• U: Anonymous
  • D: 2018-01-24 10:03:19
  • C: Unknown

RELEASE >

ReScene version pyReScene Auto 0.6 XQZT File size CRC
Download
21,681
Stored files
1,323 E007CE6C
310 6E474920
RAR-files
lawsds-c049-xqzt.rar 50,000,000 3FF004E3
lawsds-c049-xqzt.r00 50,000,000 E76547DE
lawsds-c049-xqzt.r01 50,000,000 7EAB0E42
lawsds-c049-xqzt.r02 50,000,000 F7133AAA
lawsds-c049-xqzt.r03 50,000,000 A3A68763
lawsds-c049-xqzt.r04 50,000,000 46065F80
lawsds-c049-xqzt.r05 50,000,000 0F1DC400
lawsds-c049-xqzt.r06 50,000,000 A85915A9
lawsds-c049-xqzt.r07 50,000,000 AEE21022
lawsds-c049-xqzt.r08 28,533,020 CF466C23

Total size: 478,533,020
Archived files
Amazon Web Services - Data Security\Exercise Files\Ex_Files_AWS_Data_Security.zip 7,562 FA228F50
Amazon Web Services - Data Security\1.Introduction\02.About using cloud services.mp4 [26887095d9b54cc] 1,399,905 18AEF3C8
Amazon Web Services - Data Security\1.Introduction\03.How to use the exercise files.en.srt 833 9577A72A
Amazon Web Services - Data Security\1.Introduction\01.Welcome.en.srt 1,717 59BEFACF
Amazon Web Services - Data Security\1.Introduction\03.How to use the exercise files.mp4 [e9257cbdceaec401] 723,885 A4495FB0
Amazon Web Services - Data Security\1.Introduction\02.About using cloud services.en.srt 2,011 B1482638
Amazon Web Services - Data Security\1.Introduction\01.Welcome.mp4 [1e2ef7fc72a8b633] 7,369,452 665CD443
Amazon Web Services - Data Security\8.Conclusion\48.Next steps.mp4 [64d51b8798b453f] 6,799,816 65C34CE5
Amazon Web Services - Data Security\8.Conclusion\48.Next steps.en.srt 3,824 778B1ED1
Amazon Web Services - Data Security\6.5. Security Scenarios and Tradeoffs\34.Third-party data security tools.en.srt 17,020 9E7E2E1B
Amazon Web Services - Data Security\6.5. Security Scenarios and Tradeoffs\36.Scenario 1 - Public website security.en.srt 11,239 FD50C27F
Amazon Web Services - Data Security\6.5. Security Scenarios and Tradeoffs\34.Third-party data security tools.mp4 [8d466614b01bfb1b] 25,919,266 ED4ADECB
Amazon Web Services - Data Security\6.5. Security Scenarios and Tradeoffs\37.Scenario 2 - Data pipeline security.mp4 [ab1e2d3b24994559] 7,440,695 AF0A33CF
Amazon Web Services - Data Security\6.5. Security Scenarios and Tradeoffs\39.Scenario 4 - IoT application security.mp4 [e78327d0f48a1777] 9,511,938 09087321
Amazon Web Services - Data Security\6.5. Security Scenarios and Tradeoffs\39.Scenario 4 - IoT application security.en.srt 9,872 1B89ED1E
Amazon Web Services - Data Security\6.5. Security Scenarios and Tradeoffs\35.AWS cloud compliance.en.srt 5,354 6CA2545A
Amazon Web Services - Data Security\6.5. Security Scenarios and Tradeoffs\40.Summary of AWS security practices.en.srt 5,980 45417BC1
Amazon Web Services - Data Security\6.5. Security Scenarios and Tradeoffs\36.Scenario 1 - Public website security.mp4 [79697d0a60860e33] 11,729,381 954EE4FB
Amazon Web Services - Data Security\6.5. Security Scenarios and Tradeoffs\35.AWS cloud compliance.mp4 [97947450a4a2a25f] 9,825,410 D50EC84D
Amazon Web Services - Data Security\6.5. Security Scenarios and Tradeoffs\38.Scenario 3 - Data lake security.mp4 [822b7952ddfdd28a] 8,036,079 FD39832D
Amazon Web Services - Data Security\6.5. Security Scenarios and Tradeoffs\40.Summary of AWS security practices.mp4 [17e5bed9c8cd732d] 7,043,759 1281AE29
Amazon Web Services - Data Security\6.5. Security Scenarios and Tradeoffs\37.Scenario 2 - Data pipeline security.en.srt 7,939 2413A75E
Amazon Web Services - Data Security\6.5. Security Scenarios and Tradeoffs\38.Scenario 3 - Data lake security.en.srt 8,746 CC4903DA
Amazon Web Services - Data Security\4.3. Design Concepts for Encryption\19.Client-side vs. server-side encryption.mp4 [7dda53845fc0bfea] 5,964,524 57870BE2
