Archived
files |
AWS Enterprise Security\08 - Security Audits in AWS\03 - Rotating access keys.mp4
[c384d744d0163b41]
|
9,503,747 |
E1E14152 |
AWS Enterprise Security\08 - Security Audits in AWS\06 - Exploring Trusted Advisor.mp4
[e0cdd6bdc4d95368]
|
15,774,383 |
7673CABD |
AWS Enterprise Security\08 - Security Audits in AWS\04 - Understanding AWS Artifact.mp4
[e9fdcdb6043d0088]
|
8,202,928 |
1B9E8898 |
AWS Enterprise Security\08 - Security Audits in AWS\03 - Rotating access keys.srt |
6,113 |
E56C2B82 |
AWS Enterprise Security\08 - Security Audits in AWS\02 - Using AWS Security Hub.mp4
[6b919079d32ad053]
|
18,189,486 |
3426C8CF |
AWS Enterprise Security\08 - Security Audits in AWS\05 - Understanding Trusted Advisor.mp4
[9905f18514432343]
|
8,297,135 |
17F3CD28 |
AWS Enterprise Security\08 - Security Audits in AWS\02 - Using AWS Security Hub.srt |
7,995 |
7ECB032E |
AWS Enterprise Security\08 - Security Audits in AWS\07 - Preparing for a security audit.srt |
7,738 |
C0A4E48C |
AWS Enterprise Security\08 - Security Audits in AWS\07 - Preparing for a security audit.mp4
[9bd119fef28da8a0]
|
7,709,870 |
0D35A310 |
AWS Enterprise Security\08 - Security Audits in AWS\01 - Understanding AWS Security Hub.mp4
[e5a1400ee4924c78]
|
4,637,657 |
B850DDA0 |
AWS Enterprise Security\08 - Security Audits in AWS\01 - Understanding AWS Security Hub.srt |
4,155 |
0F3CBEBE |
AWS Enterprise Security\08 - Security Audits in AWS\06 - Exploring Trusted Advisor.srt |
5,835 |
ED37888D |
AWS Enterprise Security\Exercise Files\Ex_Files_AWS_Enterprise_Security.zip |
2,888 |
195A2D97 |
AWS Enterprise Security\07 - Additional Protective Tools\05 - Creating a private certificate.mp4
[aec819942605f8a7]
|
11,087,189 |
1B7A32B8 |
AWS Enterprise Security\07 - Additional Protective Tools\02 - Configuring web application firewall.srt |
9,763 |
E2028B6A |
AWS Enterprise Security\07 - Additional Protective Tools\01 - Understanding web application firewall.mp4
[5558f52b7b22573e]
|
5,063,514 |
634D2AE5 |
AWS Enterprise Security\07 - Additional Protective Tools\01 - Understanding web application firewall.srt |
4,884 |
7E95BEE4 |
AWS Enterprise Security\07 - Additional Protective Tools\02 - Configuring web application firewall.mp4
[8249f98472a98c1c]
|
18,248,196 |
56F506F3 |
AWS Enterprise Security\07 - Additional Protective Tools\03 - Understanding AWS Shield.mp4
[86bf28d2f1cf2b8c]
|
8,238,765 |
DBD1D688 |
AWS Enterprise Security\07 - Additional Protective Tools\04 - Understanding Certificate Manager.mp4
[cf05916a2da9a12c]
|
11,558,575 |
9AF22E24 |
AWS Enterprise Security\07 - Additional Protective Tools\04 - Understanding Certificate Manager.srt |
8,090 |
A91C6B91 |
AWS Enterprise Security\07 - Additional Protective Tools\03 - Understanding AWS Shield.srt |
4,997 |
51FAC04E |
AWS Enterprise Security\02 - AWS Security Foundations\06 - Enabling CloudTrail.mp4
[6b010ad44334af2d]
|
11,460,377 |
3C241718 |
AWS Enterprise Security\02 - AWS Security Foundations\02 - Understanding the AWS security landscape.srt |
