AWS Well-Architected Framework Security Pillar\03 - Identity and Security\01 - AWS detective controls for security.srt |
7,048 |
399DF2E6 |
AWS Well-Architected Framework Security Pillar\03 - Identity and Security\03 - Challenge Review a CloudTrail event.srt |
2,334 |
4F752C6F |
AWS Well-Architected Framework Security Pillar\03 - Identity and Security\01 - AWS detective controls for security.mp4
[e2a2afea11841af5]
|
8,204,294 |
78AF9130 |
AWS Well-Architected Framework Security Pillar\03 - Identity and Security\04 - Solution Review a CloudTrail event.mp4
[e97b346fe8f23db1]
|
6,102,705 |
6837F9B4 |
AWS Well-Architected Framework Security Pillar\03 - Identity and Security\02 - Implement an auditing workflow.srt |
5,672 |
C20665DB |
AWS Well-Architected Framework Security Pillar\03 - Identity and Security\04 - Solution Review a CloudTrail event.srt |
2,590 |
72A0039B |
AWS Well-Architected Framework Security Pillar\03 - Identity and Security\03 - Challenge Review a CloudTrail event.mp4
[a3dd052d01e05e0e]
|
2,935,301 |
22362844 |
AWS Well-Architected Framework Security Pillar\03 - Identity and Security\02 - Implement an auditing workflow.mp4
[b19e3961137daf14]
|
6,737,733 |
45E4FC4A |
AWS Well-Architected Framework Security Pillar\05 - Data and Protection\02 - Key AWS services for data protection.mp4
[56021467da00dadf]
|
5,854,553 |
C7B520C7 |
AWS Well-Architected Framework Security Pillar\05 - Data and Protection\04 - Protecting data in transit at AWS.srt |
4,107 |
97C94EDF |
AWS Well-Architected Framework Security Pillar\05 - Data and Protection\02 - Key AWS services for data protection.srt |
4,537 |
A20EAE04 |
AWS Well-Architected Framework Security Pillar\05 - Data and Protection\01 - Data protection methods.srt |
4,040 |
B83EBC79 |
AWS Well-Architected Framework Security Pillar\05 - Data and Protection\05 - Responding to security incidents.srt |
3,996 |
2D41A510 |
AWS Well-Architected Framework Security Pillar\05 - Data and Protection\01 - Data protection methods.mp4
[d454fd2ca84e7e63]
|
3,904,347 |
E5B24799 |
AWS Well-Architected Framework Security Pillar\05 - Data and Protection\04 - Protecting data in transit at AWS.mp4
[45e8416b52100181]
|
5,792,772 |
DBC7EF7A |
AWS Well-Architected Framework Security Pillar\05 - Data and Protection\06 - Managing incident response.srt |
6,430 |
B7B9F809 |
AWS Well-Architected Framework Security Pillar\05 - Data and Protection\07 - Demo Using the Well-Architected tool.mp4
[59bef773175aa25]
|
7,218,179 |
91DD4149 |
AWS Well-Architected Framework Security Pillar\05 - Data and Protection\03 - Protecting your data at rest at AWS.mp4
[4377cbb14bd0e0b4]
|
3,536,045 |
199477D3 |
AWS Well-Architected Framework Security Pillar\05 - Data and Protection\06 - Managing incident response.mp4
[4d75064fcda961a2]
|
10,927,792 |
C86B47B7 |
AWS Well-Architected Framework Security Pillar\05 - Data and Protection\05 - Responding to security incidents.mp4
[9d018c6077812dc]
|
5,446,318 |
82876C67 |
AWS Well-Architected Framework Security Pillar\05 - Data and Protection\07 - Demo Using the Well-Architected tool.srt |
3,681 |
7EDA079A |
AWS Well-Architected Framework Security Pillar\05 - Data and Protection\03 - Protecting your data at rest at AWS.srt |
2,456 |
5BA3F294 |
AWS Well-Architected Framework Security Pillar\02 - Design Principles of the Security Pillar\04 - Demo IAM security overview.srt |
6,366 |
0B936EE0 |
AWS Well-Architected Framework Security Pillar\02 - Design Principles of the Security Pillar\04 - Demo IAM security overview.mp4
[38237beaa398308f]
|
13,930,682 |
E787300D |
AWS Well-Architected Framework Security Pillar\02 - Design Principles of the Security Pillar\01 - Security pillar overview.srt |
3,762 |
474CFB94 |
