RAR-files |
noledge-introduction-to-security-and-architecture-on-aws.rar |
15,000,000 |
FD546AA9 |
noledge-introduction-to-security-and-architecture-on-aws.r00 |
15,000,000 |
79ABACA6 |
noledge-introduction-to-security-and-architecture-on-aws.r01 |
15,000,000 |
058EE5F0 |
noledge-introduction-to-security-and-architecture-on-aws.r02 |
15,000,000 |
11936BE1 |
noledge-introduction-to-security-and-architecture-on-aws.r03 |
15,000,000 |
3566E373 |
noledge-introduction-to-security-and-architecture-on-aws.r04 |
15,000,000 |
34DAE20C |
noledge-introduction-to-security-and-architecture-on-aws.r05 |
15,000,000 |
0AA8ED33 |
noledge-introduction-to-security-and-architecture-on-aws.r06 |
15,000,000 |
923BB05F |
noledge-introduction-to-security-and-architecture-on-aws.r07 |
15,000,000 |
C1666C0F |
noledge-introduction-to-security-and-architecture-on-aws.r08 |
15,000,000 |
80F37683 |
noledge-introduction-to-security-and-architecture-on-aws.r09 |
15,000,000 |
4B970342 |
noledge-introduction-to-security-and-architecture-on-aws.r10 |
15,000,000 |
6542459B |
noledge-introduction-to-security-and-architecture-on-aws.r11 |
15,000,000 |
CF704BDE |
noledge-introduction-to-security-and-architecture-on-aws.r12 |
15,000,000 |
69E6CA6F |
noledge-introduction-to-security-and-architecture-on-aws.r13 |
15,000,000 |
FC91A210 |
noledge-introduction-to-security-and-architecture-on-aws.r14 |
15,000,000 |
C03FE0D3 |
noledge-introduction-to-security-and-architecture-on-aws.r15 |
15,000,000 |
30184558 |
noledge-introduction-to-security-and-architecture-on-aws.r16 |
15,000,000 |
F4215BB8 |
noledge-introduction-to-security-and-architecture-on-aws.r17 |
15,000,000 |
55030ADC |
noledge-introduction-to-security-and-architecture-on-aws.r18 |
2,649,703 |
F2FF625C |
|
Total size: |
287,649,703 |
|
|
Archived
files |
Introduction-to-Security-and-Architecture-on-AWS\05_Disaster_Recovery_on_AWS\26_Selecting_a_Disaster_Recovery_Architecture.mp4
[2dc38a023b5b6ced]
|
4,139,368 |
C382644D |
Introduction-to-Security-and-Architecture-on-AWS\05_Disaster_Recovery_on_AWS\28_Summary.mp4
[25699d9ac3562147]
|
6,834,036 |
44C936A7 |
Introduction-to-Security-and-Architecture-on-AWS\05_Disaster_Recovery_on_AWS\24_Overview.mp4
[9e79da6fbd1540fb]
|
3,799,512 |
E88C4CAF |
Introduction-to-Security-and-Architecture-on-AWS\05_Disaster_Recovery_on_AWS\25_Disaster_Recovery_Architectures.mp4
[b62a68c67e3a3709]
|
8,109,384 |
1AF4EE13 |
Introduction-to-Security-and-Architecture-on-AWS\05_Disaster_Recovery_on_AWS\27_Scenario_Based_Review.mp4
[8c2d494e277a3fbb]
|
3,677,625 |
D849E181 |
Introduction-to-Security-and-Architecture-on-AWS\06_Architecting_Applications_on_Amazon_EC2\29_Overview.mp4
[a68bbf8b984f8e67]
|
1,915,855 |
C93272D5 |
Introduction-to-Security-and-Architecture-on-AWS\06_Architecting_Applications_on_Amazon_EC2\31_Controlling_Access_to_EC2_Instances.mp4
[c52fa30b16668fb9]
|
7,577,943 |
2703B852 |
