
33 kB
03 - Domain 2 -Security Logging and Monitoring/009 Deploying AWS WAF_vi.srt
42 kB
03 - Domain 2 -Security Logging and Monitoring/010 Overview of AWS Systems Manager.mp4
55 MB
03 - Domain 2 -Security Logging and Monitoring/010 Overview of AWS Systems Manager_en.srt
12 kB
03 - Domain 2 -Security Logging and Monitoring/010 Overview of AWS Systems Manager_vi.srt
15 kB
03 - Domain 2 -Security Logging and Monitoring/011 Configure SSM Agent.mp4
79 MB
03 - Domain 2 -Security Logging and Monitoring/011 Configure SSM Agent_en.srt
11 kB
03 - Domain 2 -Security Logging and Monitoring/011 Configure SSM Agent_vi.srt
14 kB
03 - Domain 2 -Security Logging and Monitoring/012 Overview of Sessions Manager.mp4
97 MB
03 - Domain 2 -Security Logging and Monitoring/012 Overview of Sessions Manager_en.srt
18 kB
03 - Domain 2 -Security Logging and Monitoring/012 Overview of Sessions Manager_vi.srt
22 kB
03 - Domain 2 -Security Logging and Monitoring/013 SSM - Run Command.mp4
51 MB
03 - Domain 2 -Security Logging and Monitoring/013 SSM - Run Command_en.srt
13 kB
03 - Domain 2 -Security Logging and Monitoring/013 SSM - Run Command_vi.srt
15 kB
03 - Domain 2 -Security Logging and Monitoring/014 Overview of Patch Manager.mp4
56 MB
03 - Domain 2 -Security Logging and Monitoring/014 Overview of Patch Manager_en.srt
15 kB
03 - Domain 2 -Security Logging and Monitoring/014 Overview of Patch Manager_vi.srt
18 kB
03 - Domain 2 -Security Logging and Monitoring/015 Parameter Store.mp4
36 MB
03 - Domain 2 -Security Logging and Monitoring/015 Parameter Store_en.srt
10 kB
03 - Domain 2 -Security Logging and Monitoring/015 Parameter Store_vi.srt
13 kB
03 - Domain 2 -Security Logging and Monitoring/016 Systems Manager Automation.mp4
115 MB
03 - Domain 2 -Security Logging and Monitoring/016 Systems Manager Automation_en.srt
15 kB
03 - Domain 2 -Security Logging and Monitoring/016 Systems Manager Automation_vi.srt
18 kB
03 - Domain 2 -Security Logging and Monitoring/017 Systems Manager Inventory.mp4
77 MB
03 - Domain 2 -Security Logging and Monitoring/017 Systems Manager Inventory_en.srt
15 kB
03 - Domain 2 -Security Logging and Monitoring/017 Systems Manager Inventory_vi.srt
18 kB
03 - Domain 2 -Security Logging and Monitoring/018 Creating our First Inventory in SSM.mp4
26 MB
03 - Domain 2 -Security Logging and Monitoring/018 Creating our First Inventory in SSM_en.srt
7.5 kB
03 - Domain 2 -Security Logging and Monitoring/018 Creating our First Inventory in SSM_vi.srt
9.5 kB
03 - Domain 2 -Security Logging and Monitoring/019 Overview of Unified CloudWatch Agent.mp4
72 MB
03 - Domain 2 -Security Logging and Monitoring/019 Overview of Unified CloudWatch Agent_en.srt
14 kB
03 - Domain 2 -Security Logging and Monitoring/019 Overview of Unified CloudWatch Agent_vi.srt
18 kB
03 - Domain 2 -Security Logging and Monitoring/020 Unified CloudWatch Agent - Practical.mp4
113 MB
03 - Domain 2 -Security Logging and Monitoring/020 Unified CloudWatch Agent - Practical_en.srt
19 kB
03 - Domain 2 -Security Logging and Monitoring/020 Unified CloudWatch Agent - Practical_vi.srt
23 kB
03 - Domain 2 -Security Logging and Monitoring/021 Document - Unified CloudWatch Agent.html
964 B
03 - Domain 2 -Security Logging and Monitoring/022 CloudWatch Logs Insights.mp4
52 MB
03 - Domain 2 -Security Logging and Monitoring/022 CloudWatch Logs Insights_en.srt
9.8 kB
03 - Domain 2 -Security Logging and Monitoring/022 CloudWatch Logs Insights_vi.srt
12 kB
03 - Domain 2 -Security Logging and Monitoring/023 CloudWatch Metric Filters.mp4
52 MB
03 - Domain 2 -Security Logging and Monitoring/023 CloudWatch Metric Filters_en.srt
11 kB
03 - Domain 2 -Security Logging and Monitoring/023 CloudWatch Metric Filters_vi.srt
14 kB
03 - Domain 2 -Security Logging and Monitoring/024 CloudWatch Subscription Filters.mp4
30 MB
03 - Domain 2 -Security Logging and Monitoring/024 CloudWatch Subscription Filters_en.srt
7.5 kB
03 - Domain 2 -Security Logging and Monitoring/024 CloudWatch Subscription Filters_vi.srt
8.8 kB
03 - Domain 2 -Security Logging and Monitoring/025 Amazon EventBridge.mp4
57 MB
03 - Domain 2 -Security Logging and Monitoring/025 Amazon EventBridge_en.srt
16 kB
03 - Domain 2 -Security Logging and Monitoring/025 Amazon EventBridge_vi.srt
20 kB
03 - Domain 2 -Security Logging and Monitoring/026 Amazon Athena.mp4
62 MB
03 - Domain 2 -Security Logging and Monitoring/026 Amazon Athena_en.srt
8.5 kB
03 - Domain 2 -Security Logging and Monitoring/026 Amazon Athena_vi.srt
10 kB
03 - Domain 2 -Security Logging and Monitoring/027 Revising AWS Config.mp4
117 MB
03 - Domain 2 -Security Logging and Monitoring/027 Revising AWS Config_en.srt
20 kB
03 - Domain 2 -Security Logging and Monitoring/027 Revising AWS Config_vi.srt
24 kB
03 - Domain 2 -Security Logging and Monitoring/028 Revising AWS Config - Practical.mp4
159 MB
03 - Domain 2 -Security Logging and Monitoring/028 Revising AWS Config - Practical_en.srt
24 kB
03 - Domain 2 -Security Logging and Monitoring/028 Revising AWS Config - Practical_vi.srt
30 kB
03 - Domain 2 -Security Logging and Monitoring/029 AWS Config Aggregator.mp4
20 MB
03 - Domain 2 -Security Logging and Monitoring/029 AWS Config Aggregator_en.srt
8.4 kB
03 - Domain 2 -Security Logging and Monitoring/029 AWS Config Aggregator_vi.srt
9.9 kB
03 - Domain 2 -Security Logging and Monitoring/030 Configuring Config Aggregator.mp4
14 MB
03 - Domain 2 -Security Logging and Monitoring/030 Configuring Config Aggregator_en.srt
6.3 kB
03 - Domain 2 -Security Logging and Monitoring/030 Configuring Config Aggregator_vi.srt
7.3 kB
03 - Domain 2 -Security Logging and Monitoring/031 Remediating Non-Compliant Config Rules with SSM Automation.mp4
78 MB
03 - Domain 2 -Security Logging and Monitoring/031 Remediating Non-Compliant Config Rules with SSM Automation_en.srt
17 kB
03 - Domain 2 -Security Logging and Monitoring/031 Remediating Non-Compliant Config Rules with SSM Automation_vi.srt
21 kB
03 - Domain 2 -Security Logging and Monitoring/032 Remediating Non-Compliant Config Rules with SSM Automation - Practical.mp4
60 MB
03 - Domain 2 -Security Logging and Monitoring/032 Remediating Non-Compliant Config Rules with SSM Automation - Practical_en.srt
11 kB
03 - Domain 2 -Security Logging and Monitoring/032 Remediating Non-Compliant Config Rules with SSM Automation - Practical_vi.srt
13 kB
03 - Domain 2 -Security Logging and Monitoring/033 Understanding CloudTrail.mp4
67 MB
03 - Domain 2 -Security Logging and Monitoring/033 Understanding CloudTrail_en.srt
15 kB
03 - Domain 2 -Security Logging and Monitoring/033 Understanding CloudTrail_vi.srt
18 kB
03 - Domain 2 -Security Logging and Monitoring/034 Creating First CloudTrail Trail.mp4
66 MB
03 - Domain 2 -Security Logging and Monitoring/034 Creating First CloudTrail Trail_en.srt
13 kB
03 - Domain 2 -Security Logging and Monitoring/034 Creating First CloudTrail Trail_vi.srt
16 kB
03 - Domain 2 -Security Logging and Monitoring/035 CloudTrail Event Types.mp4
74 MB
03 - Domain 2 -Security Logging and Monitoring/035 CloudTrail Event Types_en.srt
15 kB
03 - Domain 2 -Security Logging and Monitoring/035 CloudTrail Event Types_vi.srt
18 kB
03 - Domain 2 -Security Logging and Monitoring/036 CloudTrail - Log File Integrity Validation.mp4
103 MB
03 - Domain 2 -Security Logging and Monitoring/036 CloudTrail - Log File Integrity Validation_en.srt
12 kB
03 - Domain 2 -Security Logging and Monitoring/036 CloudTrail - Log File Integrity Validation_vi.srt
14 kB
03 - Domain 2 -Security Logging and Monitoring/037 Document - S3 Log File Validation.html
155 B
03 - Domain 2 -Security Logging and Monitoring/038 Digest Delivery Times.mp4
29 MB
03 - Domain 2 -Security Logging and Monitoring/038 Digest Delivery Times_en.srt
4.2 kB
03 - Domain 2 -Security Logging and Monitoring/038 Digest Delivery Times_vi.srt
5.0 kB
03 - Domain 2 -Security Logging and Monitoring/039 Overview of Amazon Macie.mp4
70 MB
03 - Domain 2 -Security Logging and Monitoring/039 Overview of Amazon Macie_en.srt
9.7 kB
03 - Domain 2 -Security Logging and Monitoring/039 Overview of Amazon Macie_vi.srt
12 kB
03 - Domain 2 -Security Logging and Monitoring/040 Detecting Sensitive Files with Macie.mp4
55 MB
03 - Domain 2 -Security Logging and Monitoring/040 Detecting Sensitive Files with Macie_en.srt
15 kB
03 - Domain 2 -Security Logging and Monitoring/040 Detecting Sensitive Files with Macie_vi.srt
18 kB
03 - Domain 2 -Security Logging and Monitoring/040 access-secret-01.txt
62 B
03 - Domain 2 -Security Logging and Monitoring/040 access-secret-02.txt
106 B
