Amazon Web Services - Data Security\Exercise Files\Ex_Files_AWS_Data_Security.zip |
7,562 |
FA228F50 |
Amazon Web Services - Data Security\1.Introduction\02.About using cloud services.mp4
[26887095d9b54cc]
|
1,399,905 |
18AEF3C8 |
Amazon Web Services - Data Security\1.Introduction\03.How to use the exercise files.en.srt |
833 |
9577A72A |
Amazon Web Services - Data Security\1.Introduction\01.Welcome.en.srt |
1,717 |
59BEFACF |
Amazon Web Services - Data Security\1.Introduction\03.How to use the exercise files.mp4
[e9257cbdceaec401]
|
723,885 |
A4495FB0 |
Amazon Web Services - Data Security\1.Introduction\02.About using cloud services.en.srt |
2,011 |
B1482638 |
Amazon Web Services - Data Security\1.Introduction\01.Welcome.mp4
[1e2ef7fc72a8b633]
|
7,369,452 |
665CD443 |
Amazon Web Services - Data Security\8.Conclusion\48.Next steps.mp4
[64d51b8798b453f]
|
6,799,816 |
65C34CE5 |
Amazon Web Services - Data Security\8.Conclusion\48.Next steps.en.srt |
3,824 |
778B1ED1 |
Amazon Web Services - Data Security\6.5. Security Scenarios and Tradeoffs\34.Third-party data security tools.en.srt |
17,020 |
9E7E2E1B |
Amazon Web Services - Data Security\6.5. Security Scenarios and Tradeoffs\36.Scenario 1 - Public website security.en.srt |
11,239 |
FD50C27F |
Amazon Web Services - Data Security\6.5. Security Scenarios and Tradeoffs\34.Third-party data security tools.mp4
[8d466614b01bfb1b]
|
25,919,266 |
ED4ADECB |
Amazon Web Services - Data Security\6.5. Security Scenarios and Tradeoffs\37.Scenario 2 - Data pipeline security.mp4
[ab1e2d3b24994559]
|
7,440,695 |
AF0A33CF |
Amazon Web Services - Data Security\6.5. Security Scenarios and Tradeoffs\39.Scenario 4 - IoT application security.mp4
[e78327d0f48a1777]
|
9,511,938 |
09087321 |
Amazon Web Services - Data Security\6.5. Security Scenarios and Tradeoffs\39.Scenario 4 - IoT application security.en.srt |
9,872 |
1B89ED1E |
Amazon Web Services - Data Security\6.5. Security Scenarios and Tradeoffs\35.AWS cloud compliance.en.srt |
5,354 |
6CA2545A |
Amazon Web Services - Data Security\6.5. Security Scenarios and Tradeoffs\40.Summary of AWS security practices.en.srt |
5,980 |
45417BC1 |
Amazon Web Services - Data Security\6.5. Security Scenarios and Tradeoffs\36.Scenario 1 - Public website security.mp4
[79697d0a60860e33]
|
11,729,381 |
954EE4FB |
Amazon Web Services - Data Security\6.5. Security Scenarios and Tradeoffs\35.AWS cloud compliance.mp4
[97947450a4a2a25f]
|
9,825,410 |
D50EC84D |
Amazon Web Services - Data Security\6.5. Security Scenarios and Tradeoffs\38.Scenario 3 - Data lake security.mp4
[822b7952ddfdd28a]
|
8,036,079 |
FD39832D |
Amazon Web Services - Data Security\6.5. Security Scenarios and Tradeoffs\40.Summary of AWS security practices.mp4
[17e5bed9c8cd732d]
|
7,043,759 |
1281AE29 |
Amazon Web Services - Data Security\6.5. Security Scenarios and Tradeoffs\37.Scenario 2 - Data pipeline security.en.srt |
7,939 |
2413A75E |
Amazon Web Services - Data Security\6.5. Security Scenarios and Tradeoffs\38.Scenario 3 - Data lake security.en.srt |
8,746 |
CC4903DA |
Amazon Web Services - Data Security\4.3. Design Concepts for Encryption\19.Client-side vs. server-side encryption.mp4
[7dda53845fc0bfea]
|
5,964,524 |
57870BE2 |
Amazon Web Services - Data Security\4.3. Design Concepts for Encryption\17.Understanding encryption.en.srt |
10,124 |
2E5A8516 |
Amazon Web Services - Data Security\4.3. Design Concepts for Encryption\19.Client-side vs. server-side encryption.en.srt |
6,764 |
FB07003D |
Amazon Web Services - Data Security\4.3. Design Concepts for Encryption\21.Design PCI DSS requirements.en.srt |
4,331 |
158C4015 |
Amazon Web Services - Data Security\4.3. Design Concepts for Encryption\22.Encryption concepts summary.en.srt |
