AWS Security. Video Edition
Focused View
8:29:15
0 View
Chapter 1. A new way of operating.mp4
04:20
Chapter 1. Cloud-native security tools.mp4
14:16
Chapter 1. Conclusion.mp4
02:27
Chapter 1. Introduction to AWS security.mp4
09:18
Chapter 1. Summary.mp4
01:08
Chapter 2. Attribute-based access control with tags.mp4
05:42
Chapter 2. Identity and access management.mp4
32:56
Chapter 2. Summary.mp4
00:51
Chapter 2. Using common patterns in AWS IAM.mp4
08:17
Chapter 3. Integration with existing access management systems.mp4
09:03
Chapter 3. Managing accounts.mp4
09:46
Chapter 3. Summary.mp4
00:56
Chapter 4. Applying least privilege access control.mp4
17:22
Chapter 4. Choosing between short- and long-lived credentials.mp4
07:24
Chapter 4. Policies and procedures for secure access.mp4
15:35
Chapter 4. Reviewing IAM permissions.mp4
18:17
Chapter 4. Summary.mp4
01:09
Chapter 5. Securing the network The virtual private cloud.mp4
23:57
Chapter 5. Separating private networks.mp4
11:30
Chapter 5. Summary.mp4
01:06
Chapter 5. Traffic routing and virtual firewalls.mp4
23:18
Chapter 6. Blocking malicious traffic with AWS Web Application Firewall.mp4
21:21
Chapter 6. Integrating third-party firewalls.mp4
05:28
Chapter 6. Network access protection beyond the VPC.mp4
15:58
Chapter 6. Protecting against distributed denial of service attacks using AWS Shield.mp4
04:47
Chapter 6. Summary.mp4
01:07
Chapter 7. Data access logging.mp4
15:03
Chapter 7. Data classification.mp4
07:29
Chapter 7. Protecting data in the cloud.mp4
14:40
Chapter 7. Securing data at rest.mp4
15:07
Chapter 7. Securing data in transit.mp4
07:45
Chapter 7. Summary.mp4
01:15
Chapter 8. Centralizing application logs.mp4
17:43
Chapter 8. Logging and audit trails.mp4
15:52
Chapter 8. Summary.mp4
01:01
Chapter 8. Tracking resource configuration changes.mp4
08:50
Chapter 9. Continuous monitoring.mp4
18:15
Chapter 9. Detecting threats in logs.mp4
20:24
Chapter 9. Host vulnerability scanning.mp4
09:18
Chapter 9. Summary.mp4
00:48
Chapter 10. Automating incident response.mp4
08:22
Chapter 10. Incident response and remediation.mp4
13:26
Chapter 10. Incident response planning.mp4
04:31
Chapter 10. Summary.mp4
00:30
Chapter 11. Implementing authentication and authorization end to end.mp4
10:53
Chapter 11. Protecting data.mp4
11:06
Chapter 11. Securing a real-world application.mp4
20:53
Chapter 11. Strong authentication and access controls.mp4
10:23
Chapter 11. Summary.mp4
00:43
Chapter 11. Web application firewalls.mp4
07:39
More details
User Reviews
Rating
average 0
Focused display
Category

Udemy
View courses UdemyStudents take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
- language english
- Training sessions 50
- duration 8:29:15
- Release Date 2024/11/03