搜索
Lynda - AWS for Architects - Advanced Security
磁力链接/BT种子名称
Lynda - AWS for Architects - Advanced Security
磁力链接/BT种子简介
种子哈希:
c960c4f55c45b3445b382583e740bf8b1d70b543
文件大小:
398.15M
已经下载:
3871
次
下载速度:
极快
收录时间:
2018-05-29
最近下载:
2025-08-20
移花宫入口
移花宫.com
邀月.com
怜星.com
花无缺.com
yhgbt.icu
yhgbt.top
磁力链接下载
magnet:?xt=urn:btih:C960C4F55C45B3445B382583E740BF8B1D70B543
推荐使用
PIKPAK网盘
下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看
下载BT种子文件
磁力链接
迅雷下载
PIKPAK在线播放
世界之窗
91视频
含羞草
欲漫涩
逼哩逼哩
成人快手
51品茶
抖阴破解版
极乐禁地
91短视频
TikTok成人版
PornHub
草榴社区
哆哔涩漫
呦乐园
萝莉岛
最近搜索
茜茜
三更半夜强爆了正在熟睡的妈妈
伟大的
诱惑大秀
换妻性爱
+ogpp-011
单位少妇
撸开
会所
小混混
【小梦梦】
训练
何妹妹
国模视频
くると
合法
极品的气质
fsdss
[1234vv.com]
ssni-943-uncensored
你的鸡巴
誘惑教師に恋をする
淫術之館
酒店偷拍流出
超炮机
816996
美丝社
羽咲美晴
誌騙った
黑皮妹
文件列表
4.4. Implement Data Protection/30.Use Macie to locate sensitive data.mp4
24.5 MB
0.Introduction/01.Welcome.mp4
9.1 MB
0.Introduction/02.What you should know.en.srt
1.9 kB
0.Introduction/02.What you should know.mp4
1.5 MB
0.Introduction/03.About using cloud services.en.srt
1.9 kB
0.Introduction/03.About using cloud services.mp4
1.3 MB
1.1. Implement Core Security Tasks/04.AWS Shared Security Responsibility Model overview.en.srt
4.1 kB
1.1. Implement Core Security Tasks/04.AWS Shared Security Responsibility Model overview.mp4
5.3 MB
1.1. Implement Core Security Tasks/05.Well-architected five security principles.en.srt
8.8 kB
1.1. Implement Core Security Tasks/05.Well-architected five security principles.mp4
9.0 MB
1.1. Implement Core Security Tasks/06.Core AWS account tools.en.srt
2.7 kB
1.1. Implement Core Security Tasks/06.Core AWS account tools.mp4
2.4 MB
1.1. Implement Core Security Tasks/07.Core AWS IAM objects.en.srt
6.2 kB
1.1. Implement Core Security Tasks/07.Core AWS IAM objects.mp4
7.9 MB
1.1. Implement Core Security Tasks/08.AWS organizations and root account.en.srt
9.9 kB
1.1. Implement Core Security Tasks/08.AWS organizations and root account.mp4
15.9 MB
1.1. Implement Core Security Tasks/09.Object tagging.en.srt
4.0 kB
1.1. Implement Core Security Tasks/09.Object tagging.mp4
8.5 MB
1.1. Implement Core Security Tasks/10.Billing management.en.srt
3.0 kB
1.1. Implement Core Security Tasks/10.Billing management.mp4
6.0 MB
1.1. Implement Core Security Tasks/11.CloudWatch logs and alerts.en.srt
11.0 kB
1.1. Implement Core Security Tasks/11.CloudWatch logs and alerts.mp4
17.6 MB
1.1. Implement Core Security Tasks/12.CloudTrail analysis with Athena.en.srt
5.3 kB
1.1. Implement Core Security Tasks/12.CloudTrail analysis with Athena.mp4
9.6 MB
1.1. Implement Core Security Tasks/13.Trusted Advisor security alerts.en.srt
4.9 kB
1.1. Implement Core Security Tasks/13.Trusted Advisor security alerts.mp4
6.7 MB
2.2. Implement Identity and Access Management/14.IAM users and groups.en.srt
12.7 kB
2.2. Implement Identity and Access Management/14.IAM users and groups.mp4
13.8 MB
2.2. Implement Identity and Access Management/15.IAM policies.en.srt
8.6 kB
2.2. Implement Identity and Access Management/15.IAM policies.mp4
10.4 MB
2.2. Implement Identity and Access Management/16.IAM roles.en.srt
11.4 kB
2.2. Implement Identity and Access Management/16.IAM roles.mp4
13.7 MB
2.2. Implement Identity and Access Management/17.Design user authentication.en.srt
7.9 kB
2.2. Implement Identity and Access Management/17.Design user authentication.mp4
8.6 MB
2.2. Implement Identity and Access Management/18.User authentication using AWS Simple AD.en.srt
4.6 kB
2.2. Implement Identity and Access Management/18.User authentication using AWS Simple AD.mp4
5.6 MB
2.2. Implement Identity and Access Management/19.Secure authentication with Cognito.en.srt
15.2 kB
2.2. Implement Identity and Access Management/19.Secure authentication with Cognito.mp4
23.4 MB
2.2. Implement Identity and Access Management/20.Secure user authentication using AD Federation.en.srt
5.4 kB
2.2. Implement Identity and Access Management/20.Secure user authentication using AD Federation.mp4