6,494 |
3DD7555C |
Amazon Web Services - Data Security\4.3. Design Concepts for Encryption\20.Encryption at rest and in transit.en.srt |
9,326 |
544B17E1 |
Amazon Web Services - Data Security\4.3. Design Concepts for Encryption\18.Understanding encryption keys.mp4
[8a932d79aec80e59]
|
11,434,988 |
A702C537 |
Amazon Web Services - Data Security\4.3. Design Concepts for Encryption\22.Encryption concepts summary.mp4
[189c59b297b13695]
|
8,393,218 |
04553A78 |
Amazon Web Services - Data Security\4.3. Design Concepts for Encryption\17.Understanding encryption.mp4
[90303c2be83eef0a]
|
8,386,185 |
E58BDD32 |
Amazon Web Services - Data Security\4.3. Design Concepts for Encryption\21.Design PCI DSS requirements.mp4
[f2be54d298a7140c]
|
4,881,866 |
74705830 |
Amazon Web Services - Data Security\4.3. Design Concepts for Encryption\18.Understanding encryption keys.en.srt |
11,366 |
1D1B33D7 |
Amazon Web Services - Data Security\4.3. Design Concepts for Encryption\20.Encryption at rest and in transit.mp4
[b0d88929e15080bf]
|
7,776,604 |
BD48A470 |
Amazon Web Services - Data Security\2.1. Design Concepts for Security\07.Use negative use cases.mp4
[67f127b94ffc465]
|
5,142,021 |
DA0768A5 |
Amazon Web Services - Data Security\2.1. Design Concepts for Security\04.AWS data security design concepts.en.srt |
6,910 |
F6E0BA2C |
Amazon Web Services - Data Security\2.1. Design Concepts for Security\05.Understand the AWS shared security model.en.srt |
9,265 |
31ED80A9 |
Amazon Web Services - Data Security\2.1. Design Concepts for Security\05.Understand the AWS shared security model.mp4
[4a1805c5c3bdb3b6]
|
8,654,303 |
EDD90DA5 |
Amazon Web Services - Data Security\2.1. Design Concepts for Security\08.Design using a threat model.mp4
[24ed0135f3602a55]
|
9,401,175 |
E1D56A18 |
Amazon Web Services - Data Security\2.1. Design Concepts for Security\06.Design using a data flow diagram.mp4
[7e29dd23671d2306]
|
5,584,951 |
7B2361AB |
Amazon Web Services - Data Security\2.1. Design Concepts for Security\04.AWS data security design concepts.mp4
[ee69641baa296a7f]
|
5,964,252 |
D8E9B20F |
Amazon Web Services - Data Security\2.1. Design Concepts for Security\08.Design using a threat model.en.srt |
9,913 |
D1DDBC2E |
Amazon Web Services - Data Security\2.1. Design Concepts for Security\06.Design using a data flow diagram.en.srt |
6,430 |
40C9C68C |
Amazon Web Services - Data Security\2.1. Design Concepts for Security\07.Use negative use cases.en.srt |
5,563 |
36C7A492 |
Amazon Web Services - Data Security\5.4. Design Encryption with AWS Services\23.What is a customer master key (CMK).en.srt |
6,144 |
B1DF2048 |
Amazon Web Services - Data Security\5.4. Design Encryption with AWS Services\23.What is a customer master key (CMK).mp4
[ab87e9599664d7cb]
|
6,506,531 |
EADD3BA9 |
Amazon Web Services - Data Security\5.4. Design Encryption with AWS Services\30.Design encryption for RDS data.mp4
[4cb508513fdddd66]
|
6,032,861 |
4E25669A |
Amazon Web Services - Data Security\5.4. Design Encryption with AWS Services\24.Design encryption with KMS.mp4
[1b37ce0d1b183fcb]
|
5,986,400 |
A0FCEDCE |
Amazon Web Services - Data Security\5.4. Design Encryption with AWS Services\29.Design encryption with S3 for files.mp4
[e581b2418c3dd59f]
|
9,319,531 |
848C8BBE |
Amazon Web Services - Data Security\5.4. Design Encryption with AWS Services\31.Design encryption for EC2 EBS volumes.mp4
[6c932abd200628ff]
|
5,597,824 |
A6E2F91D |
Amazon Web Services - Data Security\5.4. Design Encryption with AWS Services\33.Encryption with Certificate Manager.mp4
[4b587fce1309f952]
|
13,338,333 |
1642F7EE |
Amazon Web Services - Data Security\5.4. Design Encryption with AWS Services\25.Use KMS.mp4
[db27bffa38af743b]
