Get Bonus Downloads Here.url
182B
~Get Your Files Here !/01 - Introduction to Cloud Security/001 00 Why Cloud Security.mp4
11.9MB
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
~Get Your Files Here !/01 - Introduction to Cloud Security/001 00 Why Cloud Security_de.vtt
4.06KB
~Get Your Files Here !/01 - Introduction to Cloud Security/001 00 Why Cloud Security_es.vtt
3.91KB
~Get Your Files Here !/01 - Introduction to Cloud Security/001 00 Why Cloud Security_fr.vtt
4.26KB
~Get Your Files Here !/01 - Introduction to Cloud Security/001 00 Why Cloud Security_id.vtt
3.94KB
~Get Your Files Here !/01 - Introduction to Cloud Security/001 00 Why Cloud Security_it.vtt
3.93KB
~Get Your Files Here !/01 - Introduction to Cloud Security/001 00 Why Cloud Security_pt.vtt
4KB
~Get Your Files Here !/01 - Introduction to Cloud Security/002 01 Introduction to AWS Security Services.mp4
2.85MB
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
~Get Your Files Here !/01 - Introduction to Cloud Security/002 01 Introduction to AWS Security Services_de.vtt
480B
~Get Your Files Here !/01 - Introduction to Cloud Security/002 01 Introduction to AWS Security Services_es.vtt
498B
~Get Your Files Here !/01 - Introduction to Cloud Security/002 01 Introduction to AWS Security Services_fr.vtt
533B
~Get Your Files Here !/01 - Introduction to Cloud Security/002 01 Introduction to AWS Security Services_id.vtt
472B
~Get Your Files Here !/01 - Introduction to Cloud Security/002 01 Introduction to AWS Security Services_it.vtt
489B
~Get Your Files Here !/01 - Introduction to Cloud Security/002 01 Introduction to AWS Security Services_pt.vtt
510B
~Get Your Files Here !/01 - Introduction to Cloud Security/003 02 AWS Security solution Identity.mp4
15.37MB
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
~Get Your Files Here !/01 - Introduction to Cloud Security/003 02 AWS Security solution Identity_de.vtt
4.33KB
~Get Your Files Here !/01 - Introduction to Cloud Security/003 02 AWS Security solution Identity_es.vtt
4.18KB
~Get Your Files Here !/01 - Introduction to Cloud Security/003 02 AWS Security solution Identity_fr.vtt
4.43KB
~Get Your Files Here !/01 - Introduction to Cloud Security/003 02 AWS Security solution Identity_id.vtt
4.16KB
~Get Your Files Here !/01 - Introduction to Cloud Security/003 02 AWS Security solution Identity_it.vtt
4.07KB
~Get Your Files Here !/01 - Introduction to Cloud Security/003 02 AWS Security solution Identity_pt.vtt
4.18KB
~Get Your Files Here !/01 - Introduction to Cloud Security/004 03 AWS Security solution Detective Control.mp4
31.21MB
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
~Get Your Files Here !/01 - Introduction to Cloud Security/004 03 AWS Security solution Detective Control_de.vtt
6.54KB
~Get Your Files Here !/01 - Introduction to Cloud Security/004 03 AWS Security solution Detective Control_es.vtt
6.27KB
~Get Your Files Here !/01 - Introduction to Cloud Security/004 03 AWS Security solution Detective Control_fr.vtt
6.67KB
~Get Your Files Here !/01 - Introduction to Cloud Security/004 03 AWS Security solution Detective Control_id.vtt
6.29KB
~Get Your Files Here !/01 - Introduction to Cloud Security/004 03 AWS Security solution Detective Control_it.vtt
6.12KB
~Get Your Files Here !/01 - Introduction to Cloud Security/004 03 AWS Security solution Detective Control_pt.vtt
6.32KB
~Get Your Files Here !/01 - Introduction to Cloud Security/005 04 AWS Security solution Infrastructure Security.mp4
45.64MB
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
~Get Your Files Here !/01 - Introduction to Cloud Security/005 04 AWS Security solution Infrastructure Security_de.vtt
9.03KB
~Get Your Files Here !/01 - Introduction to Cloud Security/005 04 AWS Security solution Infrastructure Security_es.vtt
8.94KB
~Get Your Files Here !/01 - Introduction to Cloud Security/005 04 AWS Security solution Infrastructure Security_fr.vtt
9.45KB
~Get Your Files Here !/01 - Introduction to Cloud Security/005 04 AWS Security solution Infrastructure Security_id.vtt