2,676 |
89E04CED |
AWS Enterprise Security\02 - AWS Security Foundations\03 - Understanding separation of duties.mp4
[86a0c0129e903943]
|
5,758,127 |
A5F06959 |
AWS Enterprise Security\02 - AWS Security Foundations\02 - Understanding the AWS security landscape.mp4
[a1d916e7032f5174]
|
2,688,344 |
BCCDF619 |
AWS Enterprise Security\02 - AWS Security Foundations\01 - Understanding shared responsibility.mp4
[60e29cdf3e5780dd]
|
10,813,954 |
8D0DF10D |
AWS Enterprise Security\02 - AWS Security Foundations\07 - Understanding AWS Organizations.srt |
3,198 |
C6D03E59 |
AWS Enterprise Security\02 - AWS Security Foundations\03 - Understanding separation of duties.srt |
5,467 |
88A51DF3 |
AWS Enterprise Security\02 - AWS Security Foundations\08 - The AWS Command Line Interface (CLI) for Mac.srt |
5,996 |
F3CD70FD |
AWS Enterprise Security\02 - AWS Security Foundations\07 - Understanding AWS Organizations.mp4
[405c77eb5c739c58]
|
3,371,012 |
7D56FD2C |
AWS Enterprise Security\02 - AWS Security Foundations\08 - The AWS Command Line Interface (CLI) for Mac.mp4
[bed0c24000710fc0]
|
13,462,530 |
C2C84E6A |
AWS Enterprise Security\02 - AWS Security Foundations\04 - Implementing separation of duties.srt |
8,423 |
564C4CA8 |
AWS Enterprise Security\02 - AWS Security Foundations\04 - Implementing separation of duties.mp4
[eee496e0d1b6de4e]
|
14,807,212 |
98C2BB4F |
AWS Enterprise Security\02 - AWS Security Foundations\05 - Understanding CloudTrail.mp4
[c3acae654eb82ca]
|
5,452,119 |
24A9A7A0 |
AWS Enterprise Security\02 - AWS Security Foundations\09 - The AWS Command Line Interface (CLI) for Windows.mp4
[bebd429068a9d39f]
|
8,863,578 |
F0FF4ED9 |
AWS Enterprise Security\03 - Identity and Access Management (IAM) Concepts in AWS\08 - Challenge IAM.srt |
1,200 |
CC0C18F7 |
AWS Enterprise Security\03 - Identity and Access Management (IAM) Concepts in AWS\08 - Challenge IAM.mp4
[4649fbd60000e62e]
|
1,708,969 |
BA3A7F04 |
AWS Enterprise Security\03 - Identity and Access Management (IAM) Concepts in AWS\02 - Understanding IAM policies.mp4
[6cee1027b74a114a]
|
6,937,401 |
A3A2C5E1 |
AWS Enterprise Security\03 - Identity and Access Management (IAM) Concepts in AWS\13 - Granting temporary access.srt |
9,478 |
5EBE8278 |
AWS Enterprise Security\03 - Identity and Access Management (IAM) Concepts in AWS\06 - Configuring web console access.mp4
[28f92bc797436321]
|
6,099,725 |
EDD6067C |
AWS Enterprise Security\03 - Identity and Access Management (IAM) Concepts in AWS\17 - Use case Securing financial access.mp4
[17b9afea7ad4a1ad]
|
5,244,972 |
F2328C58 |
AWS Enterprise Security\03 - Identity and Access Management (IAM) Concepts in AWS\04 - Understanding IAM groups.mp4
[39c2930a2dca17f7]
|
2,888,023 |
6854F177 |
AWS Enterprise Security\03 - Identity and Access Management (IAM) Concepts in AWS\01 - Understanding IAM.mp4
[2e9353bf2948b641]
|
9,515,862 |
793D90D4 |
AWS Enterprise Security\03 - Identity and Access Management (IAM) Concepts in AWS\16 - Exploring federated access in AWS.mp4