Amazon Web Services - Data Security\4.3. Design Concepts for Encryption\17.Understanding encryption.en.srt 10,124 2E5A8516
Amazon Web Services - Data Security\4.3. Design Concepts for Encryption\19.Client-side vs. server-side encryption.en.srt 6,764 FB07003D
Amazon Web Services - Data Security\4.3. Design Concepts for Encryption\21.Design PCI DSS requirements.en.srt 4,331 158C4015
Amazon Web Services - Data Security\4.3. Design Concepts for Encryption\22.Encryption concepts summary.en.srt 6,494 3DD7555C
Amazon Web Services - Data Security\4.3. Design Concepts for Encryption\20.Encryption at rest and in transit.en.srt 9,326 544B17E1
Amazon Web Services - Data Security\4.3. Design Concepts for Encryption\18.Understanding encryption keys.mp4 [8a932d79aec80e59] 11,434,988 A702C537
Amazon Web Services - Data Security\4.3. Design Concepts for Encryption\22.Encryption concepts summary.mp4 [189c59b297b13695] 8,393,218 04553A78
Amazon Web Services - Data Security\4.3. Design Concepts for Encryption\17.Understanding encryption.mp4 [90303c2be83eef0a] 8,386,185 E58BDD32
Amazon Web Services - Data Security\4.3. Design Concepts for Encryption\21.Design PCI DSS requirements.mp4 [f2be54d298a7140c] 4,881,866 74705830
Amazon Web Services - Data Security\4.3. Design Concepts for Encryption\18.Understanding encryption keys.en.srt 11,366 1D1B33D7
Amazon Web Services - Data Security\4.3. Design Concepts for Encryption\20.Encryption at rest and in transit.mp4 [b0d88929e15080bf] 7,776,604 BD48A470
Amazon Web Services - Data Security\2.1. Design Concepts for Security\07.Use negative use cases.mp4 [67f127b94ffc465] 5,142,021 DA0768A5
Amazon Web Services - Data Security\2.1. Design Concepts for Security\04.AWS data security design concepts.en.srt 6,910 F6E0BA2C
Amazon Web Services - Data Security\2.1. Design Concepts for Security\05.Understand the AWS shared security model.en.srt 9,265 31ED80A9
Amazon Web Services - Data Security\2.1. Design Concepts for Security\05.Understand the AWS shared security model.mp4 [4a1805c5c3bdb3b6] 8,654,303 EDD90DA5
Amazon Web Services - Data Security\2.1. Design Concepts for Security\08.Design using a threat model.mp4 [24ed0135f3602a55] 9,401,175 E1D56A18
Amazon Web Services - Data Security\2.1. Design Concepts for Security\06.Design using a data flow diagram.mp4 [7e29dd23671d2306] 5,584,951 7B2361AB
Amazon Web Services - Data Security\2.1. Design Concepts for Security\04.AWS data security design concepts.mp4 [ee69641baa296a7f] 5,964,252 D8E9B20F
Amazon Web Services - Data Security\2.1. Design Concepts for Security\08.Design using a threat model.en.srt 9,913 D1DDBC2E
Amazon Web Services - Data Security\2.1. Design Concepts for Security\06.Design using a data flow diagram.en.srt 6,430 40C9C68C
Amazon Web Services - Data Security\2.1. Design Concepts for Security\07.Use negative use cases.en.srt 5,563 36C7A492
Amazon Web Services - Data Security\5.4. Design Encryption with AWS Services\23.What is a customer master key (CMK).en.srt 6,144 B1DF2048
Amazon Web Services - Data Security\5.4. Design Encryption with AWS Services\23.What is a customer master key (CMK).mp4 [ab87e9599664d7cb] 6,506,531 EADD3BA9
Amazon Web Services - Data Security\5.4. Design Encryption with AWS Services\30.Design encryption for RDS data.mp4 [4cb508513fdddd66] 6,032,861 4E25669A
Amazon Web Services - Data Security\5.4. Design Encryption with AWS Services\24.Design encryption with KMS.mp4 [1b37ce0d1b183fcb] 5,986,400 A0FCEDCE
Amazon Web Services - Data Security\5.4. Design Encryption with AWS Services\29.Design encryption with S3 for files.mp4 [e581b2418c3dd59f] 9,319,531 848C8BBE
Amazon Web Services - Data Security\5.4. Design Encryption with AWS Services\31.Design encryption for EC2 EBS volumes.mp4 [6c932abd200628ff] 5,597,824 A6E2F91D