|
7,495,647 |
5723022B |
Amazon Web Services - Data Security\5.4. Design Encryption with AWS Services\28.Identify sensitive data using AWS Macie.mp4
[af0a3656e4a0d8b7]
|
29,577,153 |
DB9DD8F5 |
Amazon Web Services - Data Security\5.4. Design Encryption with AWS Services\29.Design encryption with S3 for files.en.srt |
8,654 |
A6371E4D |
Amazon Web Services - Data Security\5.4. Design Encryption with AWS Services\27.Understand CloudHSM.en.srt |
7,793 |
861E3BB3 |
Amazon Web Services - Data Security\5.4. Design Encryption with AWS Services\26.Understand KMS policies and key caching.mp4
[dbce77c20d3bdc3b]
|
7,497,467 |
D72BBB37 |
Amazon Web Services - Data Security\5.4. Design Encryption with AWS Services\27.Understand CloudHSM.mp4
[79846d11f52574ae]
|
9,084,538 |
12417E7B |
Amazon Web Services - Data Security\5.4. Design Encryption with AWS Services\28.Identify sensitive data using AWS Macie.en.srt |
16,127 |
CE61731C |
Amazon Web Services - Data Security\5.4. Design Encryption with AWS Services\30.Design encryption for RDS data.en.srt |
3,846 |
0B1D2ED0 |
Amazon Web Services - Data Security\5.4. Design Encryption with AWS Services\26.Understand KMS policies and key caching.en.srt |
7,032 |
85A42F0B |
Amazon Web Services - Data Security\5.4. Design Encryption with AWS Services\32.Design encryption for IoT devices.en.srt |
10,373 |
8C1590E3 |
Amazon Web Services - Data Security\5.4. Design Encryption with AWS Services\31.Design encryption for EC2 EBS volumes.en.srt |
4,194 |
E88EFE1B |
Amazon Web Services - Data Security\5.4. Design Encryption with AWS Services\24.Design encryption with KMS.en.srt |
5,243 |
083952D1 |
Amazon Web Services - Data Security\5.4. Design Encryption with AWS Services\32.Design encryption for IoT devices.mp4
[db510f9c12467bae]
|
11,847,413 |
02ABAC00 |
Amazon Web Services - Data Security\5.4. Design Encryption with AWS Services\25.Use KMS.en.srt |
3,706 |
2F3112FA |
Amazon Web Services - Data Security\5.4. Design Encryption with AWS Services\33.Encryption with Certificate Manager.en.srt |
9,700 |
9FE8D566 |
Amazon Web Services - Data Security\7.6. Design for Disaster Recovery Services\45.Extend backups via Storage Gateway.en.srt |
6,297 |
A3577320 |
Amazon Web Services - Data Security\7.6. Design for Disaster Recovery Services\42.Disaster recovery patterns for data.mp4
[d0693c06e788cf69]
|
7,924,690 |
0251D182 |
Amazon Web Services - Data Security\7.6. Design for Disaster Recovery Services\44.Recover data with AWS Import_Export.mp4
[1fe8c5ac2b1de7f3]
|
10,208,136 |
9EEE6E7C |
Amazon Web Services - Data Security\7.6. Design for Disaster Recovery Services\46.Recover DNS with Route 53.mp4
[c1b9c522660a4c3a]
|
7,743,778 |
520DF6C5 |
Amazon Web Services - Data Security\7.6. Design for Disaster Recovery Services\46.Recover DNS with Route 53.en.srt |
5,974 |
85100163 |
Amazon Web Services - Data Security\7.6. Design for Disaster Recovery Services\41.Disaster recovery areas and metrics.mp4
[b3d3b688ad505fda]
|
4,756,925 |
49B1B201 |
Amazon Web Services - Data Security\7.6. Design for Disaster Recovery Services\47.Disaster recovery practices.mp4
[83cd1d2cd6e4885]
|
6,165,157 |
DC02D254 |
Amazon Web Services - Data Security\7.6. Design for Disaster Recovery Services\44.Recover data with AWS Import_Export.en.srt |
9,030 |
2F5DFFDA |
Amazon Web Services - Data Security\7.6. Design for Disaster Recovery Services\43.Recover EC2 with EBS and more.en.srt |
9,095 |
53E6FF63 |
Amazon Web Services - Data Security\7.6. Design for Disaster Recovery Services\47.Disaster recovery practices.en.srt |
7,235 |
CFB833A9 |
Amazon Web Services - Data Security\7.6. Design for Disaster Recovery Services\43.Recover EC2 with EBS and more.mp4