03 - Domain 2 -Security Logging and Monitoring/041 S3 Event Notification.mp4
78 MB
03 - Domain 2 -Security Logging and Monitoring/041 S3 Event Notification_en.srt
15 kB
03 - Domain 2 -Security Logging and Monitoring/041 S3 Event Notification_vi.srt
18 kB
03 - Domain 2 -Security Logging and Monitoring/041 event-notification-policy.txt
390 B
03 - Domain 2 -Security Logging and Monitoring/042 Revising VPC Flow Logs.mp4
157 MB
03 - Domain 2 -Security Logging and Monitoring/042 Revising VPC Flow Logs_en.srt
25 kB
03 - Domain 2 -Security Logging and Monitoring/042 Revising VPC Flow Logs_vi.srt
29 kB
03 - Domain 2 -Security Logging and Monitoring/043 VPC Flow Logs In-Detail.mp4
54 MB
03 - Domain 2 -Security Logging and Monitoring/043 VPC Flow Logs In-Detail_en.srt
11 kB
03 - Domain 2 -Security Logging and Monitoring/043 VPC Flow Logs In-Detail_vi.srt
14 kB
03 - Domain 2 -Security Logging and Monitoring/044 Centralized Logging Architecture.mp4
49 MB
03 - Domain 2 -Security Logging and Monitoring/044 Centralized Logging Architecture_en.srt
14 kB
03 - Domain 2 -Security Logging and Monitoring/044 Centralized Logging Architecture_vi.srt
16 kB
03 - Domain 2 -Security Logging and Monitoring/045 Cross-Account Logging for CloudTrail.mp4
99 MB
03 - Domain 2 -Security Logging and Monitoring/045 Cross-Account Logging for CloudTrail_en.srt
9.9 kB
03 - Domain 2 -Security Logging and Monitoring/045 Cross-Account Logging for CloudTrail_vi.srt
12 kB
03 - Domain 2 -Security Logging and Monitoring/046 Document - Centralized Logging Policy.html
913 B
03 - Domain 2 -Security Logging and Monitoring/047 Considerations - S3 Bucket Policy for Cross Account CloudTrail.mp4
40 MB
03 - Domain 2 -Security Logging and Monitoring/047 Considerations - S3 Bucket Policy for Cross Account CloudTrail_en.srt
7.9 kB
03 - Domain 2 -Security Logging and Monitoring/047 Considerations - S3 Bucket Policy for Cross Account CloudTrail_vi.srt
9.7 kB
03 - Domain 2 -Security Logging and Monitoring/048 Document - Conditional S3 Bucket Policy for CloudTrail.html
961 B
03 - Domain 2 -Security Logging and Monitoring/049 AWS SNS.mp4
122 MB
03 - Domain 2 -Security Logging and Monitoring/049 AWS SNS_en.srt
16 kB
03 - Domain 2 -Security Logging and Monitoring/049 AWS SNS_vi.srt
19 kB
03 - Domain 2 -Security Logging and Monitoring/050 Streaming Data _ Amazon Kinesis.mp4
74 MB
03 - Domain 2 -Security Logging and Monitoring/050 Streaming Data _ Amazon Kinesis_en.srt
14 kB
03 - Domain 2 -Security Logging and Monitoring/050 Streaming Data _ Amazon Kinesis_vi.srt
17 kB
03 - Domain 2 -Security Logging and Monitoring/051 Amazon Kinesis Service Offerings.mp4
91 MB
03 - Domain 2 -Security Logging and Monitoring/051 Amazon Kinesis Service Offerings_en.srt
15 kB
03 - Domain 2 -Security Logging and Monitoring/051 Amazon Kinesis Service Offerings_vi.srt
18 kB
03 - Domain 2 -Security Logging and Monitoring/052 Amazon CodeGuru.mp4
56 MB
03 - Domain 2 -Security Logging and Monitoring/052 Amazon CodeGuru_en.srt
17 kB
03 - Domain 2 -Security Logging and Monitoring/052 Amazon CodeGuru_vi.srt
20 kB
04 - Domain 3 - Infrastructure Security/001 VPC Reachability Analyzer.mp4
83 MB
04 - Domain 3 - Infrastructure Security/001 VPC Reachability Analyzer_en.srt
17 kB
04 - Domain 3 - Infrastructure Security/001 VPC Reachability Analyzer_vi.srt
20 kB
04 - Domain 3 - Infrastructure Security/002 Network Access Analyzer.mp4
82 MB
04 - Domain 3 - Infrastructure Security/002 Network Access Analyzer_en.srt
12 kB
04 - Domain 3 - Infrastructure Security/002 Network Access Analyzer_vi.srt
15 kB
04 - Domain 3 - Infrastructure Security/003 VPC Traffic Mirroring.mp4
65 MB
04 - Domain 3 - Infrastructure Security/003 VPC Traffic Mirroring_en.srt
10 kB
04 - Domain 3 - Infrastructure Security/003 VPC Traffic Mirroring_vi.srt
12 kB
04 - Domain 3 - Infrastructure Security/004 VPC Traffic Mirroring Practicals.mp4
155 MB
04 - Domain 3 - Infrastructure Security/004 VPC Traffic Mirroring Practicals_en.srt
24 kB
04 - Domain 3 - Infrastructure Security/004 VPC Traffic Mirroring Practicals_vi.srt
29 kB
04 - Domain 3 - Infrastructure Security/005 Bastion Hosts _ SSH Agent Forwarding.mp4
148 MB
04 - Domain 3 - Infrastructure Security/005 Bastion Hosts _ SSH Agent Forwarding_en.srt
24 kB
04 - Domain 3 - Infrastructure Security/005 Bastion Hosts _ SSH Agent Forwarding_vi.srt
30 kB
04 - Domain 3 - Infrastructure Security/006 Document - Commands for SSH Agent Forwarding.html
829 B
04 - Domain 3 - Infrastructure Security/007 Introduction to Virtual Private Networks.mp4
30 MB
04 - Domain 3 - Infrastructure Security/007 Introduction to Virtual Private Networks_en.srt
9.6 kB
04 - Domain 3 - Infrastructure Security/007 Introduction to Virtual Private Networks_vi.srt
12 kB
04 - Domain 3 - Infrastructure Security/008 Understanding AWS Client VPN Endpoints.mp4
70 MB
04 - Domain 3 - Infrastructure Security/008 Understanding AWS Client VPN Endpoints_en.srt
13 kB
04 - Domain 3 - Infrastructure Security/008 Understanding AWS Client VPN Endpoints_vi.srt
16 kB
04 - Domain 3 - Infrastructure Security/009 Creating Client VPN Endpoints.mp4
244 MB
04 - Domain 3 - Infrastructure Security/009 Creating Client VPN Endpoints_en.srt
37 kB
04 - Domain 3 - Infrastructure Security/009 Creating Client VPN Endpoints_vi.srt
44 kB
04 - Domain 3 - Infrastructure Security/010 Document - Commands to Setup ClientVPN Endpoint.html
1.6 kB
04 - Domain 3 - Infrastructure Security/011 Overview of AWS VPN Tunnels.mp4
26 MB
04 - Domain 3 - Infrastructure Security/011 Overview of AWS VPN Tunnels_en.srt
12 kB
04 - Domain 3 - Infrastructure Security/011 Overview of AWS VPN Tunnels_vi.srt
14 kB
04 - Domain 3 - Infrastructure Security/012 VPC Peering.mp4
67 MB
04 - Domain 3 - Infrastructure Security/012 VPC Peering_en.srt
12 kB
04 - Domain 3 - Infrastructure Security/012 VPC Peering_vi.srt
14 kB
04 - Domain 3 - Infrastructure Security/013 Overview of VPC Endpoints.mp4
64 MB
04 - Domain 3 - Infrastructure Security/013 Overview of VPC Endpoints_en.srt
14 kB
04 - Domain 3 - Infrastructure Security/013 Overview of VPC Endpoints_vi.srt
16 kB
04 - Domain 3 - Infrastructure Security/014 Implementing Gateway VPC Endpoints.mp4
146 MB
04 - Domain 3 - Infrastructure Security/014 Implementing Gateway VPC Endpoints_en.srt
27 kB
04 - Domain 3 - Infrastructure Security/014 Implementing Gateway VPC Endpoints_vi.srt
32 kB
04 - Domain 3 - Infrastructure Security/015 VPC Endpoint Policies.mp4
58 MB
04 - Domain 3 - Infrastructure Security/015 VPC Endpoint Policies_en.srt
11 kB
04 - Domain 3 - Infrastructure Security/015 VPC Endpoint Policies_vi.srt
13 kB
04 - Domain 3 - Infrastructure Security/016 Overview of Interface VPC Endpoints.mp4
112 MB
04 - Domain 3 - Infrastructure Security/016 Overview of Interface VPC Endpoints_en.srt
16 kB
04 - Domain 3 - Infrastructure Security/016 Overview of Interface VPC Endpoints_vi.srt
19 kB
04 - Domain 3 - Infrastructure Security/017 Implementing Interface Endpoints.mp4
74 MB
04 - Domain 3 - Infrastructure Security/017 Implementing Interface Endpoints_en.srt
12 kB
04 - Domain 3 - Infrastructure Security/017 Implementing Interface Endpoints_vi.srt
15 kB
04 - Domain 3 - Infrastructure Security/018 Overview of VPC Endpoint Services.mp4
77 MB
04 - Domain 3 - Infrastructure Security/018 Overview of VPC Endpoint Services_en.srt
12 kB
04 - Domain 3 - Infrastructure Security/018 Overview of VPC Endpoint Services_vi.srt
15 kB
04 - Domain 3 - Infrastructure Security/019 Overview of Transit Gateways.mp4
22 MB
04 - Domain 3 - Infrastructure Security/019 Overview of Transit Gateways_en.srt
10 kB
04 - Domain 3 - Infrastructure Security/019 Overview of Transit Gateways_vi.srt
12 kB
04 - Domain 3 - Infrastructure Security/020 Base Transit Gateway Concepts.mp4
20 MB
04 - Domain 3 - Infrastructure Security/020 Base Transit Gateway Concepts_en.srt
5.9 kB
04 - Domain 3 - Infrastructure Security/020 Base Transit Gateway Concepts_vi.srt
7.0 kB
04 - Domain 3 - Infrastructure Security/021 Transit Gateway Practical.mp4
43 MB
04 - Domain 3 - Infrastructure Security/021 Transit Gateway Practical_en.srt
15 kB
04 - Domain 3 - Infrastructure Security/021 Transit Gateway Practical_vi.srt
17 kB
04 - Domain 3 - Infrastructure Security/022 Understanding Direct Connect.mp4
103 MB
04 - Domain 3 - Infrastructure Security/022 Understanding Direct Connect_en.srt
17 kB
04 - Domain 3 - Infrastructure Security/023 MAC Security.mp4
18 MB
04 - Domain 3 - Infrastructure Security/023 MAC Security_en.srt
4.2 kB
04 - Domain 3 - Infrastructure Security/024 Network ACLs.mp4
