Securing Applications on AWS\4. Logging with CloudWatch\20.CloudTrail Events.mp4
[70c7d940f8172ad4]
|
11,646,729 |
F875F838 |
Securing Applications on AWS\4. Logging with CloudWatch\22.Installing the CloudWatch Agent.mp4
[b841d51d8d975565]
|
16,532,339 |
26CC7870 |
Securing Applications on AWS\4. Logging with CloudWatch\22.Installing the CloudWatch Agent.en.srt |
10,783 |
384E94FE |
Securing Applications on AWS\4. Logging with CloudWatch\16.CloudWatch Operation.en.srt |
6,690 |
62C316B9 |
Securing Applications on AWS\4. Logging with CloudWatch\19.CloudWatch Alarms.mp4
[5b9a1ef359a4c7a9]
|
5,360,100 |
5BD9BC24 |
Securing Applications on AWS\4. Logging with CloudWatch\18.CloudWatch Metrics.mp4
[d14da427c77f26de]
|
6,834,570 |
B0B97C29 |
Securing Applications on AWS\4. Logging with CloudWatch\15.Logging with CloudWatch Introduction.mp4
[2af7843c613c75a2]
|
1,859,585 |
A3A5A17E |
Securing Applications on AWS\4. Logging with CloudWatch\21.Creating a CloudWatch Alarm.mp4
[38bb10905e936c21]
|
12,508,121 |
2A8C30D7 |
Securing Applications on AWS\4. Logging with CloudWatch\15.Logging with CloudWatch Introduction.en.srt |
2,088 |
B59EF4C0 |
Securing Applications on AWS\4. Logging with CloudWatch\19.CloudWatch Alarms.en.srt |
5,253 |
AA442C9C |
Securing Applications on AWS\4. Logging with CloudWatch\18.CloudWatch Metrics.en.srt |
7,373 |
3CEEEAED |
Securing Applications on AWS\4. Logging with CloudWatch\17.CloudWatch Overview.en.srt |
9,153 |
F44C5C91 |
Securing Applications on AWS\4. Logging with CloudWatch\17.CloudWatch Overview.mp4
[1f9fd50c0dbce749]
|
13,866,373 |
2ADD99AD |
Securing Applications on AWS\4. Logging with CloudWatch\16.CloudWatch Operation.mp4
[5a8b62d5477ea0e5]
|
5,941,769 |
5294DBFB |
Securing Applications on AWS\4. Logging with CloudWatch\21.Creating a CloudWatch Alarm.en.srt |
7,895 |
9A1AC8B7 |
Securing Applications on AWS\4. Logging with CloudWatch\20.CloudTrail Events.en.srt |
7,976 |
2E439429 |
Securing Applications on AWS\1.Course Overview (Added last by PS team)\01.Course Overview.mp4
[eb575dfe8560cff4]
|
3,456,833 |
1ED14F65 |
Securing Applications on AWS\1.Course Overview (Added last by PS team)\01.Course Overview.en.srt |
2,602 |
2DD479CB |
Securing Applications on AWS\Exercise Files\securing-applications-aws.zip |
2,920,271 |
97DB77AC |
Securing Applications on AWS\5.Auditing with CloudTrail\23.Auditing with CloudTrail Introduction.en.srt |
1,649 |
9A34FB5B |
Securing Applications on AWS\5.Auditing with CloudTrail\27.Monitoring Security Events with CloudTrail.mp4
[92a3b0dcb82f29d6]
|
11,496,944 |
8D35BA4D |
Securing Applications on AWS\5.Auditing with CloudTrail\25.Creating Trails.en.srt |
9,696 |
922AA884 |
Securing Applications on AWS\5.Auditing with CloudTrail\25.Creating Trails.mp4
[2aa24c6aee26b6f4]
|
12,547,556 |
442155B9 |
Securing Applications on AWS\5.Auditing with CloudTrail\27.Monitoring Security Events with CloudTrail.en.srt |
4,816 |
152A33CD |
Securing Applications on AWS\5.Auditing with CloudTrail\26.Analyzing CloudTrail Logs.mp4
[7f9b7b3b27e41b61]
|
18,062,931 |
B2E44F8F |
Securing Applications on AWS\5.Auditing with CloudTrail\24.What Is CloudTrail.en.srt |
9,838 |
9C872674 |
Securing Applications on AWS\5.Auditing with CloudTrail\23.Auditing with CloudTrail Introduction.mp4
[f169c2351cfa8bb1]
|
1,679,041 |
4B42D753 |
Securing Applications on AWS\5.Auditing with CloudTrail\26.Analyzing CloudTrail Logs.en.srt |
7,177 |
234CB64E |
Securing Applications on AWS\5.Auditing with CloudTrail\24.What Is CloudTrail.mp4
