RAR-files |
bif-pacsew.rar |
100,000,000 |
8B865AF2 |
bif-pacsew.r00 |
100,000,000 |
F254C4EF |
bif-pacsew.r01 |
100,000,000 |
A8CE6208 |
bif-pacsew.r02 |
100,000,000 |
D0302C35 |
bif-pacsew.r03 |
100,000,000 |
90500E8F |
bif-pacsew.r04 |
100,000,000 |
60994AC3 |
bif-pacsew.r05 |
100,000,000 |
83EC9B6A |
bif-pacsew.r06 |
100,000,000 |
A5C59A59 |
bif-pacsew.r07 |
100,000,000 |
95C8DB68 |
bif-pacsew.r08 |
100,000,000 |
EB959014 |
bif-pacsew.r09 |
100,000,000 |
F2E63AD2 |
bif-pacsew.r10 |
100,000,000 |
062E22DF |
bif-pacsew.r11 |
100,000,000 |
69D8C7BB |
bif-pacsew.r12 |
100,000,000 |
B5988969 |
bif-pacsew.r13 |
100,000,000 |
1BF3D778 |
bif-pacsew.r14 |
100,000,000 |
AA72085D |
bif-pacsew.r15 |
100,000,000 |
B37D87B3 |
bif-pacsew.r16 |
100,000,000 |
B269BA84 |
bif-pacsew.r17 |
100,000,000 |
83EB1EE3 |
bif-pacsew.r18 |
100,000,000 |
02D8E606 |
bif-pacsew.r19 |
100,000,000 |
BDA550D2 |
bif-pacsew.r20 |
100,000,000 |
6010C9A1 |
bif-pacsew.r21 |
100,000,000 |
89B18069 |
bif-pacsew.r22 |
100,000,000 |
F8227444 |
bif-pacsew.r23 |
100,000,000 |
E6F40694 |
bif-pacsew.r24 |
100,000,000 |
F99EF918 |
bif-pacsew.r25 |
100,000,000 |
98A601E9 |
bif-pacsew.r26 |
9,311,910 |
B72B23B3 |
|
Total size: |
2,709,311,910 |
|
|
Archived
files |
Pearson AWS Cloud Security\01.Introduction\0101.AWS Cloud Security Introduction.mp4
[79e70392521b819a]
|
17,992,812 |
EEBF5AEE |
Pearson AWS Cloud Security\02. Amazon Web Services Foundations\0201.Module introduction.mp4
[e708ec1d382777c9]
|
4,324,623 |
1357FC5F |
Pearson AWS Cloud Security\03. AWS Security Fundamentals\0301.Learning objectives.mp4
[9cb75205c07635e7]
|
3,546,894 |
9E87D465 |
Pearson AWS Cloud Security\03. AWS Security Fundamentals\0302.Understanding the CIA Triad.mp4
[e282aaf508884fd3]
|
55,959,032 |
44574742 |
Pearson AWS Cloud Security\03. AWS Security Fundamentals\0303.Examining Types and Categories of Controls.mp4
[a260fabb383c7dd5]
|
90,404,416 |
84CDB4DC |
Pearson AWS Cloud Security\03. AWS Security Fundamentals\0304.Surveying Common Threats to AWS Services.mp4
[1a0fd2054a7ddcdf]
|
67,741,835 |
9D8B196D |
Pearson AWS Cloud Security\04. AWS Shared Security Responsibility Model\0401.Learning objectives.mp4
[206a1f455b6eb5e8]
|
4,982,307 |
E1DD0B8D |
Pearson AWS Cloud Security\04. AWS Shared Security Responsibility Model\0402.Understanding the Shared Security Responsibility Model.mp4
[d708708716f03ec2]
|
28,725,613 |
F2654E43 |
Pearson AWS Cloud Security\04. AWS Shared Security Responsibility Model\0403.Establishing AWS Responsibilities Security of the Cloud.mp4
[3e4403b46cb3038d]
|
55,668,293 |
99991F3A |
Pearson AWS Cloud Security\04. AWS Shared Security Responsibility Model\0404.Establishing Customer Responsibilities Security in the Cloud.mp4
[e6bf9e9d17ffc943]
|
40,040,491 |
AA6A2CFB |
Pearson AWS Cloud Security\04. AWS Shared Security Responsibility Model\0405.Surveying Strategies When Planning for Security.mp4
[6c1992013e5d62a]
|
91,778,021 |
34FFA3AE |
Pearson AWS Cloud Security\05. AWS Compliance Services\0501.Learning objectives.mp4
[10f8af692fd72316]
|
3,490,955 |
C69DB15F |
Pearson AWS Cloud Security\05. AWS Compliance Services\0502.Understanding AWS Premium Support Services.mp4