Introduction-to-Security-and-Architecture-on-AWS\06_Architecting_Applications_on_Amazon_EC2\33_Deploying_Pre_defined_Solutions.mp4
[529392e552c4e0dd]
|
6,387,560 |
9BC79ED1 |
Introduction-to-Security-and-Architecture-on-AWS\06_Architecting_Applications_on_Amazon_EC2\32_Protecting_Infrastructure_from_Attacks.mp4
[8efac825f8451f3a]
|
6,549,612 |
8D291FF6 |
Introduction-to-Security-and-Architecture-on-AWS\06_Architecting_Applications_on_Amazon_EC2\36_Summary.mp4
[620522afaf16d97c]
|
6,082,716 |
AFD52015 |
Introduction-to-Security-and-Architecture-on-AWS\06_Architecting_Applications_on_Amazon_EC2\34_Developer_Tools.mp4
[44889f0e74d07a90]
|
7,263,058 |
095534E2 |
Introduction-to-Security-and-Architecture-on-AWS\06_Architecting_Applications_on_Amazon_EC2\35_Scenario_Based_Review.mp4
[4610d733741d20ed]
|
3,685,334 |
3094FF27 |
Introduction-to-Security-and-Architecture-on-AWS\06_Architecting_Applications_on_Amazon_EC2\30_Scaling_EC2_Infrastructure.mp4
[12ccad792e5c917f]
|
11,602,511 |
2C54AC89 |
Introduction-to-Security-and-Architecture-on-AWS\04_Data_Architecture_on_AWS\21_xa0Integrating_AI_and_Machine_Learning.mp4
[1444dcc4d128620f]
|
6,971,161 |
B6E68C5F |
Introduction-to-Security-and-Architecture-on-AWS\04_Data_Architecture_on_AWS\20_Analyzing_Data.mp4
[bc2f5a76a294160a]
|
6,982,318 |
FDACE0C3 |
Introduction-to-Security-and-Architecture-on-AWS\04_Data_Architecture_on_AWS\23_Summary.mp4
[83cbd12435c79614]
|
4,587,335 |
67D13FB7 |
Introduction-to-Security-and-Architecture-on-AWS\04_Data_Architecture_on_AWS\19_Processing_Data.mp4
[4597b01fd5a85ff2]
|
6,407,140 |
7102EBE5 |
Introduction-to-Security-and-Architecture-on-AWS\04_Data_Architecture_on_AWS\17_Overview.mp4
[40bd94fca58374c9]
|
1,633,351 |
647FA7F5 |
Introduction-to-Security-and-Architecture-on-AWS\04_Data_Architecture_on_AWS\22_Scenario_Based_Review.mp4
[65bde3620c877588]
|
3,572,591 |
B61C7FED |
Introduction-to-Security-and-Architecture-on-AWS\04_Data_Architecture_on_AWS\18_Integrating_On_premise_Data.mp4
[29194d3e184ba94e]
|
5,054,121 |
9030326F |
Introduction-to-Security-and-Architecture-on-AWS\01_Course_Overview\01_Course_Overview.mp4
[63cabe6e59232dad]
|
3,416,960 |
6B87C4C8 |
Introduction-to-Security-and-Architecture-on-AWS\07_The_Certification_Exam\38_Registering_for_the_Exam.mp4
[40ae8e202e4dba95]
|
14,339,518 |
74A36129 |
Introduction-to-Security-and-Architecture-on-AWS\07_The_Certification_Exam\39_Studying_for_and_Taking_the_Exam.mp4
[d1811ce62e6f21b5]
|
8,391,641 |
8EDEB9A0 |
Introduction-to-Security-and-Architecture-on-AWS\07_The_Certification_Exam\37_The_Exam.mp4
[634a8ceee52d4778]
|
23,345,946 |
38FBB909 |
Introduction-to-Security-and-Architecture-on-AWS\exercise_file.zip |
7,071,056 |
CAA67262 |
Introduction-to-Security-and-Architecture-on-AWS\02_AWS_Architecture_Core_Concepts\03_Security_and_Architecture_Overview.mp4
[9bf783ce3404fd97]
|
5,546,543 |
D34C4884 |
Introduction-to-Security-and-Architecture-on-AWS\02_AWS_Architecture_Core_Concepts\07_Compliance.mp4