105 MB
04 - Domain 3 - Infrastructure Security/024 Network ACLs_en.srt
17 kB
04 - Domain 3 - Infrastructure Security/024 Network ACLs_vi.srt
20 kB
04 - Domain 3 - Infrastructure Security/025 NACL - Rule Ordering.mp4
102 MB
04 - Domain 3 - Infrastructure Security/025 NACL - Rule Ordering_en.srt
21 kB
04 - Domain 3 - Infrastructure Security/025 NACL - Rule Ordering_vi.srt
26 kB
04 - Domain 3 - Infrastructure Security/026 Understanding Stateful vs Stateless Firewalls.mp4
98 MB
04 - Domain 3 - Infrastructure Security/026 Understanding Stateful vs Stateless Firewalls_en.srt
20 kB
04 - Domain 3 - Infrastructure Security/026 Understanding Stateful vs Stateless Firewalls_vi.srt
24 kB
04 - Domain 3 - Infrastructure Security/027 IDS IPS in AWS.mp4
57 MB
04 - Domain 3 - Infrastructure Security/027 IDS IPS in AWS_en.srt
11 kB
04 - Domain 3 - Infrastructure Security/027 IDS IPS in AWS_vi.srt
12 kB
04 - Domain 3 - Infrastructure Security/028 Understanding the Content Delivery Networks.mp4
82 MB
04 - Domain 3 - Infrastructure Security/028 Understanding the Content Delivery Networks_en.srt
14 kB
04 - Domain 3 - Infrastructure Security/028 Understanding the Content Delivery Networks_vi.srt
18 kB
04 - Domain 3 - Infrastructure Security/029 Demo - CloudFront Distribution.mp4
133 MB
04 - Domain 3 - Infrastructure Security/029 Demo - CloudFront Distribution_en.srt
12 kB
04 - Domain 3 - Infrastructure Security/029 Demo - CloudFront Distribution_vi.srt
15 kB
04 - Domain 3 - Infrastructure Security/030 Understanding Edge Locations.mp4
138 MB
04 - Domain 3 - Infrastructure Security/030 Understanding Edge Locations_en.srt
11 kB
04 - Domain 3 - Infrastructure Security/030 Understanding Edge Locations_vi.srt
14 kB
04 - Domain 3 - Infrastructure Security/031 Deploying CloudFront Distribution.mp4
90 MB
04 - Domain 3 - Infrastructure Security/031 Deploying CloudFront Distribution_en.srt
16 kB
04 - Domain 3 - Infrastructure Security/031 Deploying CloudFront Distribution_vi.srt
19 kB
04 - Domain 3 - Infrastructure Security/031 index.html
282 B
04 - Domain 3 - Infrastructure Security/032 Overview of Origin Access Identity.mp4
24 MB
04 - Domain 3 - Infrastructure Security/032 Overview of Origin Access Identity_en.srt
6.1 kB
04 - Domain 3 - Infrastructure Security/032 Overview of Origin Access Identity_vi.srt
7.0 kB
04 - Domain 3 - Infrastructure Security/033 Implementing OAC in CloudFront.mp4
21 MB
04 - Domain 3 - Infrastructure Security/033 Implementing OAC in CloudFront_en.srt
7.5 kB
04 - Domain 3 - Infrastructure Security/033 Implementing OAC in CloudFront_vi.srt
9.3 kB
04 - Domain 3 - Infrastructure Security/033 oai.html
277 B
04 - Domain 3 - Infrastructure Security/034 Document - S3 Policy for OAC.html
671 B
04 - Domain 3 - Infrastructure Security/035 Overview of CloudFront Signed URLs.mp4
68 MB
04 - Domain 3 - Infrastructure Security/035 Overview of CloudFront Signed URLs_en.srt
11 kB
04 - Domain 3 - Infrastructure Security/035 Overview of CloudFront Signed URLs_vi.srt
13 kB
04 - Domain 3 - Infrastructure Security/036 Implementing CloudFront Signed URLs.mp4
120 MB
04 - Domain 3 - Infrastructure Security/036 Implementing CloudFront Signed URLs_en.srt
16 kB
04 - Domain 3 - Infrastructure Security/036 Implementing CloudFront Signed URLs_vi.srt
20 kB
04 - Domain 3 - Infrastructure Security/037 Field Level Encryption in CloudFront.mp4
123 MB
04 - Domain 3 - Infrastructure Security/037 Field Level Encryption in CloudFront_en.srt
20 kB
04 - Domain 3 - Infrastructure Security/037 Field Level Encryption in CloudFront_vi.srt
24 kB
04 - Domain 3 - Infrastructure Security/038 Real World example on DOS Implementation.mp4
133 MB
04 - Domain 3 - Infrastructure Security/038 Real World example on DOS Implementation_en.srt
12 kB
04 - Domain 3 - Infrastructure Security/038 Real World example on DOS Implementation_vi.srt
14 kB
04 - Domain 3 - Infrastructure Security/039 AWS Shield.mp4
47 MB
04 - Domain 3 - Infrastructure Security/039 AWS Shield_en.srt
6.6 kB
04 - Domain 3 - Infrastructure Security/039 AWS Shield_vi.srt
7.8 kB
04 - Domain 3 - Infrastructure Security/040 Mitigating DDOS Attacks.mp4
17 MB
04 - Domain 3 - Infrastructure Security/040 Mitigating DDOS Attacks_en.srt
7.9 kB
04 - Domain 3 - Infrastructure Security/040 Mitigating DDOS Attacks_vi.srt
9.5 kB
04 - Domain 3 - Infrastructure Security/041 Document - DDoS References.html
50 B
04 - Domain 3 - Infrastructure Security/042 Revising the Basics of API.mp4
61 MB
04 - Domain 3 - Infrastructure Security/042 Revising the Basics of API_en.srt
12 kB
04 - Domain 3 - Infrastructure Security/042 Revising the Basics of API_vi.srt
14 kB
04 - Domain 3 - Infrastructure Security/043 Introduction to API Gateway.mp4
38 MB
04 - Domain 3 - Infrastructure Security/043 Introduction to API Gateway_en.srt
9.1 kB
04 - Domain 3 - Infrastructure Security/043 Introduction to API Gateway_vi.srt
11 kB
04 - Domain 3 - Infrastructure Security/044 REST APIs vs HTTP APIs.mp4
16 MB
04 - Domain 3 - Infrastructure Security/044 REST APIs vs HTTP APIs_en.srt
6.6 kB
04 - Domain 3 - Infrastructure Security/044 REST APIs vs HTTP APIs_vi.srt
7.6 kB
04 - Domain 3 - Infrastructure Security/045 Creating HTTP API.mp4
6.8 MB
04 - Domain 3 - Infrastructure Security/045 Creating HTTP API_en.srt
3.0 kB
04 - Domain 3 - Infrastructure Security/045 Creating HTTP API_vi.srt
3.6 kB
04 - Domain 3 - Infrastructure Security/046 Creating REST APIs.mp4
14 MB
04 - Domain 3 - Infrastructure Security/046 Creating REST APIs_en.srt
4.7 kB
04 - Domain 3 - Infrastructure Security/046 Creating REST APIs_vi.srt
5.4 kB
04 - Domain 3 - Infrastructure Security/047 API Keys and Usage Plans.mp4
21 MB
04 - Domain 3 - Infrastructure Security/047 API Keys and Usage Plans_en.srt
12 kB
04 - Domain 3 - Infrastructure Security/047 API Keys and Usage Plans_vi.srt
14 kB
04 - Domain 3 - Infrastructure Security/048 Lambda _ S3.mp4
47 MB
04 - Domain 3 - Infrastructure Security/048 Lambda _ S3_en.srt
9.3 kB
04 - Domain 3 - Infrastructure Security/048 Lambda _ S3_vi.srt
11 kB
04 - Domain 3 - Infrastructure Security/049 EC2 Key-Pair Troubleshooting.mp4
80 MB
04 - Domain 3 - Infrastructure Security/049 EC2 Key-Pair Troubleshooting_en.srt
15 kB
04 - Domain 3 - Infrastructure Security/049 EC2 Key-Pair Troubleshooting_vi.srt
18 kB
04 - Domain 3 - Infrastructure Security/050 EC2 Tenancy Attribute.mp4
77 MB
04 - Domain 3 - Infrastructure Security/050 EC2 Tenancy Attribute_en.srt
9.3 kB
04 - Domain 3 - Infrastructure Security/050 EC2 Tenancy Attribute_vi.srt
11 kB
04 - Domain 3 - Infrastructure Security/051 AWS Artifact.mp4
53 MB
04 - Domain 3 - Infrastructure Security/051 AWS Artifact_en.srt
5.1 kB
04 - Domain 3 - Infrastructure Security/051 AWS Artifact_vi.srt
6.0 kB
04 - Domain 3 - Infrastructure Security/052 [email protected]
110 MB
04 - Domain 3 - Infrastructure Security/052 Lambda@Edge_en.srt
18 kB
04 - Domain 3 - Infrastructure Security/052 Lambda@Edge_vi.srt
22 kB
04 - Domain 3 - Infrastructure Security/053 Lambda@Edge Demo.mp4
83 MB
04 - Domain 3 - Infrastructure Security/053 Lambda@Edge Demo_en.srt
9.7 kB
04 - Domain 3 - Infrastructure Security/053 Lambda@Edge Demo_vi.srt
12 kB
04 - Domain 3 - Infrastructure Security/054 DNS Attributes in VPC.mp4
75 MB
04 - Domain 3 - Infrastructure Security/054 DNS Attributes in VPC_en.srt
11 kB
04 - Domain 3 - Infrastructure Security/054 DNS Attributes in VPC_vi.srt
13 kB
04 - Domain 3 - Infrastructure Security/055 DNS Query Logging.mp4
113 MB
04 - Domain 3 - Infrastructure Security/055 DNS Query Logging_en.srt
17 kB
04 - Domain 3 - Infrastructure Security/055 DNS Query Logging_vi.srt
21 kB
04 - Domain 3 - Infrastructure Security/056 Implementing Route53 Query Logging.mp4
56 MB
04 - Domain 3 - Infrastructure Security/056 Implementing Route53 Query Logging_en.srt
7.9 kB
04 - Domain 3 - Infrastructure Security/056 Implementing Route53 Query Logging_vi.srt
9.6 kB
04 - Domain 3 - Infrastructure Security/057 Overview of Network Firewall.mp4
100 MB
04 - Domain 3 - Infrastructure Security/057 Overview of Network Firewall_en.srt
16 kB
04 - Domain 3 - Infrastructure Security/057 Overview of Network Firewall_vi.srt
19 kB
04 - Domain 3 - Infrastructure Security/058 Important Note - Billing.html
148 B
04 - Domain 3 - Infrastructure Security/059 Deploying Network Firewall.mp4
220 MB
04 - Domain 3 - Infrastructure Security/059 Deploying Network Firewall_en.srt
40 kB
04 - Domain 3 - Infrastructure Security/059 Deploying Network Firewall_vi.srt
48 kB
04 - Domain 3 - Infrastructure Security/060 Elastic Network Interface.mp4
