TorBT - Torrents and Magnet Links Search Engine

Pluralsight - Architecting for Security on AWS by Ben Piper

File Name
Size
0. Course Overview/0. Course Overview.mp4
3.0 MB
0. Course Overview/0. Course Overview.srt
2.1 kB
1. Protecting AWS Credentials/0. Confidentiality, Integrity, and Availability.mp4
8.1 MB
1. Protecting AWS Credentials/0. Confidentiality, Integrity, and Availability.srt
11 kB
1. Protecting AWS Credentials/1. Course Overview.mp4
7.2 MB
1. Protecting AWS Credentials/1. Course Overview.srt
9.8 kB
1. Protecting AWS Credentials/10. Summary.mp4
4.4 MB
1. Protecting AWS Credentials/10. Summary.srt
4.1 kB
1. Protecting AWS Credentials/2. Understanding AWS Credentials.mp4
3.3 MB
1. Protecting AWS Credentials/2. Understanding AWS Credentials.srt
4.0 kB
1. Protecting AWS Credentials/3. Locking Down the Root User.mp4
23 MB
1. Protecting AWS Credentials/3. Locking Down the Root User.srt
12 kB
1. Protecting AWS Credentials/4. Introduction to Principals and Policies.mp4
2.5 MB
1. Protecting AWS Credentials/4. Introduction to Principals and Policies.srt
3.3 kB
1. Protecting AWS Credentials/5. Understanding Policies.mp4
4.4 MB
1. Protecting AWS Credentials/5. Understanding Policies.srt
5.8 kB
1. Protecting AWS Credentials/6. Creating an Administrative User.mp4
25 MB
1. Protecting AWS Credentials/6. Creating an Administrative User.srt
13 kB
1. Protecting AWS Credentials/7. Using Groups.mp4
5.6 MB
1. Protecting AWS Credentials/7. Using Groups.srt
3.4 kB
1. Protecting AWS Credentials/8. Denying Access with User Policies.mp4
22 MB
1. Protecting AWS Credentials/8. Denying Access with User Policies.srt
15 kB
1. Protecting AWS Credentials/9. Denying Access with Group Policies.mp4
9.3 MB
1. Protecting AWS Credentials/9. Denying Access with Group Policies.srt
5.5 kB
2. Capturing and Analyzing Logs/0. Introduction to Capturing and Analyzing Logs.mp4
2.6 MB
2. Capturing and Analyzing Logs/0. Introduction to Capturing and Analyzing Logs.srt
3.0 kB
2. Capturing and Analyzing Logs/1. Understanding CloudTrail.mp4
2.9 MB
2. Capturing and Analyzing Logs/1. Understanding CloudTrail.srt
3.7 kB
2. Capturing and Analyzing Logs/2. Configuring CloudTrail to Log AWS Service Operations.mp4
26 MB
2. Capturing and Analyzing Logs/2. Configuring CloudTrail to Log AWS Service Operations.srt
14 kB
2. Capturing and Analyzing Logs/3. CloudTrail vs. CloudWatch Logs.mp4
4.5 MB
2. Capturing and Analyzing Logs/3. CloudTrail vs. CloudWatch Logs.srt
5.0 kB
2. Capturing and Analyzing Logs/4. Configuring CloudWatch Logs.mp4
24 MB
2. Capturing and Analyzing Logs/4. Configuring CloudWatch Logs.srt
14 kB
2. Capturing and Analyzing Logs/5. Reading CloudTrail Logs Using CloudWatch Logs.mp4
16 MB
2. Capturing and Analyzing Logs/5. Reading CloudTrail Logs Using CloudWatch Logs.srt
6.2 kB
2. Capturing and Analyzing Logs/6. Creating CloudWatch Alarms.mp4
29 MB
2. Capturing and Analyzing Logs/6. Creating CloudWatch Alarms.srt
15 kB
2. Capturing and Analyzing Logs/7. Searching Logs with Athena.mp4
15 MB
2. Capturing and Analyzing Logs/7. Searching Logs with Athena.srt
9.1 kB
2. Capturing and Analyzing Logs/8. Tracking Configuration Changes in AWS Config.mp4
18 MB
2. Capturing and Analyzing Logs/8. Tracking Configuration Changes in AWS Config.srt
12 kB
2. Capturing and Analyzing Logs/9. Summary.mp4
3.0 MB
2. Capturing and Analyzing Logs/9. Summary.srt
3.3 kB
3. Protecting Network and Host-level Boundaries/0. Introduction to Protecting Network and Host-level Boundaries.mp4
7.2 MB
3. Protecting Network and Host-level Boundaries/0. Introduction to Protecting Network and Host-level Boundaries.srt
8.7 kB
3. Protecting Network and Host-level Boundaries/1. Creating a Public Subnet.mp4
17 MB
3. Protecting Network and Host-level Boundaries/1. Creating a Public Subnet.srt
7.5 kB
3. Protecting Network and Host-level Boundaries/2. Creating and Using an IAM Instance Profile.mp4
30 MB
3. Protecting Network and Host-level Boundaries/2. Creating and Using an IAM Instance Profile.srt