AWS Well-Architected Framework Security Pillar\02 - Design Principles of the Security Pillar\06 - Identify threats Detective controls.srt |
5,776 |
5B8B9AC1 |
AWS Well-Architected Framework Security Pillar\02 - Design Principles of the Security Pillar\06 - Identify threats Detective controls.mp4
[5a81f0f7483be8b0]
|
6,073,176 |
8C22C14E |
AWS Well-Architected Framework Security Pillar\02 - Design Principles of the Security Pillar\03 - Identity and Access Management.mp4
[463190c8e49b5aa8]
|
5,329,071 |
B2236C8F |
AWS Well-Architected Framework Security Pillar\02 - Design Principles of the Security Pillar\02 - Design principles.mp4
[6ad29d173ea87ab1]
|
14,353,752 |
3823FB11 |
AWS Well-Architected Framework Security Pillar\02 - Design Principles of the Security Pillar\03 - Identity and Access Management.srt |
4,665 |
CF933690 |
AWS Well-Architected Framework Security Pillar\02 - Design Principles of the Security Pillar\05 - Protecting AWS credentials.mp4
[92713cbb672a2f8b]
|
6,861,488 |
8D463DEB |
AWS Well-Architected Framework Security Pillar\02 - Design Principles of the Security Pillar\01 - Security pillar overview.mp4
[8fe808f43f0e9d73]
|
6,372,198 |
BC13D4E8 |
AWS Well-Architected Framework Security Pillar\02 - Design Principles of the Security Pillar\05 - Protecting AWS credentials.srt |
6,011 |
3894007C |
AWS Well-Architected Framework Security Pillar\02 - Design Principles of the Security Pillar\02 - Design principles.srt |
10,488 |
1217C6F3 |
AWS Well-Architected Framework Security Pillar\06 - Conclusion\01 - Next steps.srt |
1,435 |
CA045C8F |
AWS Well-Architected Framework Security Pillar\06 - Conclusion\01 - Next steps.mp4
[e96aeaa3686e7a94]
|
3,030,022 |
86B7AE2A |
AWS Well-Architected Framework Security Pillar\01 - Introduction\02 - What you should know.srt |
2,322 |
0CB93C05 |
AWS Well-Architected Framework Security Pillar\01 - Introduction\01 - Understanding the AWS Well-Architected Framework The security pillar.mp4
[47b375bfd30f34c1]
|
5,379,073 |
C1103AAB |
AWS Well-Architected Framework Security Pillar\01 - Introduction\02 - What you should know.mp4
[429cada9f6cbb09e]
|
2,299,224 |
9DB2A230 |
AWS Well-Architected Framework Security Pillar\01 - Introduction\01 - Understanding the AWS Well-Architected Framework The security pillar.srt |
1,720 |
9F3D070D |
AWS Well-Architected Framework Security Pillar\04 - Auditing\02 - Infrastructure protection.mp4
[6ddba455ac811e4]
|
8,474,626 |
38BDB7EC |
AWS Well-Architected Framework Security Pillar\04 - Auditing\01 - Auditing and notifications.srt |
6,826 |
AA4DB127 |
AWS Well-Architected Framework Security Pillar\04 - Auditing\02 - Infrastructure protection.srt |
7,604 |
3FDACDC1 |
AWS Well-Architected Framework Security Pillar\04 - Auditing\03 - Key AWS services for infrastucture protection.mp4
[2f5012978ee9c181]
|
10,316,119 |
1A3B4E68 |
AWS Well-Architected Framework Security Pillar\04 - Auditing\01 - Auditing and notifications.mp4
[9ead15aa4a7beda4]
|
9,002,328 |
93C789BC |
AWS Well-Architected Framework Security Pillar\04 - Auditing\03 - Key AWS services for infrastucture protection.srt |
7,401 |
76084F45 |
AWS Well-Architected Framework Security Pillar\03 - Identity and Security |
0 |
00000000 |
AWS Well-Architected Framework Security Pillar\05 - Data and Protection |
0 |
00000000 |
AWS Well-Architected Framework Security Pillar\02 - Design Principles of the Security Pillar |
0 |
00000000 |
AWS Well-Architected Framework Security Pillar\06 - Conclusion |
0 |
00000000 |
AWS Well-Architected Framework Security Pillar\01 - Introduction |
0 |
00000000 |
AWS Well-Architected Framework Security Pillar\04 - Auditing |
0 |
00000000 |
AWS Well-Architected Framework Security Pillar |
0 |
00000000 |
|
Total size: |
158,193,065 |
|