[b0d2e6906dcd7d4e]
|
16,851,628 |
8BD17573 |
AWS Enterprise Security\03 - Identity and Access Management (IAM) Concepts in AWS\05 - Configuring IAM groups.mp4
[822d0e05604f47f1]
|
5,623,811 |
06F558C9 |
AWS Enterprise Security\03 - Identity and Access Management (IAM) Concepts in AWS\09 - Solution IAM.srt |
4,686 |
A5989C2D |
AWS Enterprise Security\03 - Identity and Access Management (IAM) Concepts in AWS\07 - Configuring IAM users Web console.mp4
[8e91d7241ef011ff]
|
11,769,462 |
858D13B5 |
AWS Enterprise Security\03 - Identity and Access Management (IAM) Concepts in AWS\17 - Use case Securing financial access.srt |
4,663 |
89C707B6 |
AWS Enterprise Security\03 - Identity and Access Management (IAM) Concepts in AWS\11 - Configuring IAM roles.srt |
4,702 |
8762731E |
AWS Enterprise Security\03 - Identity and Access Management (IAM) Concepts in AWS\15 - Exploring IAM policy simulator.srt |
6,638 |
E70D212F |
AWS Enterprise Security\03 - Identity and Access Management (IAM) Concepts in AWS\18 - Understanding Resource Access Manager.mp4
[de8ae191aee50bd6]
|
13,513,392 |
7FDFA96D |
AWS Enterprise Security\03 - Identity and Access Management (IAM) Concepts in AWS\10 - Understanding IAM roles.mp4
[ae7cfc5f2033ecbf]
|
2,918,576 |
DFE73D06 |
AWS Enterprise Security\03 - Identity and Access Management (IAM) Concepts in AWS\14 - Illustrating access restrictions.mp4
[9a6a2f89bc127a01]
|
2,901,506 |
1E888A0E |
AWS Enterprise Security\03 - Identity and Access Management (IAM) Concepts in AWS\13 - Granting temporary access.mp4
[302a60c21570c4bf]
|
16,222,212 |
410F8364 |
AWS Enterprise Security\03 - Identity and Access Management (IAM) Concepts in AWS\11 - Configuring IAM roles.mp4
[ae93d43c38b45d5f]
|
8,544,086 |
DA73AF78 |
AWS Enterprise Security\03 - Identity and Access Management (IAM) Concepts in AWS\15 - Exploring IAM policy simulator.mp4
[f680ea3ae5d0220]
|
10,599,089 |
E92EFB17 |
AWS Enterprise Security\03 - Identity and Access Management (IAM) Concepts in AWS\03 - Configuring IAM policies.mp4
[8a8dafd13a52ea7f]
|
16,784,558 |
6B1ABB04 |
AWS Enterprise Security\03 - Identity and Access Management (IAM) Concepts in AWS\14 - Illustrating access restrictions.srt |
2,494 |
A2A9DA97 |
AWS Enterprise Security\03 - Identity and Access Management (IAM) Concepts in AWS\09 - Solution IAM.mp4
[30373e94cd6024c9]
|
8,797,557 |
0914BE5B |
AWS Enterprise Security\03 - Identity and Access Management (IAM) Concepts in AWS\12 - Understanding Security Token Service.mp4
[26043569d14852ed]
|
3,403,948 |
1F4F0341 |
AWS Enterprise Security\06 - Internal Detective Controls\08 - Understanding Amazon Detective.mp4
[fa7141ae6589672f]
|
2,656,558 |
42B6F860 |
AWS Enterprise Security\06 - Internal Detective Controls\01 - Understanding AWS Config.srt |
7,247 |
44EF733C |
AWS Enterprise Security\06 - Internal Detective Controls\03 - Exploring AWS Config results.mp4
[3afaadd52ddffd96]
|
12,040,194 |
AD870D08 |
AWS Enterprise Security\06 - Internal Detective Controls\02 - Enabling AWS Config.mp4