109 MB
04 - Domain 3 - Infrastructure Security/060 Elastic Network Interface_en.srt
19 kB
04 - Domain 3 - Infrastructure Security/060 Elastic Network Interface_vi.srt
22 kB
04 - Domain 3 - Infrastructure Security/061 Bring Your Own IP.mp4
22 MB
04 - Domain 3 - Infrastructure Security/061 Bring Your Own IP_en.srt
10 kB
04 - Domain 3 - Infrastructure Security/061 Bring Your Own IP_vi.srt
12 kB
04 - Domain 3 - Infrastructure Security/062 AWS SES.mp4
35 MB
04 - Domain 3 - Infrastructure Security/062 AWS SES_en.srt
8.4 kB
04 - Domain 3 - Infrastructure Security/062 AWS SES_vi.srt
10 kB
04 - Domain 3 - Infrastructure Security/063 Sending Email through SES.mp4
28 MB
04 - Domain 3 - Infrastructure Security/063 Sending Email through SES_en.srt
5.5 kB
04 - Domain 3 - Infrastructure Security/063 Sending Email through SES_vi.srt
6.6 kB
04 - Domain 3 - Infrastructure Security/064 Types of SES Credentials.mp4
10 MB
04 - Domain 3 - Infrastructure Security/064 Types of SES Credentials_en.srt
5.3 kB
04 - Domain 3 - Infrastructure Security/064 Types of SES Credentials_vi.srt
6.3 kB
04 - Domain 3 - Infrastructure Security/065 SES SMTP Endpoint.mp4
17 MB
04 - Domain 3 - Infrastructure Security/065 SES SMTP Endpoint_en.srt
5.5 kB
04 - Domain 3 - Infrastructure Security/065 SES SMTP Endpoint_vi.srt
6.2 kB
04 - Domain 3 - Infrastructure Security/066 Overview of EC2 Image Builder.mp4
110 MB
04 - Domain 3 - Infrastructure Security/066 Overview of EC2 Image Builder_en.srt
25 kB
04 - Domain 3 - Infrastructure Security/066 Overview of EC2 Image Builder_vi.srt
30 kB
04 - Domain 3 - Infrastructure Security/067 Building Image Pipeline with EC2 Image Builder.mp4
126 MB
04 - Domain 3 - Infrastructure Security/067 Building Image Pipeline with EC2 Image Builder_en.srt
19 kB
04 - Domain 3 - Infrastructure Security/067 Building Image Pipeline with EC2 Image Builder_vi.srt
24 kB
05 - Domain 4 - Identity and Access Management/001 Overview of AWS Organizations.mp4
70 MB
05 - Domain 4 - Identity and Access Management/001 Overview of AWS Organizations_en.srt
13 kB
05 - Domain 4 - Identity and Access Management/001 Overview of AWS Organizations_vi.srt
16 kB
05 - Domain 4 - Identity and Access Management/002 Creating our first AWS Organization _ SCP.mp4
65 MB
05 - Domain 4 - Identity and Access Management/002 Creating our first AWS Organization _ SCP_en.srt
10 kB
05 - Domain 4 - Identity and Access Management/002 Creating our first AWS Organization _ SCP_vi.srt
13 kB
05 - Domain 4 - Identity and Access Management/003 Organizational Unit (OU) in AWS organization.mp4
33 MB
05 - Domain 4 - Identity and Access Management/003 Organizational Unit (OU) in AWS organization_en.srt
10 kB
05 - Domain 4 - Identity and Access Management/003 Organizational Unit (OU) in AWS organization_vi.srt
13 kB
05 - Domain 4 - Identity and Access Management/004 Strategies for using SCPs.mp4
53 MB
05 - Domain 4 - Identity and Access Management/004 Strategies for using SCPs_en.srt
15 kB
05 - Domain 4 - Identity and Access Management/004 Strategies for using SCPs_vi.srt
18 kB
05 - Domain 4 - Identity and Access Management/005 Switching from Deny List to Allow List SCPs.mp4
22 MB
05 - Domain 4 - Identity and Access Management/005 Switching from Deny List to Allow List SCPs_en.srt
7.4 kB
05 - Domain 4 - Identity and Access Management/005 Switching from Deny List to Allow List SCPs_vi.srt
9.0 kB
05 - Domain 4 - Identity and Access Management/006 Document - SCP AllowList Policy.html
283 B
05 - Domain 4 - Identity and Access Management/007 IAM Policy Evaluation Logic.mp4
79 MB
05 - Domain 4 - Identity and Access Management/007 IAM Policy Evaluation Logic_en.srt
16 kB
05 - Domain 4 - Identity and Access Management/007 IAM Policy Evaluation Logic_vi.srt
20 kB
05 - Domain 4 - Identity and Access Management/008 Identity and Resource Based Policies.mp4
39 MB
05 - Domain 4 - Identity and Access Management/008 Identity and Resource Based Policies_en.srt
13 kB
05 - Domain 4 - Identity and Access Management/008 Identity and Resource Based Policies_vi.srt
16 kB
05 - Domain 4 - Identity and Access Management/009 Understanding IAM Policies.mp4
93 MB
05 - Domain 4 - Identity and Access Management/009 Understanding IAM Policies_en.srt
21 kB
05 - Domain 4 - Identity and Access Management/009 Understanding IAM Policies_vi.srt
25 kB
05 - Domain 4 - Identity and Access Management/010 IAM Policies - Part 02.mp4
235 MB
05 - Domain 4 - Identity and Access Management/010 IAM Policies - Part 02_en.srt
16 kB
05 - Domain 4 - Identity and Access Management/010 IAM Policies - Part 02_vi.srt
20 kB
05 - Domain 4 - Identity and Access Management/011 Identity Account Architecture.mp4
91 MB
05 - Domain 4 - Identity and Access Management/011 Identity Account Architecture_en.srt
18 kB
05 - Domain 4 - Identity and Access Management/011 Identity Account Architecture_vi.srt
21 kB
05 - Domain 4 - Identity and Access Management/012 Creating Cross-Account IAM Roles.mp4
95 MB
05 - Domain 4 - Identity and Access Management/012 Creating Cross-Account IAM Roles_en.srt
15 kB
05 - Domain 4 - Identity and Access Management/012 Creating Cross-Account IAM Roles_vi.srt
18 kB
05 - Domain 4 - Identity and Access Management/013 Cross Account IAM Policy Document.html
266 B
05 - Domain 4 - Identity and Access Management/014 External ID in Delegation.mp4
126 MB
05 - Domain 4 - Identity and Access Management/014 External ID in Delegation_en.srt
14 kB
05 - Domain 4 - Identity and Access Management/014 External ID in Delegation_vi.srt
17 kB
05 - Domain 4 - Identity and Access Management/015 EC2 Instance Meta-Data.mp4
95 MB
05 - Domain 4 - Identity and Access Management/015 EC2 Instance Meta-Data_en.srt
12 kB
05 - Domain 4 - Identity and Access Management/015 EC2 Instance Meta-Data_vi.srt
15 kB
05 - Domain 4 - Identity and Access Management/016 Revising IAM Role.mp4
95 MB
05 - Domain 4 - Identity and Access Management/016 Revising IAM Role_en.srt
12 kB
05 - Domain 4 - Identity and Access Management/016 Revising IAM Role_vi.srt
15 kB
05 - Domain 4 - Identity and Access Management/017 Understanding working of an IAM role.mp4
56 MB
05 - Domain 4 - Identity and Access Management/017 Understanding working of an IAM role_en.srt
7.4 kB
05 - Domain 4 - Identity and Access Management/017 Understanding working of an IAM role_vi.srt
8.7 kB
05 - Domain 4 - Identity and Access Management/018 IPTABLES _ Instance Meta-Data.mp4
57 MB
05 - Domain 4 - Identity and Access Management/018 IPTABLES _ Instance Meta-Data_en.srt
9.7 kB
05 - Domain 4 - Identity and Access Management/018 IPTABLES _ Instance Meta-Data_vi.srt
12 kB
05 - Domain 4 - Identity and Access Management/019 Document - Commands.html
297 B
05 - Domain 4 - Identity and Access Management/020 IAM - Version Element.mp4
147 MB
05 - Domain 4 - Identity and Access Management/020 IAM - Version Element_en.srt
16 kB
05 - Domain 4 - Identity and Access Management/020 IAM - Version Element_vi.srt
20 kB
05 - Domain 4 - Identity and Access Management/021 IAM Policy Variables.mp4
36 MB
05 - Domain 4 - Identity and Access Management/021 IAM Policy Variables_en.srt
7.4 kB
05 - Domain 4 - Identity and Access Management/021 IAM Policy Variables_vi.srt
9.0 kB
05 - Domain 4 - Identity and Access Management/022 Document - IAM Policy Variable.html
358 B
05 - Domain 4 - Identity and Access Management/023 Principal and NotPrincipal Element.mp4
68 MB
05 - Domain 4 - Identity and Access Management/023 Principal and NotPrincipal Element_en.srt
12 kB
05 - Domain 4 - Identity and Access Management/023 Principal and NotPrincipal Element_vi.srt
15 kB
05 - Domain 4 - Identity and Access Management/024 Document - Resource Policy for Principal Element.html
476 B
05 - Domain 4 - Identity and Access Management/025 Implementing NotPrincipal Element.mp4
40 MB
05 - Domain 4 - Identity and Access Management/025 Implementing NotPrincipal Element_en.srt
6.2 kB
05 - Domain 4 - Identity and Access Management/025 Implementing NotPrincipal Element_vi.srt
7.5 kB
05 - Domain 4 - Identity and Access Management/026 Document - NotPrincipal S3 Bucket Policy.html
383 B
05 - Domain 4 - Identity and Access Management/027 Conditionl Element.mp4
101 MB
05 - Domain 4 - Identity and Access Management/027 Conditionl Element_en.srt
12 kB
05 - Domain 4 - Identity and Access Management/027 Conditionl Element_vi.srt
15 kB
05 - Domain 4 - Identity and Access Management/028 Document - Condition Policy Examples.html
321 B
05 - Domain 4 - Identity and Access Management/029 AWS Security Token Service.mp4
181 MB