[a26b08f42dd160c7]
|
11,749,434 |
FFE9F862 |
Amazon Web Services - Data Security\7.6. Design for Disaster Recovery Services\41.Disaster recovery areas and metrics.en.srt |
6,099 |
03954A14 |
Amazon Web Services - Data Security\7.6. Design for Disaster Recovery Services\45.Extend backups via Storage Gateway.mp4
[bfdd957de809bd0e]
|
7,088,880 |
922DB106 |
Amazon Web Services - Data Security\7.6. Design for Disaster Recovery Services\42.Disaster recovery patterns for data.en.srt |
8,853 |
D3466897 |
Amazon Web Services - Data Security\3.2. Design Security with AWS Services\09.Core AWS security services.en.srt |
10,277 |
DDF0E4A7 |
Amazon Web Services - Data Security\3.2. Design Security with AWS Services\11.IAM root account.mp4
[7102ce68e6da5222]
|
12,748,406 |
B2F960E6 |
Amazon Web Services - Data Security\3.2. Design Security with AWS Services\16.Design security for VPC.mp4
[a4643604bc8963]
|
22,528,078 |
69C6194E |
Amazon Web Services - Data Security\3.2. Design Security with AWS Services\13.Security with CloudWatch and CloudTrail.mp4
[1e10d8b62d61fd2a]
|
20,986,052 |
16F587DE |
Amazon Web Services - Data Security\3.2. Design Security with AWS Services\12.Design security with IAM - Policies.en.srt |
10,955 |
5739E088 |
Amazon Web Services - Data Security\3.2. Design Security with AWS Services\11.IAM root account.en.srt |
8,544 |
50DE578A |
Amazon Web Services - Data Security\3.2. Design Security with AWS Services\15.Design security for EC2 with WAF.mp4
[829a971553ea8ba]
|
10,222,356 |
54742D2F |
Amazon Web Services - Data Security\3.2. Design Security with AWS Services\13.Security with CloudWatch and CloudTrail.en.srt |
13,687 |
770CC749 |
Amazon Web Services - Data Security\3.2. Design Security with AWS Services\10.Design security with IAM - Users and roles.en.srt |
10,140 |
7C96FD46 |
Amazon Web Services - Data Security\3.2. Design Security with AWS Services\14.Design security for EC2 with Inspector.en.srt |
8,680 |
806EC991 |
Amazon Web Services - Data Security\3.2. Design Security with AWS Services\10.Design security with IAM - Users and roles.mp4
[a69ae7327e28b90b]
|
19,445,340 |
535C2A14 |
Amazon Web Services - Data Security\3.2. Design Security with AWS Services\14.Design security for EC2 with Inspector.mp4
[e098ef8df881a0f5]
|
12,149,364 |
D59566B9 |
Amazon Web Services - Data Security\3.2. Design Security with AWS Services\12.Design security with IAM - Policies.mp4
[7cbdf80801d5afb8]
|
17,063,919 |
FAF73E4C |
Amazon Web Services - Data Security\3.2. Design Security with AWS Services\16.Design security for VPC.en.srt |
16,606 |
24B8DFFD |
Amazon Web Services - Data Security\3.2. Design Security with AWS Services\15.Design security for EC2 with WAF.en.srt |
7,296 |
09525D5C |
Amazon Web Services - Data Security\3.2. Design Security with AWS Services\09.Core AWS security services.mp4
[57d61bdfd4f8bf6a]
|
17,678,275 |
1F0E9351 |
Amazon Web Services - Data Security\Exercise Files |
0 |
00000000 |
Amazon Web Services - Data Security\1.Introduction |
0 |
00000000 |
Amazon Web Services - Data Security\8.Conclusion |
0 |
00000000 |
Amazon Web Services - Data Security\6.5. Security Scenarios and Tradeoffs |
0 |
00000000 |
Amazon Web Services - Data Security\4.3. Design Concepts for Encryption |
0 |
00000000 |
Amazon Web Services - Data Security\2.1. Design Concepts for Security |
0 |
00000000 |
Amazon Web Services - Data Security\5.4. Design Encryption with AWS Services |
0 |
00000000 |
Amazon Web Services - Data Security\7.6. Design for Disaster Recovery Services |
0 |
00000000 |
Amazon Web Services - Data Security\3.2. Design Security with AWS Services |
0 |
00000000 |
Amazon Web Services - Data Security |
0 |
00000000 |
|
Total size: |
478,516,324 |
|