Amazon Web Services - Data Security\5.4. Design Encryption with AWS Services\33.Encryption with Certificate Manager.mp4 [4b587fce1309f952] 13,338,333 1642F7EE
Amazon Web Services - Data Security\5.4. Design Encryption with AWS Services\25.Use KMS.mp4 [db27bffa38af743b] 7,495,647 5723022B
Amazon Web Services - Data Security\5.4. Design Encryption with AWS Services\28.Identify sensitive data using AWS Macie.mp4 [af0a3656e4a0d8b7] 29,577,153 DB9DD8F5
Amazon Web Services - Data Security\5.4. Design Encryption with AWS Services\29.Design encryption with S3 for files.en.srt 8,654 A6371E4D
Amazon Web Services - Data Security\5.4. Design Encryption with AWS Services\27.Understand CloudHSM.en.srt 7,793 861E3BB3
Amazon Web Services - Data Security\5.4. Design Encryption with AWS Services\26.Understand KMS policies and key caching.mp4 [dbce77c20d3bdc3b] 7,497,467 D72BBB37
Amazon Web Services - Data Security\5.4. Design Encryption with AWS Services\27.Understand CloudHSM.mp4 [79846d11f52574ae] 9,084,538 12417E7B
Amazon Web Services - Data Security\5.4. Design Encryption with AWS Services\28.Identify sensitive data using AWS Macie.en.srt 16,127 CE61731C
Amazon Web Services - Data Security\5.4. Design Encryption with AWS Services\30.Design encryption for RDS data.en.srt 3,846 0B1D2ED0
Amazon Web Services - Data Security\5.4. Design Encryption with AWS Services\26.Understand KMS policies and key caching.en.srt 7,032 85A42F0B
Amazon Web Services - Data Security\5.4. Design Encryption with AWS Services\32.Design encryption for IoT devices.en.srt 10,373 8C1590E3
Amazon Web Services - Data Security\5.4. Design Encryption with AWS Services\31.Design encryption for EC2 EBS volumes.en.srt 4,194 E88EFE1B
Amazon Web Services - Data Security\5.4. Design Encryption with AWS Services\24.Design encryption with KMS.en.srt 5,243 083952D1
Amazon Web Services - Data Security\5.4. Design Encryption with AWS Services\32.Design encryption for IoT devices.mp4 [db510f9c12467bae] 11,847,413 02ABAC00
Amazon Web Services - Data Security\5.4. Design Encryption with AWS Services\25.Use KMS.en.srt 3,706 2F3112FA
Amazon Web Services - Data Security\5.4. Design Encryption with AWS Services\33.Encryption with Certificate Manager.en.srt 9,700 9FE8D566
Amazon Web Services - Data Security\7.6. Design for Disaster Recovery Services\45.Extend backups via Storage Gateway.en.srt 6,297 A3577320
Amazon Web Services - Data Security\7.6. Design for Disaster Recovery Services\42.Disaster recovery patterns for data.mp4 [d0693c06e788cf69] 7,924,690 0251D182
Amazon Web Services - Data Security\7.6. Design for Disaster Recovery Services\44.Recover data with AWS Import_Export.mp4 [1fe8c5ac2b1de7f3] 10,208,136 9EEE6E7C
Amazon Web Services - Data Security\7.6. Design for Disaster Recovery Services\46.Recover DNS with Route 53.mp4 [c1b9c522660a4c3a] 7,743,778 520DF6C5
Amazon Web Services - Data Security\7.6. Design for Disaster Recovery Services\46.Recover DNS with Route 53.en.srt 5,974 85100163
Amazon Web Services - Data Security\7.6. Design for Disaster Recovery Services\41.Disaster recovery areas and metrics.mp4 [b3d3b688ad505fda] 4,756,925 49B1B201
Amazon Web Services - Data Security\7.6. Design for Disaster Recovery Services\47.Disaster recovery practices.mp4 [83cd1d2cd6e4885] 6,165,157 DC02D254
Amazon Web Services - Data Security\7.6. Design for Disaster Recovery Services\44.Recover data with AWS Import_Export.en.srt 9,030 2F5DFFDA
Amazon Web Services - Data Security\7.6. Design for Disaster Recovery Services\43.Recover EC2 with EBS and more.en.srt 9,095 53E6FF63
Amazon Web Services - Data Security\7.6. Design for Disaster Recovery Services\47.Disaster recovery practices.en.srt 7,235 CFB833A9