05 - Domain 4 - Identity and Access Management/029 AWS Security Token Service_en.srt
28 kB
05 - Domain 4 - Identity and Access Management/029 AWS Security Token Service_vi.srt
34 kB
05 - Domain 4 - Identity and Access Management/030 Federation.mp4
98 MB
05 - Domain 4 - Identity and Access Management/030 Federation_en.srt
23 kB
05 - Domain 4 - Identity and Access Management/030 Federation_vi.srt
28 kB
05 - Domain 4 - Identity and Access Management/031 Understanding SAML for SSO.mp4
134 MB
05 - Domain 4 - Identity and Access Management/031 Understanding SAML for SSO_en.srt
18 kB
05 - Domain 4 - Identity and Access Management/031 Understanding SAML for SSO_vi.srt
22 kB
05 - Domain 4 - Identity and Access Management/032 Understanding Active Directory.mp4
17 MB
05 - Domain 4 - Identity and Access Management/032 Understanding Active Directory_en.srt
7.4 kB
05 - Domain 4 - Identity and Access Management/032 Understanding Active Directory_vi.srt
8.6 kB
05 - Domain 4 - Identity and Access Management/033 Introduction to AWS Directory Service.mp4
97 MB
05 - Domain 4 - Identity and Access Management/033 Introduction to AWS Directory Service_en.srt
15 kB
05 - Domain 4 - Identity and Access Management/033 Introduction to AWS Directory Service_vi.srt
17 kB
05 - Domain 4 - Identity and Access Management/034 Trusts in Active Directory.mp4
28 MB
05 - Domain 4 - Identity and Access Management/034 Trusts in Active Directory_en.srt
13 kB
05 - Domain 4 - Identity and Access Management/034 Trusts in Active Directory_vi.srt
16 kB
05 - Domain 4 - Identity and Access Management/035 Overview of IAM Identity Center.mp4
60 MB
05 - Domain 4 - Identity and Access Management/035 Overview of IAM Identity Center_en.srt
18 kB
05 - Domain 4 - Identity and Access Management/035 Overview of IAM Identity Center_vi.srt
22 kB
05 - Domain 4 - Identity and Access Management/036 IAM Identity Center Concepts.mp4
22 MB
05 - Domain 4 - Identity and Access Management/036 IAM Identity Center Concepts_en.srt
8.2 kB
05 - Domain 4 - Identity and Access Management/036 IAM Identity Center Concepts_vi.srt
9.7 kB
05 - Domain 4 - Identity and Access Management/037 IAM Identity Center Practicals.mp4
26 MB
05 - Domain 4 - Identity and Access Management/037 IAM Identity Center Practicals_en.srt
9.3 kB
05 - Domain 4 - Identity and Access Management/037 IAM Identity Center Practicals_vi.srt
11 kB
05 - Domain 4 - Identity and Access Management/038 Amazon Cognito.mp4
81 MB
05 - Domain 4 - Identity and Access Management/038 Amazon Cognito_en.srt
13 kB
05 - Domain 4 - Identity and Access Management/038 Amazon Cognito_vi.srt
15 kB
05 - Domain 4 - Identity and Access Management/039 S3 Bucket Policies.mp4
155 MB
05 - Domain 4 - Identity and Access Management/039 S3 Bucket Policies_en.srt
22 kB
05 - Domain 4 - Identity and Access Management/039 S3 Bucket Policies_vi.srt
28 kB
05 - Domain 4 - Identity and Access Management/040 Bucket Policy Document.html
835 B
05 - Domain 4 - Identity and Access Management/041 Regaining Access to Locked S3 Bucket.mp4
46 MB
05 - Domain 4 - Identity and Access Management/041 Regaining Access to Locked S3 Bucket_en.srt
9.5 kB
05 - Domain 4 - Identity and Access Management/041 Regaining Access to Locked S3 Bucket_vi.srt
12 kB
05 - Domain 4 - Identity and Access Management/042 Bucket Policy Document - Deny Statements.html
510 B
05 - Domain 4 - Identity and Access Management/043 Cross Account S3 Bucket Configuration.mp4
71 MB
05 - Domain 4 - Identity and Access Management/043 Cross Account S3 Bucket Configuration_en.srt
22 kB
05 - Domain 4 - Identity and Access Management/043 Cross Account S3 Bucket Configuration_vi.srt
27 kB
05 - Domain 4 - Identity and Access Management/044 Document - Cross Account S3 Bucket Policy.html
1.1 kB
05 - Domain 4 - Identity and Access Management/045 Canned ACLs.mp4
90 MB
05 - Domain 4 - Identity and Access Management/045 Canned ACLs_en.srt
14 kB
05 - Domain 4 - Identity and Access Management/045 Canned ACLs_vi.srt
18 kB
05 - Domain 4 - Identity and Access Management/046 Document - Canned ACLs Commands.html
305 B
05 - Domain 4 - Identity and Access Management/047 Understanding Presigned URLs.mp4
55 MB
05 - Domain 4 - Identity and Access Management/047 Understanding Presigned URLs_en.srt
15 kB
05 - Domain 4 - Identity and Access Management/047 Understanding Presigned URLs_vi.srt
18 kB
05 - Domain 4 - Identity and Access Management/048 S3 Versioning.mp4
90 MB
05 - Domain 4 - Identity and Access Management/048 S3 Versioning_en.srt
18 kB
05 - Domain 4 - Identity and Access Management/048 S3 Versioning_vi.srt
21 kB
05 - Domain 4 - Identity and Access Management/049 S3 Batch Operations.mp4
61 MB
05 - Domain 4 - Identity and Access Management/049 S3 Batch Operations_en.srt
11 kB
05 - Domain 4 - Identity and Access Management/049 S3 Batch Operations_vi.srt
13 kB
05 - Domain 4 - Identity and Access Management/050 S3 - Cross Region Replication.mp4
27 MB
05 - Domain 4 - Identity and Access Management/050 S3 - Cross Region Replication_en.srt
7.4 kB
05 - Domain 4 - Identity and Access Management/050 S3 - Cross Region Replication_vi.srt
8.8 kB
05 - Domain 4 - Identity and Access Management/051 S3 Object Lock.mp4
49 MB
05 - Domain 4 - Identity and Access Management/051 S3 Object Lock_en.srt
16 kB
05 - Domain 4 - Identity and Access Management/051 S3 Object Lock_vi.srt
20 kB
05 - Domain 4 - Identity and Access Management/052 S3 Inventory.mp4
43 MB
05 - Domain 4 - Identity and Access Management/052 S3 Inventory_en.srt
7.3 kB
05 - Domain 4 - Identity and Access Management/052 S3 Inventory_vi.srt
8.7 kB
05 - Domain 4 - Identity and Access Management/053 S3 Inventory Practical.mp4
30 MB
05 - Domain 4 - Identity and Access Management/053 S3 Inventory Practical_en.srt
6.5 kB
05 - Domain 4 - Identity and Access Management/053 S3 Inventory Practical_vi.srt
7.9 kB
05 - Domain 4 - Identity and Access Management/054 S3 - Server Access Logging.mp4
59 MB
05 - Domain 4 - Identity and Access Management/054 S3 - Server Access Logging_en.srt
12 kB
05 - Domain 4 - Identity and Access Management/054 S3 - Server Access Logging_vi.srt
14 kB
05 - Domain 4 - Identity and Access Management/055 Server Access Logging Practical.mp4
48 MB
05 - Domain 4 - Identity and Access Management/055 Server Access Logging Practical_en.srt
8.0 kB
05 - Domain 4 - Identity and Access Management/055 Server Access Logging Practical_vi.srt
9.7 kB
05 - Domain 4 - Identity and Access Management/056 S3 - Cross Account Replication.mp4
29 MB
05 - Domain 4 - Identity and Access Management/056 S3 - Cross Account Replication_en.srt
10 kB
05 - Domain 4 - Identity and Access Management/056 S3 - Cross Account Replication_vi.srt
12 kB
05 - Domain 4 - Identity and Access Management/057 Cross Account Replication Practical.mp4
57 MB
05 - Domain 4 - Identity and Access Management/057 Cross Account Replication Practical_en.srt
12 kB
05 - Domain 4 - Identity and Access Management/057 Cross Account Replication Practical_vi.srt
14 kB
05 - Domain 4 - Identity and Access Management/058 Document - Bucket Policy for Cross Account Replication.html
640 B
05 - Domain 4 - Identity and Access Management/059 MFA Protected API Access.mp4
120 MB
05 - Domain 4 - Identity and Access Management/059 MFA Protected API Access_en.srt
15 kB
05 - Domain 4 - Identity and Access Management/059 MFA Protected API Access_vi.srt
18 kB
05 - Domain 4 - Identity and Access Management/060 Document - MFA CLI Commands.html
609 B
05 - Domain 4 - Identity and Access Management/061 IAM Permission Boundaries.mp4
135 MB
05 - Domain 4 - Identity and Access Management/061 IAM Permission Boundaries_en.srt
15 kB
05 - Domain 4 - Identity and Access Management/061 IAM Permission Boundaries_vi.srt
19 kB
05 - Domain 4 - Identity and Access Management/062 IAM and S3.mp4
23 MB
05 - Domain 4 - Identity and Access Management/062 IAM and S3_en.srt
10 kB
05 - Domain 4 - Identity and Access Management/062 IAM and S3_vi.srt
12 kB
05 - Domain 4 - Identity and Access Management/063 Document - IAM Policies.html
877 B
05 - Domain 4 - Identity and Access Management/064 Troubleshooting IAM Policies.mp4
7.5 MB
05 - Domain 4 - Identity and Access Management/064 Troubleshooting IAM Policies_en.srt
2.9 kB
05 - Domain 4 - Identity and Access Management/064 Troubleshooting IAM Policies_vi.srt
3.5 kB
05 - Domain 4 - Identity and Access Management/065 Document - Troubleshooting Policies.html
1.5 kB
05 - Domain 4 - Identity and Access Management/066 Troubleshooting Answers - Solution 01.mp4
34 MB
