搜索
Pluralsight - Architecting for Security on AWS by Ben Piper
磁力链接/BT种子名称
Pluralsight - Architecting for Security on AWS by Ben Piper
磁力链接/BT种子简介
种子哈希:
ff72c73bbde61cfd4124c24ab5eb488ff9a2ae80
文件大小:
688.96M
已经下载:
2755
次
下载速度:
极快
收录时间:
2021-04-03
最近下载:
2025-09-10
移花宫入口
移花宫.com
邀月.com
怜星.com
花无缺.com
yhgbt.icu
yhgbt.top
磁力链接下载
magnet:?xt=urn:btih:FF72C73BBDE61CFD4124C24AB5EB488FF9A2AE80
推荐使用
PIKPAK网盘
下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看
下载BT种子文件
磁力链接
迅雷下载
PIKPAK在线播放
世界之窗
91视频
含羞草
欲漫涩
逼哩逼哩
成人快手
51品茶
抖阴破解版
极乐禁地
91短视频
暗网Xvideo
TikTok成人版
PornHub
听泉鉴鲍
少女日记
草榴社区
哆哔涩漫
呦乐园
萝莉岛
悠悠禁区
悠悠禁区
拔萝卜
疯马秀
最近搜索
白丝熟女
张美人
fc2ppv-4362199
moms+teach+sex
rbd-030
暑期
myb
水滴
狂放
太子胖子探花大长腿
yuki-小优
ใบงานพุทธประวัติ+ป.1
星期三
电影
mary
单男心疼
大白天在家
megapack+-+incest
舞团薇薇
sarina valentina 18 10 18
微视
壁穴
出轨
换妻酒店
家是我
宴
真军
ww
hotumoyi
2024 教程
文件列表
3. Protecting Network and Host-level Boundaries/6. Network Access Control Lists.mp4
40.2 MB
3. Protecting Network and Host-level Boundaries/3. Using SSH Key Pairs.mp4
40.2 MB
3. Protecting Network and Host-level Boundaries/4. Using VPC Endpoints - Part 1.mp4
35.4 MB
3. Protecting Network and Host-level Boundaries/2. Creating and Using an IAM Instance Profile.mp4
31.6 MB
2. Capturing and Analyzing Logs/6. Creating CloudWatch Alarms.mp4
30.3 MB
3. Protecting Network and Host-level Boundaries/5. Using VPC Endpoints - Part 2.mp4
29.9 MB
2. Capturing and Analyzing Logs/2. Configuring CloudTrail to Log AWS Service Operations.mp4
27.8 MB
1. Protecting AWS Credentials/6. Creating an Administrative User.mp4
26.6 MB
5. Protecting Data in Transit/2. Creating a Secure Application Load Balancer.mp4
25.7 MB
2. Capturing and Analyzing Logs/4. Configuring CloudWatch Logs.mp4
25.4 MB
1. Protecting AWS Credentials/3. Locking Down the Root User.mp4
23.8 MB
5. Protecting Data in Transit/1. Preparing for the Load Balancer.mp4
23.4 MB
1. Protecting AWS Credentials/8. Denying Access with User Policies.mp4
23.2 MB
6. Configuring Data Backup, Replication, and Recovery/2. Lifecycle Management.mp4
21.3 MB
2. Capturing and Analyzing Logs/8. Tracking Configuration Changes in AWS Config.mp4
19.3 MB
4. Protecting Data at Rest/2. Encrypting an Unencrypted EBS Volume.mp4
18.6 MB
4. Protecting Data at Rest/3. S3 Access Permissions - Part 1.mp4
17.8 MB
4. Protecting Data at Rest/6. Granting Anonymous Access with Object ACLs and Bucket Policies.mp4
17.8 MB
3. Protecting Network and Host-level Boundaries/1. Creating a Public Subnet.mp4
17.7 MB
2. Capturing and Analyzing Logs/5. Reading CloudTrail Logs Using CloudWatch Logs.mp4
16.6 MB
4. Protecting Data at Rest/1. Creating a Customer Master Key with KMS.mp4
16.4 MB
4. Protecting Data at Rest/5. CloudFront Origin Access Identity.mp4
16.0 MB
2. Capturing and Analyzing Logs/7. Searching Logs with Athena.mp4
15.3 MB
6. Configuring Data Backup, Replication, and Recovery/1. Versioning.mp4
14.2 MB
4. Protecting Data at Rest/7. Encrypting S3 Objects with KMS-managed Keys (SSE-KMS).mp4