13 kB
3. Protecting Network and Host-level Boundaries/3. Using SSH Key Pairs.mp4
38 MB
3. Protecting Network and Host-level Boundaries/3. Using SSH Key Pairs.srt
13 kB
3. Protecting Network and Host-level Boundaries/4. Using VPC Endpoints - Part 1.mp4
34 MB
3. Protecting Network and Host-level Boundaries/4. Using VPC Endpoints - Part 1.srt
11 kB
3. Protecting Network and Host-level Boundaries/5. Using VPC Endpoints - Part 2.mp4
29 MB
3. Protecting Network and Host-level Boundaries/5. Using VPC Endpoints - Part 2.srt
10 kB
3. Protecting Network and Host-level Boundaries/6. Network Access Control Lists.mp4
38 MB
3. Protecting Network and Host-level Boundaries/6. Network Access Control Lists.srt
15 kB
3. Protecting Network and Host-level Boundaries/7. Summary.mp4
3.1 MB
3. Protecting Network and Host-level Boundaries/7. Summary.srt
3.1 kB
4. Protecting Data at Rest/0. Introduction to Protecting Data at Rest.mp4
3.6 MB
4. Protecting Data at Rest/0. Introduction to Protecting Data at Rest.srt
4.2 kB
4. Protecting Data at Rest/1. Creating a Customer Master Key with KMS.mp4
16 MB
4. Protecting Data at Rest/1. Creating a Customer Master Key with KMS.srt
9.0 kB
4. Protecting Data at Rest/2. Encrypting an Unencrypted EBS Volume.mp4
18 MB
4. Protecting Data at Rest/2. Encrypting an Unencrypted EBS Volume.srt
8.5 kB
4. Protecting Data at Rest/3. S3 Access Permissions - Part 1.mp4
17 MB
4. Protecting Data at Rest/3. S3 Access Permissions - Part 1.srt
11 kB
4. Protecting Data at Rest/4. S3 Access Permissions - Part 2.mp4
11 MB
4. Protecting Data at Rest/4. S3 Access Permissions - Part 2.srt
6.4 kB
4. Protecting Data at Rest/5. CloudFront Origin Access Identity.mp4
15 MB
4. Protecting Data at Rest/5. CloudFront Origin Access Identity.srt
9.4 kB
4. Protecting Data at Rest/6. Granting Anonymous Access with Object ACLs and Bucket Policies.mp4
17 MB
4. Protecting Data at Rest/6. Granting Anonymous Access with Object ACLs and Bucket Policies.srt
10 kB
4. Protecting Data at Rest/7. Encrypting S3 Objects with KMS-managed Keys (SSE-KMS).mp4
12 MB
4. Protecting Data at Rest/7. Encrypting S3 Objects with KMS-managed Keys (SSE-KMS).srt
7.0 kB
4. Protecting Data at Rest/8. Summary.mp4
4.1 MB
4. Protecting Data at Rest/8. Summary.srt
4.3 kB
5. Protecting Data in Transit/0. Introduction to Protecting Data in Transit.mp4
9.4 MB
5. Protecting Data in Transit/0. Introduction to Protecting Data in Transit.srt
10 kB
5. Protecting Data in Transit/1. Preparing for the Load Balancer.mp4
22 MB
5. Protecting Data in Transit/1. Preparing for the Load Balancer.srt
11 kB
5. Protecting Data in Transit/2. Creating a Secure Application Load Balancer.mp4
24 MB
5. Protecting Data in Transit/2. Creating a Secure Application Load Balancer.srt
12 kB
5. Protecting Data in Transit/3. Summary.mp4
3.8 MB
5. Protecting Data in Transit/3. Summary.srt
4.3 kB
6. Configuring Data Backup, Replication, and Recovery/0. Introduction to Data Backup, Replication, and Recovery.mp4
2.7 MB
6. Configuring Data Backup, Replication, and Recovery/0. Introduction to Data Backup, Replication, and Recovery.srt
3.8 kB
6. Configuring Data Backup, Replication, and Recovery/1. Versioning.mp4
14 MB
6. Configuring Data Backup, Replication, and Recovery/1. Versioning.srt
8.5 kB
6. Configuring Data Backup, Replication, and Recovery/2. Lifecycle Management.mp4
20 MB
6. Configuring Data Backup, Replication, and Recovery/2. Lifecycle Management.srt
14 kB
6. Configuring Data Backup, Replication, and Recovery/3. Cross-region Replication.mp4
11 MB
6. Configuring Data Backup, Replication, and Recovery/3. Cross-region Replication.srt
7.4 kB
6. Configuring Data Backup, Replication, and Recovery/4. Summary.mp4
1.7 MB
6. Configuring Data Backup, Replication, and Recovery/4. Summary.srt
2.0 kB
6. Configuring Data Backup, Replication, and Recovery/5. Course Summary.mp4
4.6 MB
6. Configuring Data Backup, Replication, and Recovery/5. Course Summary.srt
6.1 kB
architecting-security-aws.zip
4.7 MB
content.txt
2.6 kB