Companies Home Search Profile

AWS Security. Video Edition

Focused View

8:29:15

0 View
  • Chapter 1. A new way of operating.mp4
    04:20
  • Chapter 1. Cloud-native security tools.mp4
    14:16
  • Chapter 1. Conclusion.mp4
    02:27
  • Chapter 1. Introduction to AWS security.mp4
    09:18
  • Chapter 1. Summary.mp4
    01:08
  • Chapter 2. Attribute-based access control with tags.mp4
    05:42
  • Chapter 2. Identity and access management.mp4
    32:56
  • Chapter 2. Summary.mp4
    00:51
  • Chapter 2. Using common patterns in AWS IAM.mp4
    08:17
  • Chapter 3. Integration with existing access management systems.mp4
    09:03
  • Chapter 3. Managing accounts.mp4
    09:46
  • Chapter 3. Summary.mp4
    00:56
  • Chapter 4. Applying least privilege access control.mp4
    17:22
  • Chapter 4. Choosing between short- and long-lived credentials.mp4
    07:24
  • Chapter 4. Policies and procedures for secure access.mp4
    15:35
  • Chapter 4. Reviewing IAM permissions.mp4
    18:17
  • Chapter 4. Summary.mp4
    01:09
  • Chapter 5. Securing the network The virtual private cloud.mp4
    23:57
  • Chapter 5. Separating private networks.mp4
    11:30
  • Chapter 5. Summary.mp4
    01:06
  • Chapter 5. Traffic routing and virtual firewalls.mp4
    23:18
  • Chapter 6. Blocking malicious traffic with AWS Web Application Firewall.mp4
    21:21
  • Chapter 6. Integrating third-party firewalls.mp4
    05:28
  • Chapter 6. Network access protection beyond the VPC.mp4
    15:58
  • Chapter 6. Protecting against distributed denial of service attacks using AWS Shield.mp4
    04:47
  • Chapter 6. Summary.mp4
    01:07
  • Chapter 7. Data access logging.mp4
    15:03
  • Chapter 7. Data classification.mp4
    07:29
  • Chapter 7. Protecting data in the cloud.mp4
    14:40
  • Chapter 7. Securing data at rest.mp4
    15:07
  • Chapter 7. Securing data in transit.mp4
    07:45
  • Chapter 7. Summary.mp4
    01:15
  • Chapter 8. Centralizing application logs.mp4
    17:43
  • Chapter 8. Logging and audit trails.mp4
    15:52
  • Chapter 8. Summary.mp4
    01:01
  • Chapter 8. Tracking resource configuration changes.mp4
    08:50
  • Chapter 9. Continuous monitoring.mp4
    18:15
  • Chapter 9. Detecting threats in logs.mp4
    20:24
  • Chapter 9. Host vulnerability scanning.mp4
    09:18
  • Chapter 9. Summary.mp4
    00:48
  • Chapter 10. Automating incident response.mp4
    08:22
  • Chapter 10. Incident response and remediation.mp4
    13:26
  • Chapter 10. Incident response planning.mp4
    04:31
  • Chapter 10. Summary.mp4
    00:30
  • Chapter 11. Implementing authentication and authorization end to end.mp4
    10:53
  • Chapter 11. Protecting data.mp4
    11:06
  • Chapter 11. Securing a real-world application.mp4
    20:53
  • Chapter 11. Strong authentication and access controls.mp4
    10:23
  • Chapter 11. Summary.mp4
    00:43
  • Chapter 11. Web application firewalls.mp4
    07:39
  • More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 50
    • duration 8:29:15
    • Release Date 2024/11/03