05 - Domain 4 - Identity and Access Management/066 Troubleshooting Answers - Solution 01_en.srt
7.3 kB
05 - Domain 4 - Identity and Access Management/066 Troubleshooting Answers - Solution 01_vi.srt
9.0 kB
05 - Domain 4 - Identity and Access Management/067 Troubleshooting Answers - Solution 02.mp4
80 MB
05 - Domain 4 - Identity and Access Management/067 Troubleshooting Answers - Solution 02_en.srt
9.0 kB
05 - Domain 4 - Identity and Access Management/067 Troubleshooting Answers - Solution 02_vi.srt
11 kB
05 - Domain 4 - Identity and Access Management/068 Troubleshooting Answers - Solution 03.mp4
55 MB
05 - Domain 4 - Identity and Access Management/068 Troubleshooting Answers - Solution 03_en.srt
6.9 kB
05 - Domain 4 - Identity and Access Management/068 Troubleshooting Answers - Solution 03_vi.srt
8.3 kB
05 - Domain 4 - Identity and Access Management/069 Troubleshooting Answers - Solution 04.mp4
6.1 MB
05 - Domain 4 - Identity and Access Management/069 Troubleshooting Answers - Solution 04_en.srt
2.5 kB
05 - Domain 4 - Identity and Access Management/069 Troubleshooting Answers - Solution 04_vi.srt
3.0 kB
05 - Domain 4 - Identity and Access Management/070 Troubleshooting Answers - Solution 05.mp4
21 MB
05 - Domain 4 - Identity and Access Management/070 Troubleshooting Answers - Solution 05_en.srt
6.4 kB
05 - Domain 4 - Identity and Access Management/070 Troubleshooting Answers - Solution 05_vi.srt
7.6 kB
05 - Domain 4 - Identity and Access Management/071 IAM Service Role and Pass Role.mp4
126 MB
05 - Domain 4 - Identity and Access Management/071 IAM Service Role and Pass Role_en.srt
21 kB
05 - Domain 4 - Identity and Access Management/071 IAM Service Role and Pass Role_vi.srt
25 kB
05 - Domain 4 - Identity and Access Management/072 Document Code - Pass Role Policy.html
522 B
05 - Domain 4 - Identity and Access Management/073 Attribute-Based Access Control.mp4
72 MB
05 - Domain 4 - Identity and Access Management/073 Attribute-Based Access Control_en.srt
19 kB
05 - Domain 4 - Identity and Access Management/073 Attribute-Based Access Control_vi.srt
23 kB
05 - Domain 4 - Identity and Access Management/074 Document - ABAC Policy.html
699 B
05 - Domain 4 - Identity and Access Management/075 Amazon WorkMail.mp4
55 MB
05 - Domain 4 - Identity and Access Management/075 Amazon WorkMail_en.srt
8.1 kB
05 - Domain 4 - Identity and Access Management/075 Amazon WorkMail_vi.srt
9.8 kB
05 - Domain 4 - Identity and Access Management/076 IAM Access Analyzer.mp4
42 MB
05 - Domain 4 - Identity and Access Management/076 IAM Access Analyzer_en.srt
16 kB
05 - Domain 4 - Identity and Access Management/076 IAM Access Analyzer_vi.srt
19 kB
05 - Domain 4 - Identity and Access Management/077 Generating Findings on Shared Resources.mp4
22 MB
05 - Domain 4 - Identity and Access Management/077 Generating Findings on Shared Resources_en.srt
8.1 kB
05 - Domain 4 - Identity and Access Management/077 Generating Findings on Shared Resources_vi.srt
9.9 kB
05 - Domain 4 - Identity and Access Management/078 IAM Access Advisor.mp4
41 MB
05 - Domain 4 - Identity and Access Management/078 IAM Access Advisor_en.srt
8.8 kB
05 - Domain 4 - Identity and Access Management/078 IAM Access Advisor_vi.srt
11 kB
06 - Domain 5 - Data Protection/0. Websites you may like/[CourseClub.Me].url
122 B
06 - Domain 5 - Data Protection/0. Websites you may like/[FreeCourseSite.com].url
127 B
06 - Domain 5 - Data Protection/0. Websites you may like/[GigaCourse.Com].url
49 B
06 - Domain 5 - Data Protection/001 Introduction to Cryptography.mp4
137 MB
06 - Domain 5 - Data Protection/001 Introduction to Cryptography_en.srt
17 kB
06 - Domain 5 - Data Protection/001 Introduction to Cryptography_vi.srt
21 kB
06 - Domain 5 - Data Protection/002 Understanding communication Protocols.mp4
19 MB
06 - Domain 5 - Data Protection/002 Understanding communication Protocols_en.srt
7.4 kB
06 - Domain 5 - Data Protection/002 Understanding communication Protocols_vi.srt
8.5 kB
06 - Domain 5 - Data Protection/003 Plain Text vs Encrypted Text Based Protocols.mp4
43 MB
06 - Domain 5 - Data Protection/003 Plain Text vs Encrypted Text Based Protocols_en.srt
11 kB
06 - Domain 5 - Data Protection/003 Plain Text vs Encrypted Text Based Protocols_vi.srt
13 kB
06 - Domain 5 - Data Protection/004 AWS CloudHSM.mp4
46 MB
06 - Domain 5 - Data Protection/004 AWS CloudHSM_en.srt
10 kB
06 - Domain 5 - Data Protection/004 AWS CloudHSM_vi.srt
12 kB
06 - Domain 5 - Data Protection/005 Important Pointers - CloudHSM.mp4
12 MB
06 - Domain 5 - Data Protection/005 Important Pointers - CloudHSM_en.srt
5.5 kB
06 - Domain 5 - Data Protection/005 Important Pointers - CloudHSM_vi.srt
6.2 kB
06 - Domain 5 - Data Protection/006 AWS Key Management Service.mp4
42 MB
06 - Domain 5 - Data Protection/006 AWS Key Management Service_en.srt
11 kB
06 - Domain 5 - Data Protection/006 AWS Key Management Service_vi.srt
13 kB
06 - Domain 5 - Data Protection/007 Creating our first Customer Managed Key (CMK).mp4
135 MB
06 - Domain 5 - Data Protection/007 Creating our first Customer Managed Key (CMK)_en.srt
21 kB
06 - Domain 5 - Data Protection/007 Creating our first Customer Managed Key (CMK)_vi.srt
24 kB
06 - Domain 5 - Data Protection/008 Document - CMKs References.html
445 B
06 - Domain 5 - Data Protection/009 Envelope Encryption with KMS.mp4
76 MB
06 - Domain 5 - Data Protection/009 Envelope Encryption with KMS_en.srt
13 kB
06 - Domain 5 - Data Protection/009 Envelope Encryption with KMS_vi.srt
15 kB
06 - Domain 5 - Data Protection/010 Schedule Key Deletion.mp4
52 MB
06 - Domain 5 - Data Protection/010 Schedule Key Deletion_en.srt
13 kB
06 - Domain 5 - Data Protection/010 Schedule Key Deletion_vi.srt
15 kB
06 - Domain 5 - Data Protection/011 KMS Key Categories.mp4
82 MB
06 - Domain 5 - Data Protection/011 KMS Key Categories_en.srt
16 kB
06 - Domain 5 - Data Protection/011 KMS Key Categories_vi.srt
19 kB
06 - Domain 5 - Data Protection/012 Overview of Asymmetric Key Encryption.mp4
114 MB
06 - Domain 5 - Data Protection/012 Overview of Asymmetric Key Encryption_en.srt
18 kB
06 - Domain 5 - Data Protection/012 Overview of Asymmetric Key Encryption_vi.srt
22 kB
06 - Domain 5 - Data Protection/013 Asymmetric Keys with KMS.mp4
86 MB
06 - Domain 5 - Data Protection/013 Asymmetric Keys with KMS_en.srt
18 kB
06 - Domain 5 - Data Protection/013 Asymmetric Keys with KMS_vi.srt
22 kB
06 - Domain 5 - Data Protection/014 Document - Asymmetric Encryption Commands.html
538 B
06 - Domain 5 - Data Protection/015 Digital Signing with KMS.mp4
89 MB
06 - Domain 5 - Data Protection/015 Digital Signing with KMS_en.srt
15 kB
06 - Domain 5 - Data Protection/015 Digital Signing with KMS_vi.srt
18 kB
06 - Domain 5 - Data Protection/016 Document - Digital Signing with KMS Commands.html
716 B
06 - Domain 5 - Data Protection/017 AWS Key Management Service - Data Key Caching.mp4
104 MB
06 - Domain 5 - Data Protection/017 AWS Key Management Service - Data Key Caching_en.srt
14 kB
06 - Domain 5 - Data Protection/017 AWS Key Management Service - Data Key Caching_vi.srt
17 kB
06 - Domain 5 - Data Protection/018 AWS Key Management Service - CMK Deletion _ EBS Use-Case.mp4
84 MB
06 - Domain 5 - Data Protection/018 AWS Key Management Service - CMK Deletion _ EBS Use-Case_en.srt
6.8 kB
06 - Domain 5 - Data Protection/018 AWS Key Management Service - CMK Deletion _ EBS Use-Case_vi.srt
8.2 kB
06 - Domain 5 - Data Protection/019 Access Control in KMS.mp4
62 MB
06 - Domain 5 - Data Protection/019 Access Control in KMS_en.srt
14 kB
06 - Domain 5 - Data Protection/019 Access Control in KMS_vi.srt
17 kB
06 - Domain 5 - Data Protection/020 Importance of Default Key Policy.mp4
7.1 MB
06 - Domain 5 - Data Protection/020 Importance of Default Key Policy_en.srt
3.9 kB
06 - Domain 5 - Data Protection/020 Importance of Default Key Policy_vi.srt
4.7 kB
06 - Domain 5 - Data Protection/021 Reducing Risk of Unmanageable CMK.mp4
107 MB
06 - Domain 5 - Data Protection/021 Reducing Risk of Unmanageable CMK_en.srt
16 kB
06 - Domain 5 - Data Protection/021 Reducing Risk of Unmanageable CMK_vi.srt
19 kB
06 - Domain 5 - Data Protection/022 KMS Policy Evaluation Logic - Use-Case 1.mp4
33 MB
06 - Domain 5 - Data Protection/022 KMS Policy Evaluation Logic - Use-Case 1_en.srt
12 kB
06 - Domain 5 - Data Protection/022 KMS Policy Evaluation Logic - Use-Case 1_vi.srt
14 kB
06 - Domain 5 - Data Protection/023 Document - KMS Use-Case 1.html
1.2 kB
06 - Domain 5 - Data Protection/023 kms-use-case-01.json
1.0 kB
06 - Domain 5 - Data Protection/024 KMS Policy Evaluation Logic - Use Case Solution - 01.mp4