[bb3a6c4fc6602288]
|
48,543,586 |
18A7F7D2 |
Pearson AWS Cloud Security\05. AWS Compliance Services\0503.Understanding Risk and Compliance.mp4
[b723a981132492a7]
|
30,679,729 |
939361B8 |
Pearson AWS Cloud Security\05. AWS Compliance Services\0504.Case Study HIPAA Security and Compliance (and GDPR).mp4
[2778e84e68ffa0c8]
|
37,200,674 |
3767EBD7 |
Pearson AWS Cloud Security\06. Identity and Access Management\0601.Module introduction.mp4
[67e3fca23de59734]
|
3,380,662 |
ACE9DF4E |
Pearson AWS Cloud Security\07. Understanding Users and Credentials\0701.Learning objectives.mp4
[50175f8d3ac14c57]
|
3,693,392 |
5F49EFE1 |
Pearson AWS Cloud Security\07. Understanding Users and Credentials\0702.Examining the Account Root User.mp4
[4f823511d4dbb6d1]
|
30,003,244 |
A1553D9F |
Pearson AWS Cloud Security\07. Understanding Users and Credentials\0703.Exploring User Accounts and Credentials.mp4
[b01c550d38e29fcc]
|
39,020,883 |
E5121FB2 |
Pearson AWS Cloud Security\07. Understanding Users and Credentials\0704.Exploring Password Policies.mp4
[fe8f01fb8f9553a]
|
19,917,780 |
A26AAFA7 |
Pearson AWS Cloud Security\07. Understanding Users and Credentials\0705.Deploying Identity and Access Management Best Practices.mp4
[ff43262277751aab]
|
66,858,596 |
B2778C55 |
Pearson AWS Cloud Security\08. Identity and Access Management (IAM)\0801.Learning objectives.mp4
[5183f11657f541bc]
|
5,467,240 |
5608CC3E |
Pearson AWS Cloud Security\08. Identity and Access Management (IAM)\0802.Understanding IAM.mp4
[cc902bc516845038]
|
47,594,273 |
A34A5069 |
Pearson AWS Cloud Security\08. Identity and Access Management (IAM)\0803.Exploring IAM Users and Groups.mp4
[253c2aaf1fbbe16b]
|
37,076,765 |
68962062 |
Pearson AWS Cloud Security\08. Identity and Access Management (IAM)\0804.Exploring IAM Roles.mp4
[6310a81decbcacfc]
|
38,531,467 |
800D2E7C |
Pearson AWS Cloud Security\08. Identity and Access Management (IAM)\0805.Exploring IAM Managed Policies.mp4
[dde464cd22b43d96]
|
29,553,478 |
2151BF86 |
Pearson AWS Cloud Security\08. Identity and Access Management (IAM)\0806.Exploring IAM Custom Policies.mp4
[76dc7596e877df58]
|
22,632,954 |
03B37B5E |
Pearson AWS Cloud Security\08. Identity and Access Management (IAM)\0807.Exploring IAM Federated Services.mp4
[8452e8544542d48f]
|
22,956,431 |
BF395020 |
Pearson AWS Cloud Security\08. Identity and Access Management (IAM)\0808.Understanding AWS Security Token Service (STS).mp4
[1a67d371beafc8d1]
|
112,629,674 |
38CC3E1D |
Pearson AWS Cloud Security\08. Identity and Access Management (IAM)\0809.Understanding AWS Cognito.mp4
[9eddf8524228d484]
|
34,420,274 |
7BCD14A4 |
Pearson AWS Cloud Security\09. Infrastructure Security\0901.Module introduction.mp4
[461f16be53f1d4fe]
|
4,201,114 |
201F68DA |
Pearson AWS Cloud Security\10. NACLs and Security Groups\1001.Learning objectives.mp4
[f7bd8cb1e1a54053]
|
5,834,471 |
640A2557 |
Pearson AWS Cloud Security\10. NACLs and Security Groups\1002.Understanding Security Zoning and Network Segmentation.mp4
[f6c626d521083248]
|
71,859,064 |
9962B56A |