Amazon Web Services - Data Security\7.6. Design for Disaster Recovery Services\43.Recover EC2 with EBS and more.mp4 [a26b08f42dd160c7] 11,749,434 FFE9F862
Amazon Web Services - Data Security\7.6. Design for Disaster Recovery Services\41.Disaster recovery areas and metrics.en.srt 6,099 03954A14
Amazon Web Services - Data Security\7.6. Design for Disaster Recovery Services\45.Extend backups via Storage Gateway.mp4 [bfdd957de809bd0e] 7,088,880 922DB106
Amazon Web Services - Data Security\7.6. Design for Disaster Recovery Services\42.Disaster recovery patterns for data.en.srt 8,853 D3466897
Amazon Web Services - Data Security\3.2. Design Security with AWS Services\09.Core AWS security services.en.srt 10,277 DDF0E4A7
Amazon Web Services - Data Security\3.2. Design Security with AWS Services\11.IAM root account.mp4 [7102ce68e6da5222] 12,748,406 B2F960E6
Amazon Web Services - Data Security\3.2. Design Security with AWS Services\16.Design security for VPC.mp4 [a4643604bc8963] 22,528,078 69C6194E
Amazon Web Services - Data Security\3.2. Design Security with AWS Services\13.Security with CloudWatch and CloudTrail.mp4 [1e10d8b62d61fd2a] 20,986,052 16F587DE
Amazon Web Services - Data Security\3.2. Design Security with AWS Services\12.Design security with IAM - Policies.en.srt 10,955 5739E088
Amazon Web Services - Data Security\3.2. Design Security with AWS Services\11.IAM root account.en.srt 8,544 50DE578A
Amazon Web Services - Data Security\3.2. Design Security with AWS Services\15.Design security for EC2 with WAF.mp4 [829a971553ea8ba] 10,222,356 54742D2F
Amazon Web Services - Data Security\3.2. Design Security with AWS Services\13.Security with CloudWatch and CloudTrail.en.srt 13,687 770CC749
Amazon Web Services - Data Security\3.2. Design Security with AWS Services\10.Design security with IAM - Users and roles.en.srt 10,140 7C96FD46
Amazon Web Services - Data Security\3.2. Design Security with AWS Services\14.Design security for EC2 with Inspector.en.srt 8,680 806EC991
Amazon Web Services - Data Security\3.2. Design Security with AWS Services\10.Design security with IAM - Users and roles.mp4 [a69ae7327e28b90b] 19,445,340 535C2A14
Amazon Web Services - Data Security\3.2. Design Security with AWS Services\14.Design security for EC2 with Inspector.mp4 [e098ef8df881a0f5] 12,149,364 D59566B9
Amazon Web Services - Data Security\3.2. Design Security with AWS Services\12.Design security with IAM - Policies.mp4 [7cbdf80801d5afb8] 17,063,919 FAF73E4C
Amazon Web Services - Data Security\3.2. Design Security with AWS Services\16.Design security for VPC.en.srt 16,606 24B8DFFD
Amazon Web Services - Data Security\3.2. Design Security with AWS Services\15.Design security for EC2 with WAF.en.srt 7,296 09525D5C
Amazon Web Services - Data Security\3.2. Design Security with AWS Services\09.Core AWS security services.mp4 [57d61bdfd4f8bf6a] 17,678,275 1F0E9351
Amazon Web Services - Data Security\Exercise Files 0 00000000
Amazon Web Services - Data Security\1.Introduction 0 00000000
Amazon Web Services - Data Security\8.Conclusion 0 00000000
Amazon Web Services - Data Security\6.5. Security Scenarios and Tradeoffs 0 00000000
Amazon Web Services - Data Security\4.3. Design Concepts for Encryption 0 00000000
Amazon Web Services - Data Security\2.1. Design Concepts for Security 0 00000000
Amazon Web Services - Data Security\5.4. Design Encryption with AWS Services 0 00000000
Amazon Web Services - Data Security\7.6. Design for Disaster Recovery Services 0 00000000
Amazon Web Services - Data Security\3.2. Design Security with AWS Services 0 00000000
Amazon Web Services - Data Security 0 00000000

Total size: 478,516,324
RAR Recovery
Not Present
Labels UNKNOWN