27 MB
06 - Domain 5 - Data Protection/024 KMS Policy Evaluation Logic - Use Case Solution - 01_en.srt
6.6 kB
06 - Domain 5 - Data Protection/024 KMS Policy Evaluation Logic - Use Case Solution - 01_vi.srt
8.0 kB
06 - Domain 5 - Data Protection/025 KMS Policy Evaluation Logic - Use Case 2.mp4
29 MB
06 - Domain 5 - Data Protection/025 KMS Policy Evaluation Logic - Use Case 2_en.srt
9.9 kB
06 - Domain 5 - Data Protection/025 KMS Policy Evaluation Logic - Use Case 2_vi.srt
12 kB
06 - Domain 5 - Data Protection/026 Document - KMS Use Case 02.html
1.2 kB
06 - Domain 5 - Data Protection/026 kms-use-case-02.json
1.0 kB
06 - Domain 5 - Data Protection/027 KMS Policy Evaluation Logic - Use Case 02 Solution.mp4
10 MB
06 - Domain 5 - Data Protection/027 KMS Policy Evaluation Logic - Use Case 02 Solution_en.srt
4.3 kB
06 - Domain 5 - Data Protection/027 KMS Policy Evaluation Logic - Use Case 02 Solution_vi.srt
5.1 kB
06 - Domain 5 - Data Protection/028 KMS Policy Evaluation Logic - Use Case - 3.mp4
30 MB
06 - Domain 5 - Data Protection/028 KMS Policy Evaluation Logic - Use Case - 3_en.srt
5.3 kB
06 - Domain 5 - Data Protection/028 KMS Policy Evaluation Logic - Use Case - 3_vi.srt
6.5 kB
06 - Domain 5 - Data Protection/028 kms-use-case-03.json
1.0 kB
06 - Domain 5 - Data Protection/029 Document - KMS Use Case 03.html
1.2 kB
06 - Domain 5 - Data Protection/030 KMS Policy Evaluation Logic Solution - Use Case 3.mp4
21 MB
06 - Domain 5 - Data Protection/030 KMS Policy Evaluation Logic Solution - Use Case 3_en.srt
5.5 kB
06 - Domain 5 - Data Protection/030 KMS Policy Evaluation Logic Solution - Use Case 3_vi.srt
6.6 kB
06 - Domain 5 - Data Protection/031 KMS Grants.mp4
110 MB
06 - Domain 5 - Data Protection/031 KMS Grants_en.srt
18 kB
06 - Domain 5 - Data Protection/031 KMS Grants_vi.srt
22 kB
06 - Domain 5 - Data Protection/032 Document - KMS Grants Commands.html
622 B
06 - Domain 5 - Data Protection/033 Importing Key Material to KMS.mp4
37 MB
06 - Domain 5 - Data Protection/033 Importing Key Material to KMS_en.srt
12 kB
06 - Domain 5 - Data Protection/033 Importing Key Material to KMS_vi.srt
15 kB
06 - Domain 5 - Data Protection/034 Document - Imported Key Material Commands.html
290 B
06 - Domain 5 - Data Protection/035 KMS ViaService.mp4
112 MB
06 - Domain 5 - Data Protection/035 KMS ViaService_en.srt
12 kB
06 - Domain 5 - Data Protection/035 KMS ViaService_vi.srt
15 kB
06 - Domain 5 - Data Protection/036 Document - KMS ViaService Policy.html
693 B
06 - Domain 5 - Data Protection/037 Migrating Encrypted KMS Data Across Regions.mp4
86 MB
06 - Domain 5 - Data Protection/037 Migrating Encrypted KMS Data Across Regions_en.srt
12 kB
06 - Domain 5 - Data Protection/037 Migrating Encrypted KMS Data Across Regions_vi.srt
14 kB
06 - Domain 5 - Data Protection/038 Multi-Region KMS.mp4
91 MB
06 - Domain 5 - Data Protection/038 Multi-Region KMS_en.srt
20 kB
06 - Domain 5 - Data Protection/038 Multi-Region KMS_vi.srt
22 kB
06 - Domain 5 - Data Protection/039 Benefits of CloudHSM over KMS.mp4
11 MB
06 - Domain 5 - Data Protection/039 Benefits of CloudHSM over KMS_en.srt
3.7 kB
06 - Domain 5 - Data Protection/039 Benefits of CloudHSM over KMS_vi.srt
4.5 kB
06 - Domain 5 - Data Protection/040 S3 Encryption.mp4
125 MB
06 - Domain 5 - Data Protection/040 S3 Encryption_en.srt
21 kB
06 - Domain 5 - Data Protection/040 S3 Encryption_vi.srt
25 kB
06 - Domain 5 - Data Protection/041 Load Balancing in AWS.mp4
136 MB
06 - Domain 5 - Data Protection/041 Load Balancing in AWS_en.srt
24 kB
06 - Domain 5 - Data Protection/041 Load Balancing in AWS_vi.srt
29 kB
06 - Domain 5 - Data Protection/042 OSI Model _ AWS ELB.mp4
111 MB
06 - Domain 5 - Data Protection/042 OSI Model _ AWS ELB_en.srt
14 kB
06 - Domain 5 - Data Protection/042 OSI Model _ AWS ELB_vi.srt
17 kB
06 - Domain 5 - Data Protection/043 Classic Load Balancers.mp4
88 MB
06 - Domain 5 - Data Protection/043 Classic Load Balancers_en.srt
16 kB
06 - Domain 5 - Data Protection/043 Classic Load Balancers_vi.srt
19 kB
06 - Domain 5 - Data Protection/044 Overview of Application Load Balancers.mp4
84 MB
06 - Domain 5 - Data Protection/044 Overview of Application Load Balancers_en.srt
16 kB
06 - Domain 5 - Data Protection/044 Overview of Application Load Balancers_vi.srt
19 kB
06 - Domain 5 - Data Protection/045 Listener and Target Groups.mp4
56 MB
06 - Domain 5 - Data Protection/045 Listener and Target Groups_en.srt
14 kB
06 - Domain 5 - Data Protection/045 Listener and Target Groups_vi.srt
16 kB
06 - Domain 5 - Data Protection/046 ALB Practicals.mp4
89 MB
06 - Domain 5 - Data Protection/046 ALB Practicals_en.srt
14 kB
06 - Domain 5 - Data Protection/046 ALB Practicals_vi.srt
17 kB
06 - Domain 5 - Data Protection/047 Network Load Balancers.mp4
62 MB
06 - Domain 5 - Data Protection/047 Network Load Balancers_en.srt
11 kB
06 - Domain 5 - Data Protection/047 Network Load Balancers_vi.srt
13 kB
06 - Domain 5 - Data Protection/048 ELB Access Logs.mp4
130 MB
06 - Domain 5 - Data Protection/048 ELB Access Logs_en.srt
19 kB
06 - Domain 5 - Data Protection/048 ELB Access Logs_vi.srt
22 kB
06 - Domain 5 - Data Protection/049 Client IP Preservation.mp4
65 MB
06 - Domain 5 - Data Protection/049 Client IP Preservation_en.srt
13 kB
06 - Domain 5 - Data Protection/049 Client IP Preservation_vi.srt
15 kB
06 - Domain 5 - Data Protection/050 Understanding HTTPS Connections.mp4
203 MB
06 - Domain 5 - Data Protection/050 Understanding HTTPS Connections_en.srt
28 kB
06 - Domain 5 - Data Protection/050 Understanding HTTPS Connections_vi.srt
34 kB
06 - Domain 5 - Data Protection/051 Overview of AWS Certificate Manager.mp4
70 MB
06 - Domain 5 - Data Protection/051 Overview of AWS Certificate Manager_en.srt
17 kB
06 - Domain 5 - Data Protection/051 Overview of AWS Certificate Manager_vi.srt
20 kB
06 - Domain 5 - Data Protection/052 Issuing Certificates with ACM.mp4
41 MB
06 - Domain 5 - Data Protection/052 Issuing Certificates with ACM_en.srt
5.8 kB
06 - Domain 5 - Data Protection/052 Issuing Certificates with ACM_vi.srt
6.9 kB
06 - Domain 5 - Data Protection/053 HTTPS Listeners in ELB.mp4
44 MB
06 - Domain 5 - Data Protection/053 HTTPS Listeners in ELB_en.srt
12 kB
06 - Domain 5 - Data Protection/053 HTTPS Listeners in ELB_vi.srt
14 kB
06 - Domain 5 - Data Protection/054 Glacier Vault and Vault Lock.mp4
46 MB
06 - Domain 5 - Data Protection/054 Glacier Vault and Vault Lock_en.srt
13 kB
06 - Domain 5 - Data Protection/054 Glacier Vault and Vault Lock_vi.srt
16 kB
06 - Domain 5 - Data Protection/055 DynamoDB Encryption.mp4
23 MB
06 - Domain 5 - Data Protection/055 DynamoDB Encryption_en.srt
5.0 kB
06 - Domain 5 - Data Protection/055 DynamoDB Encryption_vi.srt
5.9 kB
06 - Domain 5 - Data Protection/056 Encryption Context in KMS.mp4
87 MB
06 - Domain 5 - Data Protection/056 Encryption Context in KMS_en.srt
16 kB
06 - Domain 5 - Data Protection/056 Encryption Context in KMS_vi.srt
19 kB
06 - Domain 5 - Data Protection/057 Document - Encrypted Context Commands.html
833 B
06 - Domain 5 - Data Protection/058 Overview of AWS Secrets Manager.mp4
82 MB
06 - Domain 5 - Data Protection/058 Overview of AWS Secrets Manager_en.srt
19 kB
06 - Domain 5 - Data Protection/058 Overview of AWS Secrets Manager_vi.srt
23 kB
06 - Domain 5 - Data Protection/059 Creating our First Secret in Secrets Manager.encrypted.m4a
1.1 MB
06 - Domain 5 - Data Protection/059 Creating our First Secret in Secrets Manager.encrypted.mp4
6.8 MB
06 - Domain 5 - Data Protection/059 Creating our First Secret in Secrets Manager_en.srt
3.7 kB
06 - Domain 5 - Data Protection/060 Rotating Secrets.mp4
28 MB
06 - Domain 5 - Data Protection/060 Rotating Secrets_en.srt
9.7 kB
06 - Domain 5 - Data Protection/060 Rotating Secrets_vi.srt
12 kB
06 - Domain 5 - Data Protection/061 Overview of Route53 Resolver.mp4
24 MB
06 - Domain 5 - Data Protection/061 Overview of Route53 Resolver_en.srt
9.7 kB
06 - Domain 5 - Data Protection/061 Overview of Route53 Resolver_vi.srt
12 kB
06 - Domain 5 - Data Protection/062 Route53 Resolver DNS Firewall.mp4
30 MB
06 - Domain 5 - Data Protection/062 Route53 Resolver DNS Firewall_en.srt
14 kB
06 - Domain 5 - Data Protection/062 Route53 Resolver DNS Firewall_vi.srt
17 kB
06 - Domain 5 - Data Protection/063 Configuring Route53 DNS Firewall.mp4
23 MB
06 - Domain 5 - Data Protection/063 Configuring Route53 DNS Firewall_en.srt
5.8 kB
06 - Domain 5 - Data Protection/063 Configuring Route53 DNS Firewall_vi.srt
7.3 kB
06 - Domain 5 - Data Protection/064 DNS Firewall VPC Configuration Options.mp4
14 MB