Pearson AWS Cloud Security\10. NACLs and Security Groups\1003.Deploying Best Practices for Network Security in the Cloud.mp4
[a4c7c222b915b048]
|
119,848,354 |
348D6AAB |
Pearson AWS Cloud Security\10. NACLs and Security Groups\1004.Comparing Security Groups to Network ACLs.mp4
[fb3ba22bf27fe722]
|
44,732,595 |
5D7AEC9F |
Pearson AWS Cloud Security\10. NACLs and Security Groups\1005.Working with Network ACLs.mp4
[fdfec009118bb9db]
|
46,990,982 |
3CF29592 |
Pearson AWS Cloud Security\10. NACLs and Security Groups\1006.Surveying Recommended NACL Scenarios.mp4
[54a79bc97f292681]
|
31,936,527 |
CDFEAE41 |
Pearson AWS Cloud Security\10. NACLs and Security Groups\1007.Understanding Security Groups.mp4
[cbbe151b1cd24b26]
|
29,798,793 |
627E0C9E |
Pearson AWS Cloud Security\10. NACLs and Security Groups\1008.Working with Security Groups.mp4
[a99d58ea7eddc0fc]
|
50,444,529 |
EA372DB9 |
Pearson AWS Cloud Security\10. NACLs and Security Groups\1009.Understanding Security Groups for Windows Instances.mp4
[db60df8d9d21992e]
|
35,397,120 |
9864CAB8 |
Pearson AWS Cloud Security\11. AWS WAF and AWS Shield\1101.Learning objectives.mp4
[2ad04e12c62dab20]
|
5,955,760 |
697AF53E |
Pearson AWS Cloud Security\11. AWS WAF and AWS Shield\1102.Understanding Web Application Firewall (WAF).mp4
[7c2e5d7c019c1506]
|
80,036,834 |
F76CA4C5 |
Pearson AWS Cloud Security\11. AWS WAF and AWS Shield\1103.Working with WAF.mp4
[572465ffc753e62a]
|
43,469,784 |
4377C0AD |
Pearson AWS Cloud Security\11. AWS WAF and AWS Shield\1104.Exploring DDoS Protection and Response.mp4
[36a5c126adf7c41e]
|
34,959,075 |
F5EC4977 |
Pearson AWS Cloud Security\11. AWS WAF and AWS Shield\1105.Exploring AWS WAF Advanced API.mp4
[ea8ee6fb0460d47]
|
30,489,719 |
D01D632A |
Pearson AWS Cloud Security\11. AWS WAF and AWS Shield\1106.Understanding AWS Shield.mp4
[733628f48373ef43]
|
121,664,519 |
94EDC347 |
Pearson AWS Cloud Security\11. AWS WAF and AWS Shield\1107.Working with AWS Shield.mp4
[5f59e658e2c37e07]
|
20,601,878 |
5A367310 |
Pearson AWS Cloud Security\11. AWS WAF and AWS Shield\1108.Deploying Malware Protection Best Practices.mp4
[844fcaffe8229430]
|
59,577,796 |
1B2FBA22 |
Pearson AWS Cloud Security\11. AWS WAF and AWS Shield\1109.Surveying Layered Defense in the Cloud.mp4
[d4049b4ca47cc966]
|
88,777,151 |
D6288731 |
Pearson AWS Cloud Security\12. Data Protection\1201.Module introduction.mp4
[5665bb5de6139c3b]
|
2,722,189 |
6566B8FD |
Pearson AWS Cloud Security\13. Cryptographic Services\1301.Learning objectives.mp4
[b49bf64c25f5e8dc]
|
3,508,745 |
8B9B5AB2 |
Pearson AWS Cloud Security\13. Cryptographic Services\1302.Understanding Cryptography Basics.mp4
[5178cc1f4328292c]
|
136,189,746 |
12B7FFEC |
Pearson AWS Cloud Security\13. Cryptographic Services\1303.Understanding IPsec Fundamentals.mp4
[c67c42333efcd2a8]
|
63,930,538 |
CA933563 |
Pearson AWS Cloud Security\13. Cryptographic Services\1304.Exploring AWS Certificate Manager.mp4
[ab56fddff2d85125]
|
45,491,622 |
10DC2F57 |
Pearson AWS Cloud Security\14. Key Management\1401.Learning objectives.mp4
[26bea9fd88227426]
|
4,831,789 |
808D238A |
Pearson AWS Cloud Security\14. Key Management\1402.Understanding AWS Key Management Services (KMS).mp4