[a3e5924f427a48a3]
|
11,885,366 |
11869104 |
Introduction-to-Security-and-Architecture-on-AWS\02_AWS_Architecture_Core_Concepts\05_AWS_Well_architected_Framework.mp4
[5bd867cc2263dbba]
|
4,373,213 |
30FC0C1A |
Introduction-to-Security-and-Architecture-on-AWS\02_AWS_Architecture_Core_Concepts\02_Overview.mp4
[2de4ccad74c9c3d1]
|
17,859,360 |
D555948A |
Introduction-to-Security-and-Architecture-on-AWS\02_AWS_Architecture_Core_Concepts\04_Shared_Responsibility_Model.mp4
[c1b5ea0abe6efafb]
|
8,200,383 |
F75098BB |
Introduction-to-Security-and-Architecture-on-AWS\02_AWS_Architecture_Core_Concepts\09_Summary.mp4
[bc976cc16b8b0b8d]
|
4,865,596 |
427000C8 |
Introduction-to-Security-and-Architecture-on-AWS\02_AWS_Architecture_Core_Concepts\08_Scenario_Based_Review.mp4
[4b6062717cfe946d]
|
2,974,678 |
7A3D8879 |
Introduction-to-Security-and-Architecture-on-AWS\02_AWS_Architecture_Core_Concepts\06_High_availability_and_Fault_Tolerance.mp4
[4b677e12017d1b50]
|
4,566,714 |
E33A1F05 |
Introduction-to-Security-and-Architecture-on-AWS\03_AWS_Identities_and_User_Management\12_Creating_and_Managing_IAM_Users.mp4
[eceab10e722a8f9a]
|
14,741,667 |
CC4A3E3F |
Introduction-to-Security-and-Architecture-on-AWS\03_AWS_Identities_and_User_Management\11_Introduction_to_AWS_IAM.mp4
[d7d269d32599770d]
|
12,921,506 |
DD56C672 |
Introduction-to-Security-and-Architecture-on-AWS\03_AWS_Identities_and_User_Management\14_Amazon_Cognito.mp4
[ddd162d37e8f7efb]
|
3,901,957 |
396EADD2 |
Introduction-to-Security-and-Architecture-on-AWS\03_AWS_Identities_and_User_Management\10_Overview.mp4
[b6e6e0e77f183c37]
|
1,780,540 |
1727898D |
Introduction-to-Security-and-Architecture-on-AWS\03_AWS_Identities_and_User_Management\13_Enabling_Multi_factor_Authentication.mp4
[90037f169a9c88d]
|
12,766,139 |
895D5225 |
Introduction-to-Security-and-Architecture-on-AWS\03_AWS_Identities_and_User_Management\16_Summary.mp4
[433b26fb73e5c14c]
|
8,219,622 |
199EBB1D |
Introduction-to-Security-and-Architecture-on-AWS\03_AWS_Identities_and_User_Management\15_Scenario_Based_Review.mp4
[20bb79c7ed110d5d]
|
3,638,393 |
F05207DA |
Introduction-to-Security-and-Architecture-on-AWS\05_Disaster_Recovery_on_AWS |
0 |
00000000 |
Introduction-to-Security-and-Architecture-on-AWS\06_Architecting_Applications_on_Amazon_EC2 |
0 |
00000000 |
Introduction-to-Security-and-Architecture-on-AWS\04_Data_Architecture_on_AWS |
0 |
00000000 |
Introduction-to-Security-and-Architecture-on-AWS\01_Course_Overview |
0 |
00000000 |
Introduction-to-Security-and-Architecture-on-AWS\07_The_Certification_Exam |
0 |
00000000 |
Introduction-to-Security-and-Architecture-on-AWS\02_AWS_Architecture_Core_Concepts |
0 |
00000000 |
Introduction-to-Security-and-Architecture-on-AWS\03_AWS_Identities_and_User_Management |
0 |
00000000 |
Introduction-to-Security-and-Architecture-on-AWS |
0 |
00000000 |
|
Total size: |
287,639,329 |
|
|