06 - Domain 5 - Data Protection/064 DNS Firewall VPC Configuration Options_en.srt
5.0 kB
06 - Domain 5 - Data Protection/064 DNS Firewall VPC Configuration Options_vi.srt
6.1 kB
06 - Domain 5 - Data Protection/065 DNS Cache Poisoning Attack.mp4
45 MB
06 - Domain 5 - Data Protection/065 DNS Cache Poisoning Attack_en.srt
9.0 kB
06 - Domain 5 - Data Protection/065 DNS Cache Poisoning Attack_vi.srt
11 kB
06 - Domain 5 - Data Protection/066 Document - External Link.html
94 B
06 - Domain 5 - Data Protection/067 Overview of DNSSEC.mp4
55 MB
06 - Domain 5 - Data Protection/067 Overview of DNSSEC_en.srt
18 kB
06 - Domain 5 - Data Protection/067 Overview of DNSSEC_vi.srt
21 kB
06 - Domain 5 - Data Protection/068 PCAP Files - DNS and DNSSEC.html
106 B
06 - Domain 5 - Data Protection/068 dns.pcap
1.6 kB
06 - Domain 5 - Data Protection/068 dnssec.pcap
5.5 kB
06 - Domain 5 - Data Protection/069 Configuring DNSSEC in Route53.mp4
92 MB
06 - Domain 5 - Data Protection/069 Configuring DNSSEC in Route53_en.srt
15 kB
06 - Domain 5 - Data Protection/069 Configuring DNSSEC in Route53_vi.srt
18 kB
06 - Domain 5 - Data Protection/070 AWS Signer.mp4
53 MB
06 - Domain 5 - Data Protection/070 AWS Signer_en.srt
11 kB
06 - Domain 5 - Data Protection/070 AWS Signer_vi.srt
13 kB
06 - Domain 5 - Data Protection/071 Integrating Signer with Lambda.mp4
86 MB
06 - Domain 5 - Data Protection/071 Integrating Signer with Lambda_en.srt
12 kB
06 - Domain 5 - Data Protection/071 Integrating Signer with Lambda_vi.srt
14 kB
06 - Domain 5 - Data Protection/072 Overview of EBS Snapshots.mp4
36 MB
06 - Domain 5 - Data Protection/072 Overview of EBS Snapshots_en.srt
10 kB
06 - Domain 5 - Data Protection/072 Overview of EBS Snapshots_vi.srt
12 kB
06 - Domain 5 - Data Protection/073 EBS Encryption.mp4
34 MB
06 - Domain 5 - Data Protection/073 EBS Encryption_en.srt
10 kB
06 - Domain 5 - Data Protection/073 EBS Encryption_vi.srt
12 kB
06 - Domain 5 - Data Protection/074 Enabling Encryption by Default.mp4
26 MB
06 - Domain 5 - Data Protection/074 Enabling Encryption by Default_en.srt
4.4 kB
06 - Domain 5 - Data Protection/074 Enabling Encryption by Default_vi.srt
5.2 kB
06 - Domain 5 - Data Protection/075 EBS Encryption Scenerios.mp4
39 MB
06 - Domain 5 - Data Protection/075 EBS Encryption Scenerios_en.srt
9.3 kB
06 - Domain 5 - Data Protection/075 EBS Encryption Scenerios_vi.srt
11 kB
06 - Domain 5 - Data Protection/076 Encrypted EBS Snapshot Sharing.mp4
31 MB
06 - Domain 5 - Data Protection/076 Encrypted EBS Snapshot Sharing_en.srt
14 kB
06 - Domain 5 - Data Protection/076 Encrypted EBS Snapshot Sharing_vi.srt
17 kB
06 - Domain 5 - Data Protection/077 Overview of Elastic File System (EFS).mp4
66 MB
06 - Domain 5 - Data Protection/077 Overview of Elastic File System (EFS)_en.srt
12 kB
06 - Domain 5 - Data Protection/077 Overview of Elastic File System (EFS)_vi.srt
15 kB
06 - Domain 5 - Data Protection/078 Creating and Mounting EFS in EC2.mp4
94 MB
06 - Domain 5 - Data Protection/078 Creating and Mounting EFS in EC2_en.srt
14 kB
06 - Domain 5 - Data Protection/078 Creating and Mounting EFS in EC2_vi.srt
17 kB
06 - Domain 5 - Data Protection/079 Document - EFS Commands.html
336 B
06 - Domain 5 - Data Protection/080 EFS File System Policies.mp4
55 MB
06 - Domain 5 - Data Protection/080 EFS File System Policies_en.srt
14 kB
06 - Domain 5 - Data Protection/080 EFS File System Policies_vi.srt
17 kB
06 - Domain 5 - Data Protection/081 Data Encryption in EFS.mp4
24 MB
06 - Domain 5 - Data Protection/081 Data Encryption in EFS_en.srt
12 kB
06 - Domain 5 - Data Protection/081 Data Encryption in EFS_vi.srt
14 kB
06 - Domain 5 - Data Protection/082 Enforcing In-Transit Encryption in EFS.mp4
20 MB
06 - Domain 5 - Data Protection/082 Enforcing In-Transit Encryption in EFS_en.srt
7.4 kB
06 - Domain 5 - Data Protection/082 Enforcing In-Transit Encryption in EFS_vi.srt
9.1 kB
06 - Domain 5 - Data Protection/083 IAM Authentication in EFS.mp4
27 MB
06 - Domain 5 - Data Protection/083 IAM Authentication in EFS_en.srt
11 kB
06 - Domain 5 - Data Protection/083 IAM Authentication in EFS_vi.srt
13 kB
06 - Domain 5 - Data Protection/084 Document - IAM Policy.html
817 B
06 - Domain 5 - Data Protection/085 Overview of AWS Backup.mp4
18 MB
06 - Domain 5 - Data Protection/085 Overview of AWS Backup_en.srt
7.0 kB
06 - Domain 5 - Data Protection/085 Overview of AWS Backup_vi.srt
8.3 kB
06 - Domain 5 - Data Protection/086 Creating Backup Plan.mp4
32 MB
06 - Domain 5 - Data Protection/086 Creating Backup Plan_en.srt
5.2 kB
06 - Domain 5 - Data Protection/086 Creating Backup Plan_vi.srt
6.3 kB
07 - Domain 6 - Management and Security Governance/001 Resource Access Manager.mp4
44 MB
07 - Domain 6 - Management and Security Governance/001 Resource Access Manager_en.srt
12 kB
07 - Domain 6 - Management and Security Governance/001 Resource Access Manager_vi.srt
14 kB
07 - Domain 6 - Management and Security Governance/002 VPC Sharing in AWS.mp4
50 MB
07 - Domain 6 - Management and Security Governance/002 VPC Sharing in AWS_en.srt
20 kB
07 - Domain 6 - Management and Security Governance/002 VPC Sharing in AWS_vi.srt
24 kB
07 - Domain 6 - Management and Security Governance/003 AWS Control Tower.mp4
181 MB
07 - Domain 6 - Management and Security Governance/003 AWS Control Tower_en.srt
28 kB
07 - Domain 6 - Management and Security Governance/003 AWS Control Tower_vi.srt
34 kB
07 - Domain 6 - Management and Security Governance/004 Firewall Manager.mp4
65 MB
07 - Domain 6 - Management and Security Governance/004 Firewall Manager_en.srt
14 kB
07 - Domain 6 - Management and Security Governance/004 Firewall Manager_vi.srt
17 kB
07 - Domain 6 - Management and Security Governance/005 Trusted Advisor.mp4
115 MB
07 - Domain 6 - Management and Security Governance/005 Trusted Advisor_en.srt
12 kB
07 - Domain 6 - Management and Security Governance/005 Trusted Advisor_vi.srt
15 kB
07 - Domain 6 - Management and Security Governance/006 Overview of Service Catalog.mp4
71 MB
07 - Domain 6 - Management and Security Governance/006 Overview of Service Catalog_en.srt
12 kB
07 - Domain 6 - Management and Security Governance/006 Overview of Service Catalog_vi.srt
14 kB
07 - Domain 6 - Management and Security Governance/007 Creating Product and Portfolio in Service Catalog.mp4
59 MB
07 - Domain 6 - Management and Security Governance/007 Creating Product and Portfolio in Service Catalog_en.srt
14 kB
07 - Domain 6 - Management and Security Governance/007 Creating Product and Portfolio in Service Catalog_vi.srt
16 kB
07 - Domain 6 - Management and Security Governance/008 Document Code - AWS Service Catalog.html
801 B
07 - Domain 6 - Management and Security Governance/009 AWS Cost Explorer.mp4
25 MB
07 - Domain 6 - Management and Security Governance/009 AWS Cost Explorer_en.srt
5.2 kB
07 - Domain 6 - Management and Security Governance/009 AWS Cost Explorer_vi.srt
6.2 kB
08 - Important points for Exams/001 Our Community.html
575 B
08 - Important points for Exams/002 Important Pointers - Domain 1.mp4
84 MB
08 - Important points for Exams/002 Important Pointers - Domain 1_en.srt
13 kB
08 - Important points for Exams/002 Important Pointers - Domain 1_vi.srt
16 kB
08 - Important points for Exams/003 Important Pointers - Domain 2.mp4
56 MB
08 - Important points for Exams/003 Important Pointers - Domain 2_en.srt
18 kB
08 - Important points for Exams/003 Important Pointers - Domain 2_vi.srt
22 kB
08 - Important points for Exams/004 Important Pointers - Domain 3.mp4
66 MB
08 - Important points for Exams/004 Important Pointers - Domain 3_en.srt
20 kB
08 - Important points for Exams/004 Important Pointers - Domain 3_vi.srt
24 kB
08 - Important points for Exams/005 Important Pointers - Domain 4.mp4
128 MB
08 - Important points for Exams/005 Important Pointers - Domain 4_en.srt
17 kB
08 - Important points for Exams/005 Important Pointers - Domain 4_vi.srt
20 kB
08 - Important points for Exams/006 Important Pointers - Domain 5.mp4
109 MB
08 - Important points for Exams/006 Important Pointers - Domain 5_en.srt
21 kB
08 - Important points for Exams/006 Important Pointers - Domain 5_vi.srt
24 kB
08 - Important points for Exams/007 Updated - Important Pointers for Exams.mp4
40 MB
08 - Important points for Exams/007 Updated - Important Pointers for Exams_en.srt
8.0 kB
08 - Important points for Exams/007 Updated - Important Pointers for Exams_vi.srt
9.7 kB
08 - Important points for Exams/008 Updated - Important Pointers for Exams.html
467 B
08 - Important points for Exams/009 Notes - Important Pointers for Exams.html
153 B