5.1 MB
3.3. Implement Infrastructure Protection/21.Infrastructure and threat models.en.srt
9.0 kB
3.3. Implement Infrastructure Protection/21.Infrastructure and threat models.mp4
8.8 MB
3.3. Implement Infrastructure Protection/22.VPC and security groups.en.srt
10.0 kB
3.3. Implement Infrastructure Protection/22.VPC and security groups.mp4
17.1 MB
3.3. Implement Infrastructure Protection/23.VPC Flow Logs and GuardDuty.en.srt
4.5 kB
3.3. Implement Infrastructure Protection/23.VPC Flow Logs and GuardDuty.mp4
6.6 MB
3.3. Implement Infrastructure Protection/24.Certificate Manager and WAF to secure load balancers.en.srt
9.2 kB
3.3. Implement Infrastructure Protection/24.Certificate Manager and WAF to secure load balancers.mp4
15.6 MB
3.3. Implement Infrastructure Protection/25.Inspector to monitor EC2 configurations.en.srt
6.4 kB
3.3. Implement Infrastructure Protection/25.Inspector to monitor EC2 configurations.mp4
7.4 MB
3.3. Implement Infrastructure Protection/26.Config for locking service deployment.en.srt
7.8 kB
3.3. Implement Infrastructure Protection/26.Config for locking service deployment.mp4
12.1 MB
3.3. Implement Infrastructure Protection/27.Service Catalog for AMI deployment.en.srt
9.7 kB
3.3. Implement Infrastructure Protection/27.Service Catalog for AMI deployment.mp4
21.4 MB
3.3. Implement Infrastructure Protection/28.Systems Manager for OS management.en.srt
14.2 kB
3.3. Implement Infrastructure Protection/28.Systems Manager for OS management.mp4
23.7 MB
4.4. Implement Data Protection/29.Data classification and protection.en.srt
5.1 kB
4.4. Implement Data Protection/29.Data classification and protection.mp4
4.8 MB
4.4. Implement Data Protection/30.Use Macie to locate sensitive data.en.srt
14.5 kB
0.Introduction/01.Welcome.en.srt
2.6 kB
4.4. Implement Data Protection/31.Encryption on AWS.en.srt
8.8 kB
4.4. Implement Data Protection/31.Encryption on AWS.mp4
8.1 MB
4.4. Implement Data Protection/32.AWS IAM Key Management Service.en.srt
5.2 kB
4.4. Implement Data Protection/32.AWS IAM Key Management Service.mp4
7.7 MB
4.4. Implement Data Protection/33.Data protection at rest in S3.en.srt
13.2 kB
4.4. Implement Data Protection/33.Data protection at rest in S3.mp4
18.1 MB
4.4. Implement Data Protection/34.Encrypt data in transit and VPC endpoints.en.srt
6.5 kB
4.4. Implement Data Protection/34.Encrypt data in transit and VPC endpoints.mp4
10.2 MB
4.4. Implement Data Protection/35.Data backup, replication, and recovery.en.srt
5.5 kB
4.4. Implement Data Protection/35.Data backup, replication, and recovery.mp4
7.5 MB
5.5. Implement Application Security/36.Application security concerns.en.srt
5.9 kB
5.5. Implement Application Security/36.Application security concerns.mp4
5.0 MB
5.5. Implement Application Security/37.Secure a serverless website.en.srt
4.6 kB
5.5. Implement Application Security/37.Secure a serverless website.mp4
3.9 MB
5.5. Implement Application Security/38.Secure a dynamic website.en.srt
3.8 kB
5.5. Implement Application Security/38.Secure a dynamic website.mp4
3.4 MB
5.5. Implement Application Security/39.Secure an internal business application.en.srt
6.6 kB
5.5. Implement Application Security/39.Secure an internal business application.mp4
5.9 MB
5.5. Implement Application Security/40.Secure a big data pipeline.en.srt
5.6 kB
5.5. Implement Application Security/40.Secure a big data pipeline.mp4
4.7 MB
5.5. Implement Application Security/41.Secure an IoT and machine learning application.en.srt
5.1 kB
5.5. Implement Application Security/41.Secure an IoT and machine learning application.mp4
5.2 MB
5.5. Implement Application Security/42.Prepare for a security audit.en.srt
7.8 kB
5.5. Implement Application Security/42.Prepare for a security audit.mp4
8.9 MB
6.Conclusion/43.Next steps.en.srt
2.2 kB
6.Conclusion/43.Next steps.mp4
5.0 MB
随机展示
相关说明
本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!