[6b0df736a2fb1cf0]
|
15,563,511 |
F0F390E9 |
Securing Applications on AWS\2. Web Application Firewall and the API Gateway\04.Conditions and Rules.en.srt |
10,336 |
03E98CD1 |
Securing Applications on AWS\2. Web Application Firewall and the API Gateway\05.Creating an IP Address Match Condition.en.srt |
2,784 |
8C666D91 |
Securing Applications on AWS\2. Web Application Firewall and the API Gateway\03.Web Application Firewall.en.srt |
7,018 |
DD23D36B |
Securing Applications on AWS\2. Web Application Firewall and the API Gateway\07.API Gateway.mp4
[3ea46eb55fe88625]
|
7,685,637 |
EED29216 |
Securing Applications on AWS\2. Web Application Firewall and the API Gateway\08.API Gateway Components.en.srt |
6,797 |
15C63FCE |
Securing Applications on AWS\2. Web Application Firewall and the API Gateway\05.Creating an IP Address Match Condition.mp4
[98850d12ceac38a]
|
7,007,737 |
615D09C0 |
Securing Applications on AWS\2. Web Application Firewall and the API Gateway\04.Conditions and Rules.mp4
[63297c72bf4f8c77]
|
17,801,127 |
BFB741C7 |
Securing Applications on AWS\2. Web Application Firewall and the API Gateway\02.WAF and API Gateway Introduction.mp4
[68c8eba25938178b]
|
2,191,021 |
DDBE14AA |
Securing Applications on AWS\2. Web Application Firewall and the API Gateway\08.API Gateway Components.mp4
[27085558447647d4]
|
11,672,420 |
1FB9799B |
Securing Applications on AWS\2. Web Application Firewall and the API Gateway\02.WAF and API Gateway Introduction.en.srt |
2,320 |
90F7A851 |
Securing Applications on AWS\2. Web Application Firewall and the API Gateway\03.Web Application Firewall.mp4
[f7304ca7a3473ab]
|
10,896,964 |
510CB648 |
Securing Applications on AWS\2. Web Application Firewall and the API Gateway\06.Creating a Geo Match Condition.mp4
[c303d127e7b350a9]
|
12,728,948 |
9408CC57 |
Securing Applications on AWS\2. Web Application Firewall and the API Gateway\06.Creating a Geo Match Condition.en.srt |
5,311 |
A5179C12 |
Securing Applications on AWS\2. Web Application Firewall and the API Gateway\07.API Gateway.en.srt |
8,888 |
030F60B3 |
Securing Applications on AWS\3. Authenticating Users with Amazon Cognito\11.Amazon Cognito Scenarios.mp4
[96b680f87bf9d7e2]
|
4,131,161 |
B3B6C81E |
Securing Applications on AWS\3. Authenticating Users with Amazon Cognito\12.Creating a User Pool.en.srt |
6,035 |
BAC7061F |
Securing Applications on AWS\3. Authenticating Users with Amazon Cognito\09.Amazon Cognito Introduction.en.srt |
1,434 |
929861BB |
Securing Applications on AWS\3. Authenticating Users with Amazon Cognito\10.Amazon Cognito.en.srt |
8,610 |
08EEA34D |
Securing Applications on AWS\3. Authenticating Users with Amazon Cognito\13.Create an Identity Pool.mp4
[27da6b5d94deeebf]
|
10,687,458 |
6A1A48E6 |
Securing Applications on AWS\3. Authenticating Users with Amazon Cognito\11.Amazon Cognito Scenarios.en.srt |
4,973 |
E66A6CE7 |
Securing Applications on AWS\3. Authenticating Users with Amazon Cognito\10.Amazon Cognito.mp4
[77b4c72c6d4382ed]
|
7,151,734 |
23107EB5 |
Securing Applications on AWS\3. Authenticating Users with Amazon Cognito\14.Cognito Sync.mp4
[829fe467422579eb]
|
2,384,485 |
C5346F07 |
Securing Applications on AWS\3. Authenticating Users with Amazon Cognito\13.Create an Identity Pool.en.srt |
6,539 |
70E95204 |
Securing Applications on AWS\3. Authenticating Users with Amazon Cognito\09.Amazon Cognito Introduction.mp4
[fd1dfe6134a6350e]
|
1,469,111 |
36441285 |