12.9 MB
6. Configuring Data Backup, Replication, and Recovery/3. Cross-region Replication.mp4
12.0 MB
4. Protecting Data at Rest/4. S3 Access Permissions - Part 2.mp4
11.8 MB
5. Protecting Data in Transit/0. Introduction to Protecting Data in Transit.mp4
9.8 MB
1. Protecting AWS Credentials/9. Denying Access with Group Policies.mp4
9.7 MB
1. Protecting AWS Credentials/0. Confidentiality, Integrity, and Availability.mp4
8.5 MB
1. Protecting AWS Credentials/1. Course Overview.mp4
7.6 MB
3. Protecting Network and Host-level Boundaries/0. Introduction to Protecting Network and Host-level Boundaries.mp4
7.6 MB
1. Protecting AWS Credentials/7. Using Groups.mp4
5.9 MB
architecting-security-aws.zip
5.0 MB
6. Configuring Data Backup, Replication, and Recovery/5. Course Summary.mp4
4.8 MB
2. Capturing and Analyzing Logs/3. CloudTrail vs. CloudWatch Logs.mp4
4.8 MB
1. Protecting AWS Credentials/10. Summary.mp4
4.7 MB
1. Protecting AWS Credentials/5. Understanding Policies.mp4
4.6 MB
4. Protecting Data at Rest/8. Summary.mp4
4.3 MB
5. Protecting Data in Transit/3. Summary.mp4
4.0 MB
4. Protecting Data at Rest/0. Introduction to Protecting Data at Rest.mp4
3.8 MB
1. Protecting AWS Credentials/2. Understanding AWS Credentials.mp4
3.5 MB
3. Protecting Network and Host-level Boundaries/7. Summary.mp4
3.3 MB
0. Course Overview/0. Course Overview.mp4
3.1 MB
2. Capturing and Analyzing Logs/9. Summary.mp4
3.1 MB
2. Capturing and Analyzing Logs/1. Understanding CloudTrail.mp4
3.1 MB
6. Configuring Data Backup, Replication, and Recovery/0. Introduction to Data Backup, Replication, and Recovery.mp4
2.9 MB
2. Capturing and Analyzing Logs/0. Introduction to Capturing and Analyzing Logs.mp4
2.7 MB
1. Protecting AWS Credentials/4. Introduction to Principals and Policies.mp4
2.6 MB
6. Configuring Data Backup, Replication, and Recovery/4. Summary.mp4
1.7 MB
2. Capturing and Analyzing Logs/6. Creating CloudWatch Alarms.srt
15.1 kB
3. Protecting Network and Host-level Boundaries/6. Network Access Control Lists.srt
15.1 kB
1. Protecting AWS Credentials/8. Denying Access with User Policies.srt
14.9 kB
2. Capturing and Analyzing Logs/2. Configuring CloudTrail to Log AWS Service Operations.srt
14.4 kB
6. Configuring Data Backup, Replication, and Recovery/2. Lifecycle Management.srt
13.9 kB
2. Capturing and Analyzing Logs/4. Configuring CloudWatch Logs.srt
13.8 kB
1. Protecting AWS Credentials/6. Creating an Administrative User.srt
13.6 kB
3. Protecting Network and Host-level Boundaries/2. Creating and Using an IAM Instance Profile.srt
13.3 kB
3. Protecting Network and Host-level Boundaries/3. Using SSH Key Pairs.srt
13.1 kB
5. Protecting Data in Transit/2. Creating a Secure Application Load Balancer.srt
12.4 kB
1. Protecting AWS Credentials/3. Locking Down the Root User.srt
12.1 kB
2. Capturing and Analyzing Logs/8. Tracking Configuration Changes in AWS Config.srt
11.8 kB
3. Protecting Network and Host-level Boundaries/4. Using VPC Endpoints - Part 1.srt