[ae391f7cb09ebc43]
|
78,803,878 |
7EB5C1B4 |
Pearson AWS Cloud Security\14. Key Management\1403.Working with AWS KMS.mp4
[f11ede65e344986d]
|
31,634,735 |
9A0EBE31 |
Pearson AWS Cloud Security\14. Key Management\1404.Protecting EC2 Key Pairs.mp4
[5291a209ca2aee52]
|
31,650,188 |
2DA9F0ED |
Pearson AWS Cloud Security\14. Key Management\1405.Using Encrypted EBS Volumes.mp4
[eed4aeff05f4214]
|
32,860,095 |
6F171388 |
Pearson AWS Cloud Security\14. Key Management\1406.Examining Server Side Encryption (SSE) in S3.mp4
[e186af49882a3b35]
|
18,999,142 |
A897CD91 |
Pearson AWS Cloud Security\14. Key Management\1407.Exploring AWS CloudHSM Security.mp4
[902ee61f7686841e]
|
31,919,499 |
D09D94A7 |
Pearson AWS Cloud Security\15. Logging and Monitoring\1501.Module introduction.mp4
[909e11848a563853]
|
1,954,237 |
E4F62732 |
Pearson AWS Cloud Security\16. Visibility and Reporting\1601.Learning objectives.mp4
[69c9cf5bd843502b]
|
5,104,314 |
6DEB4356 |
Pearson AWS Cloud Security\16. Visibility and Reporting\1602.Understanding Security Reporting and Logging in AWS.mp4
[883b1e7ddd6c8020]
|
39,756,156 |
54E1A4EF |
Pearson AWS Cloud Security\16. Visibility and Reporting\1603.Activating FlowLogs and Region-based CloudTrail.mp4
[21bd8f1714c74b36]
|
42,685,830 |
8E9E2A0D |
Pearson AWS Cloud Security\16. Visibility and Reporting\1604.Understanding AWS Auditing.mp4
[ff672fcdfd60f456]
|
35,596,549 |
895886B2 |
Pearson AWS Cloud Security\16. Visibility and Reporting\1605.Exploring Pre-Audit Tasks.mp4
[a411d531316da5e4]
|
19,371,485 |
77214A46 |
Pearson AWS Cloud Security\16. Visibility and Reporting\1606.Surveying Additional Security Services.mp4
[162a733869ed9ad7]
|
23,622,376 |
C56014A1 |
Pearson AWS Cloud Security\17.Summary\1701.AWS Cloud Security Summary.mp4
[38fa1a8752d5c5c]
|
10,517,765 |
3B51FE1C |
Pearson AWS Cloud Security\01.Introduction |
0 |
00000000 |
Pearson AWS Cloud Security\02. Amazon Web Services Foundations |
0 |
00000000 |
Pearson AWS Cloud Security\03. AWS Security Fundamentals |
0 |
00000000 |
Pearson AWS Cloud Security\04. AWS Shared Security Responsibility Model |
0 |
00000000 |
Pearson AWS Cloud Security\05. AWS Compliance Services |
0 |
00000000 |
Pearson AWS Cloud Security\06. Identity and Access Management |
0 |
00000000 |
Pearson AWS Cloud Security\07. Understanding Users and Credentials |
0 |
00000000 |
Pearson AWS Cloud Security\08. Identity and Access Management (IAM) |
0 |
00000000 |
Pearson AWS Cloud Security\09. Infrastructure Security |
0 |
00000000 |
Pearson AWS Cloud Security\10. NACLs and Security Groups |
0 |
00000000 |
Pearson AWS Cloud Security\11. AWS WAF and AWS Shield |
0 |
00000000 |
Pearson AWS Cloud Security\12. Data Protection |
0 |
00000000 |
Pearson AWS Cloud Security\13. Cryptographic Services |
0 |
00000000 |
Pearson AWS Cloud Security\14. Key Management |
0 |
00000000 |
Pearson AWS Cloud Security\15. Logging and Monitoring |
0 |
00000000 |
Pearson AWS Cloud Security\16. Visibility and Reporting |
0 |
00000000 |
Pearson AWS Cloud Security\17.Summary |
0 |
00000000 |
Pearson AWS Cloud Security |
0 |
00000000 |
|
Total size: |
2,682,543,337 |
|
|