[c1b6fdf6e22d117a]
|
10,002,946 |
E2F4464A |
AWS Enterprise Security\06 - Internal Detective Controls\10 - Understanding Amazon Inspector.srt |
4,458 |
EBB5725C |
AWS Enterprise Security\06 - Internal Detective Controls\06 - Understanding AWS Macie.mp4
[e4c6fa4c6441018c]
|
13,214,554 |
9A10301A |
AWS Enterprise Security\06 - Internal Detective Controls\10 - Understanding Amazon Inspector.mp4
[f0b583e8c09b7491]
|
5,027,585 |
F93F07E3 |
AWS Enterprise Security\06 - Internal Detective Controls\04 - Understanding AWS GuardDuty.mp4
[78fb43f4d723dd0d]
|
9,617,924 |
1F69BC83 |
AWS Enterprise Security\06 - Internal Detective Controls\11 - Exploring Amazon Inspector.mp4
[8956748b73b1b544]
|
13,533,526 |
107FAABF |
AWS Enterprise Security\06 - Internal Detective Controls\02 - Enabling AWS Config.srt |
5,351 |
281E272D |
AWS Enterprise Security\06 - Internal Detective Controls\01 - Understanding AWS Config.mp4
[58923d0cbc89657c]
|
7,788,548 |
AF00F124 |
AWS Enterprise Security\06 - Internal Detective Controls\11 - Exploring Amazon Inspector.srt |
6,448 |
5EC8AD3A |
AWS Enterprise Security\06 - Internal Detective Controls\05 - Exploring AWS GuardDuty.mp4
[4019108e8937adcf]
|
13,507,415 |
A2145965 |
AWS Enterprise Security\06 - Internal Detective Controls\07 - Understanding IAM Access Analyzer.mp4
[3e2802d638db8d00]
|
8,150,358 |
4A855C02 |
AWS Enterprise Security\06 - Internal Detective Controls\09 - Exploring Amazon Detective.mp4
[1a2bd02c438f6403]
|
14,346,584 |
98C52E6F |
AWS Enterprise Security\05 - Key Management\04 - Using KMS and an IAM role.srt |
5,553 |
C7DD7686 |
AWS Enterprise Security\05 - Key Management\01 - Understanding Key Management Service.srt |
4,422 |
E2772F80 |
AWS Enterprise Security\05 - Key Management\05 - Automating KMS key rotation.srt |
4,781 |
9BEE3B4A |
AWS Enterprise Security\05 - Key Management\02 - Creating a KMS key.mp4
[13612485fcedb06e]
|
13,397,507 |
8F626630 |
AWS Enterprise Security\05 - Key Management\05 - Automating KMS key rotation.mp4
[ca780e0ab09e9663]
|
5,846,531 |
93C11CFC |
AWS Enterprise Security\05 - Key Management\07 - Understanding Secrets Manager.mp4
[57ffc4d92241f223]
|
3,269,636 |
BB481554 |
AWS Enterprise Security\05 - Key Management\06 - Deleting a KMS key.srt |
5,002 |
994357F4 |
AWS Enterprise Security\05 - Key Management\08 - Using Secrets Manager.srt |
6,347 |
674A2B2A |
AWS Enterprise Security\05 - Key Management\04 - Using KMS and an IAM role.mp4
[3b745f10d596b868]
|
8,973,828 |
7C4FC133 |
AWS Enterprise Security\05 - Key Management\09 - Enabling auto-rotation with Secrets Manager.mp4
[1efd09923b847d5d]
|
11,538,263 |
8BBEC13F |
AWS Enterprise Security\05 - Key Management\01 - Understanding Key Management Service.mp4
[c691206cf27b84fb]
|
5,223,937 |
2F88DFF5 |
AWS Enterprise Security\05 - Key Management\08 - Using Secrets Manager.mp4
[c0a83164dfbe7c76]
|
11,403,096 |
F8CBC6A7 |
AWS Enterprise Security\05 - Key Management\10 - Understanding AWS CloudHSM.mp4
[8458dfe83e2a2572]
|
4,214,363 |
60B5AD50 |