Securing Applications on AWS\3. Authenticating Users with Amazon Cognito\14.Cognito Sync.en.srt |
2,693 |
5FCDFB1F |
Securing Applications on AWS\3. Authenticating Users with Amazon Cognito\12.Creating a User Pool.mp4
[64834fa427cc4b3d]
|
12,131,009 |
492F9368 |
Securing Applications on AWS\6.Managing Compliance Standards with Trusted Advisor and AWS Config\35.Notifications.mp4
[31e59e4a39a27520]
|
14,702,859 |
F5A7DD8A |
Securing Applications on AWS\6.Managing Compliance Standards with Trusted Advisor and AWS Config\34.Config Triggers.mp4
[624c00efe2b47913]
|
7,676,364 |
AC1B0E3E |
Securing Applications on AWS\6.Managing Compliance Standards with Trusted Advisor and AWS Config\31.AWS Config.mp4
[a074ab9ff23c0c2]
|
10,899,098 |
43CD8269 |
Securing Applications on AWS\6.Managing Compliance Standards with Trusted Advisor and AWS Config\29.Trusted Advisor.en.srt |
7,932 |
5805A207 |
Securing Applications on AWS\6.Managing Compliance Standards with Trusted Advisor and AWS Config\31.AWS Config.en.srt |
7,509 |
5BF382E7 |
Securing Applications on AWS\6.Managing Compliance Standards with Trusted Advisor and AWS Config\35.Notifications.en.srt |
5,812 |
EC5946F0 |
Securing Applications on AWS\6.Managing Compliance Standards with Trusted Advisor and AWS Config\34.Config Triggers.en.srt |
5,261 |
383B6E2B |
Securing Applications on AWS\6.Managing Compliance Standards with Trusted Advisor and AWS Config\28.Managing Compliance with Trusted Advisor and AWS Config.en.srt |
1,500 |
30F8367D |
Securing Applications on AWS\6.Managing Compliance Standards with Trusted Advisor and AWS Config\32.AWS Config Components.en.srt |
5,105 |
AC02A106 |
Securing Applications on AWS\6.Managing Compliance Standards with Trusted Advisor and AWS Config\33.Enable Managed Config Rules.en.srt |
5,786 |
CDE7AE1F |
Securing Applications on AWS\6.Managing Compliance Standards with Trusted Advisor and AWS Config\32.AWS Config Components.mp4
[b1b8c18b850717f0]
|
5,449,723 |
AAA294E6 |
Securing Applications on AWS\6.Managing Compliance Standards with Trusted Advisor and AWS Config\33.Enable Managed Config Rules.mp4
[45ffc333954e8a33]
|
15,477,936 |
8F388CC1 |
Securing Applications on AWS\6.Managing Compliance Standards with Trusted Advisor and AWS Config\30.Trusted Advisor Benefits.en.srt |
10,580 |
FCB84FED |
Securing Applications on AWS\6.Managing Compliance Standards with Trusted Advisor and AWS Config\29.Trusted Advisor.mp4
[1b8562af83cf0d97]
|
11,488,528 |
E65AC7AB |
Securing Applications on AWS\6.Managing Compliance Standards with Trusted Advisor and AWS Config\30.Trusted Advisor Benefits.mp4
[a301e9724c85184c]
|
14,437,371 |
5E9600A2 |
Securing Applications on AWS\6.Managing Compliance Standards with Trusted Advisor and AWS Config\28.Managing Compliance with Trusted Advisor and AWS Config.mp4
[8d6d7e5d6ea2bca5]
|
1,560,838 |
1BF669F3 |
Securing Applications on AWS\4. Logging with CloudWatch |
0 |
00000000 |
Securing Applications on AWS\1.Course Overview (Added last by PS team) |
0 |
00000000 |
Securing Applications on AWS\Exercise Files |
0 |
00000000 |
Securing Applications on AWS\5.Auditing with CloudTrail |
0 |
00000000 |
Securing Applications on AWS\2. Web Application Firewall and the API Gateway |
0 |
00000000 |
Securing Applications on AWS\3. Authenticating Users with Amazon Cognito |
0 |
00000000 |
Securing Applications on AWS\6.Managing Compliance Standards with Trusted Advisor and AWS Config |
0 |
00000000 |
Securing Applications on AWS |
0 |
00000000 |
|
Total size: |
330,124,414 |
|