Name Pluralsight - AWS Cloud Security Best Practices by Joseph Hunsaker
File Type package
Size 451.79MB
UpdateDate 2025-3-26
hash *****D890E4F0502404559383C54CE58E862312
Hot 7
Files 0. Course Overview/0. Course Overview.mp4 | 4.62MB 0. Course Overview/0. Course Overview.srt | 2.74KB 1. Examining the AWS Security Checklist/0. Introduction.mp4 | 3.02MB 1. Examining the AWS Security Checklist/0. Introduction.srt | 2.81KB 1. Examining the AWS Security Checklist/1. Least Privilege.mp4 | 7.93MB 1. Examining the AWS Security Checklist/1. Least Privilege.srt | 9.44KB 1. Examining the AWS Security Checklist/2. Handle Keys with Care.mp4 | 8.67MB 1. Examining the AWS Security Checklist/2. Handle Keys with Care.srt | 6.27KB 1. Examining the AWS Security Checklist/3. Encrypt -All the Things-.mp4 | 3.79MB 1. Examining the AWS Security Checklist/3. Encrypt -All the Things-.srt | 2.85KB 1. Examining the AWS Security Checklist/4. Monitor Continuously.mp4 | 2.91MB 1. Examining the AWS Security Checklist/4. Monitor Continuously.srt | 3.04KB 1. Examining the AWS Security Checklist/5. Audit Regularly.mp4 | 1.21MB 1. Examining the AWS Security Checklist/5. Audit Regularly.srt | 1.45KB 2. Securing Operating Systems and Applications/0. Introduction.mp4 | 5.13MB 2. Securing Operating Systems and Applications/0. Introduction.srt | 4.53KB 2. Securing Operating Systems and Applications/1. Securing Custom AMIs.mp4 | 6.43MB 2. Securing Operating Systems and Applications/1. Securing Custom AMIs.srt | 5.09KB 2. Securing Operating Systems and Applications/2. Common AMI Maintenance.mp4 | 2.73MB 2. Securing Operating Systems and Applications/2. Common AMI Maintenance.srt | 3.19KB 2. Securing Operating Systems and Applications/3. Intervention.mp4 | 4.16MB 2. Securing Operating Systems and Applications/3. Intervention.srt | 4.41KB 2. Securing Operating Systems and Applications/4. Future.mp4 | 1.62MB 2. Securing Operating Systems and Applications/4. Future.srt | 1.92KB 3. Securing Your Infrastructure/0. Introduction.mp4 | 8.47MB 3. Securing Your Infrastructure/0. Introduction.srt | 5.96KB 3. Securing Your Infrastructure/1. Network Segmentation and Security Zones.mp4 | 6.53MB 3. Securing Your Infrastructure/1. Network Segmentation and Security Zones.srt | 5.62KB 3. Securing Your Infrastructure/2. Securing Periphery Systems- User Repositories, DNS, NTP.mp4 | 4.99MB 3. Securing Your Infrastructure/2. Securing Periphery Systems- User Repositories, DNS, NTP.srt | 4.95KB 4. Introducing the Cloud Adoption Framework/0. Introduction.mp4 | 9.02MB 4. Introducing the Cloud Adoption Framework/0. Introduction.srt | 4.05KB 4. Introducing the Cloud Adoption Framework/1. Mind the -Gap-.mp4 | 1.66MB 4. Introducing the Cloud Adoption Framework/1. Mind the -Gap-.srt | 1.24KB 4. Introducing the Cloud Adoption Framework/2. CAF Perspectives and Capabilities.mp4 | 7.03MB 4. Introducing the Cloud Adoption Framework/2. CAF Perspectives and Capabilities.srt | 5.03KB 4. Introducing the Cloud Adoption Framework/3. Summary.mp4 | 1.14MB 4. Introducing the Cloud Adoption Framework/3. Summary.srt | 1.21KB aws-security-best-practices.zip | 360.66MB content.txt | 1.10KB