AWS Enterprise Security\05 - Key Management\06 - Deleting a KMS key.mp4
[312758bb8993618a]
|
7,075,329 |
93F40107 |
AWS Enterprise Security\05 - Key Management\03 - Using a KMS in S3.mp4
[eba730527ef9049b]
|
13,162,500 |
12D538F5 |
AWS Enterprise Security\04 - S3 Access Management\09 - Exploring presigned URLs.mp4
[bfa788f0b0a6d3e5]
|
11,961,808 |
A101D308 |
AWS Enterprise Security\04 - S3 Access Management\03 - Managing S3 with IAM.mp4
[a6bda498685c47b8]
|
3,956,228 |
C3B72C9C |
AWS Enterprise Security\04 - S3 Access Management\02 - Accessing S3 privately.mp4
[639f625557f4ebf9]
|
8,219,267 |
7ABE9BDA |
AWS Enterprise Security\04 - S3 Access Management\06 - S3 bucket policies.srt |
6,033 |
22BCB557 |
AWS Enterprise Security\04 - S3 Access Management\04 - Restricting S3 access with IAM.mp4
[8c2c4453dc68acd7]
|
13,405,823 |
2C00C69F |
AWS Enterprise Security\04 - S3 Access Management\08 - Understanding S3 access control lists.mp4
[e1aaa10f7a6dd6a]
|
10,949,977 |
41EDFAA1 |
AWS Enterprise Security\04 - S3 Access Management\03 - Managing S3 with IAM.srt |
3,689 |
A65F1EF0 |
AWS Enterprise Security\04 - S3 Access Management\06 - S3 bucket policies.mp4
[ef4823e10fce4e64]
|
9,950,142 |
46F28F92 |
AWS Enterprise Security\04 - S3 Access Management\07 - Illustrating S3 bucket policies with CLI.srt |
3,542 |
C0037EBA |
AWS Enterprise Security\04 - S3 Access Management\07 - Illustrating S3 bucket policies with CLI.mp4
[f523f670995768bd]
|
4,577,526 |
23A27829 |
AWS Enterprise Security\04 - S3 Access Management\05 - Illustrating EC2 S3 access with IAM.srt |
6,410 |
0296F784 |
AWS Enterprise Security\04 - S3 Access Management\01 - Managing S3 access.mp4
[757fa91ef52e8708]
|
3,721,560 |
CF537C23 |
AWS Enterprise Security\04 - S3 Access Management\05 - Illustrating EC2 S3 access with IAM.mp4
[72a45d1bbade606c]
|
10,518,704 |
B4C0D1B6 |
AWS Enterprise Security\09 - Conclusion\01 - Next steps.srt |
3,295 |
926CFA93 |
AWS Enterprise Security\09 - Conclusion\01 - Next steps.mp4
[73536a4958f6c1bb]
|
3,963,564 |
2D89AAB6 |
AWS Enterprise Security\01 - Introduction\02 - What you should know.mp4
[83e0024cd1ee494a]
|
1,848,662 |
EF21FBCD |
AWS Enterprise Security\01 - Introduction\01 - AWS security overview.mp4
[86c252b566aee31]
|
8,712,963 |
EA47817C |
AWS Enterprise Security\08 - Security Audits in AWS |
0 |
00000000 |
AWS Enterprise Security\Exercise Files |
0 |
00000000 |
AWS Enterprise Security\07 - Additional Protective Tools |
0 |
00000000 |
AWS Enterprise Security\02 - AWS Security Foundations |
0 |
00000000 |
AWS Enterprise Security\03 - Identity and Access Management (IAM) Concepts in AWS |
0 |
00000000 |
AWS Enterprise Security\06 - Internal Detective Controls |
0 |
00000000 |
AWS Enterprise Security\05 - Key Management |
0 |
00000000 |
AWS Enterprise Security\04 - S3 Access Management |
0 |
00000000 |
AWS Enterprise Security\09 - Conclusion |
0 |
00000000 |
AWS Enterprise Security\01 - Introduction |
0 |
00000000 |
AWS Enterprise Security |
0 |
00000000 |
|
Total size: |
639,485,538 |
|
|