11.5 kB
5. Protecting Data in Transit/1. Preparing for the Load Balancer.srt
11.4 kB
1. Protecting AWS Credentials/0. Confidentiality, Integrity, and Availability.srt
11.2 kB
4. Protecting Data at Rest/3. S3 Access Permissions - Part 1.srt
10.8 kB
5. Protecting Data in Transit/0. Introduction to Protecting Data in Transit.srt
10.2 kB
4. Protecting Data at Rest/6. Granting Anonymous Access with Object ACLs and Bucket Policies.srt
10.2 kB
3. Protecting Network and Host-level Boundaries/5. Using VPC Endpoints - Part 2.srt
10.2 kB
1. Protecting AWS Credentials/1. Course Overview.srt
10.1 kB
4. Protecting Data at Rest/5. CloudFront Origin Access Identity.srt
9.6 kB
2. Capturing and Analyzing Logs/7. Searching Logs with Athena.srt
9.3 kB
4. Protecting Data at Rest/1. Creating a Customer Master Key with KMS.srt
9.2 kB
3. Protecting Network and Host-level Boundaries/0. Introduction to Protecting Network and Host-level Boundaries.srt
9.0 kB
4. Protecting Data at Rest/2. Encrypting an Unencrypted EBS Volume.srt
8.7 kB
6. Configuring Data Backup, Replication, and Recovery/1. Versioning.srt
8.7 kB
3. Protecting Network and Host-level Boundaries/1. Creating a Public Subnet.srt
7.7 kB
6. Configuring Data Backup, Replication, and Recovery/3. Cross-region Replication.srt
7.6 kB
4. Protecting Data at Rest/7. Encrypting S3 Objects with KMS-managed Keys (SSE-KMS).srt
7.2 kB
4. Protecting Data at Rest/4. S3 Access Permissions - Part 2.srt
6.5 kB
2. Capturing and Analyzing Logs/5. Reading CloudTrail Logs Using CloudWatch Logs.srt
6.4 kB
6. Configuring Data Backup, Replication, and Recovery/5. Course Summary.srt
6.3 kB
1. Protecting AWS Credentials/5. Understanding Policies.srt
6.0 kB
1. Protecting AWS Credentials/9. Denying Access with Group Policies.srt
5.6 kB
2. Capturing and Analyzing Logs/3. CloudTrail vs. CloudWatch Logs.srt
5.2 kB
4. Protecting Data at Rest/8. Summary.srt
4.4 kB
5. Protecting Data in Transit/3. Summary.srt
4.4 kB
4. Protecting Data at Rest/0. Introduction to Protecting Data at Rest.srt
4.3 kB
1. Protecting AWS Credentials/10. Summary.srt
4.2 kB
1. Protecting AWS Credentials/2. Understanding AWS Credentials.srt
4.1 kB
6. Configuring Data Backup, Replication, and Recovery/0. Introduction to Data Backup, Replication, and Recovery.srt
3.9 kB
2. Capturing and Analyzing Logs/1. Understanding CloudTrail.srt
3.8 kB
1. Protecting AWS Credentials/7. Using Groups.srt
3.5 kB
2. Capturing and Analyzing Logs/9. Summary.srt
3.4 kB
1. Protecting AWS Credentials/4. Introduction to Principals and Policies.srt
3.4 kB
3. Protecting Network and Host-level Boundaries/7. Summary.srt
3.1 kB
2. Capturing and Analyzing Logs/0. Introduction to Capturing and Analyzing Logs.srt
3.1 kB
content.txt
2.7 kB
0. Course Overview/0. Course Overview.srt
2.1 kB
6. Configuring Data Backup, Replication, and Recovery/4. Summary.srt
2.1 kB
随机展示
相关说明
本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!