8.78KB
~Get Your Files Here !/01 - Introduction to Cloud Security/005 04 AWS Security solution Infrastructure Security_it.vtt
8.85KB
~Get Your Files Here !/01 - Introduction to Cloud Security/005 04 AWS Security solution Infrastructure Security_pt.vtt
9.18KB
~Get Your Files Here !/01 - Introduction to Cloud Security/006 05 AWS Security solution Data Protection.mp4
30.86MB
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
~Get Your Files Here !/01 - Introduction to Cloud Security/006 05 AWS Security solution Data Protection_de.vtt
6.11KB
~Get Your Files Here !/01 - Introduction to Cloud Security/006 05 AWS Security solution Data Protection_es.vtt
5.85KB
~Get Your Files Here !/01 - Introduction to Cloud Security/006 05 AWS Security solution Data Protection_fr.vtt
6.24KB
~Get Your Files Here !/01 - Introduction to Cloud Security/006 05 AWS Security solution Data Protection_id.vtt
5.86KB
~Get Your Files Here !/01 - Introduction to Cloud Security/006 05 AWS Security solution Data Protection_it.vtt
5.72KB
~Get Your Files Here !/01 - Introduction to Cloud Security/006 05 AWS Security solution Data Protection_pt.vtt
5.96KB
~Get Your Files Here !/01 - Introduction to Cloud Security/007 06 AWS Security solution Incident Response.mp4
26.05MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
~Get Your Files Here !/01 - Introduction to Cloud Security/007 06 AWS Security solution Incident Response_de.vtt
5.15KB
~Get Your Files Here !/01 - Introduction to Cloud Security/007 06 AWS Security solution Incident Response_es.vtt
5.05KB
~Get Your Files Here !/01 - Introduction to Cloud Security/007 06 AWS Security solution Incident Response_fr.vtt
5.34KB
~Get Your Files Here !/01 - Introduction to Cloud Security/007 06 AWS Security solution Incident Response_id.vtt
5KB
~Get Your Files Here !/01 - Introduction to Cloud Security/007 06 AWS Security solution Incident Response_it.vtt
4.9KB
~Get Your Files Here !/01 - Introduction to Cloud Security/007 06 AWS Security solution Incident Response_pt.vtt
5.05KB
~Get Your Files Here !/01 - Introduction to Cloud Security/008 07 AWS Security solution Well Architected Framework Security - Pillar.mp4
9.34MB
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
~Get Your Files Here !/01 - Introduction to Cloud Security/008 07 AWS Security solution Well Architected Framework Security - Pillar_de.vtt
2.29KB
~Get Your Files Here !/01 - Introduction to Cloud Security/008 07 AWS Security solution Well Architected Framework Security - Pillar_es.vtt
2.25KB
~Get Your Files Here !/01 - Introduction to Cloud Security/008 07 AWS Security solution Well Architected Framework Security - Pillar_fr.vtt
2.38KB
~Get Your Files Here !/01 - Introduction to Cloud Security/008 07 AWS Security solution Well Architected Framework Security - Pillar_id.vtt
2.29KB
~Get Your Files Here !/01 - Introduction to Cloud Security/008 07 AWS Security solution Well Architected Framework Security - Pillar_it.vtt
2.23KB
~Get Your Files Here !/01 - Introduction to Cloud Security/008 07 AWS Security solution Well Architected Framework Security - Pillar_pt.vtt
2.26KB
~Get Your Files Here !/01 - Introduction to Cloud Security/009 08 AWS Security solution NIST CyberSecurity Framework.mp4
32.49MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
~Get Your Files Here !/01 - Introduction to Cloud Security/009 08 AWS Security solution NIST CyberSecurity Framework_de.vtt
9.39KB
~Get Your Files Here !/01 - Introduction to Cloud Security/009 08 AWS Security solution NIST CyberSecurity Framework_es.vtt
9.08KB
~Get Your Files Here !/01 - Introduction to Cloud Security/009 08 AWS Security solution NIST CyberSecurity Framework_fr.vtt
9.69KB
~Get Your Files Here !/01 - Introduction to Cloud Security/009 08 AWS Security solution NIST CyberSecurity Framework_id.vtt
9.08KB
~Get Your Files Here !/01 - Introduction to Cloud Security/009 08 AWS Security solution NIST CyberSecurity Framework_it.vtt
9KB
~Get Your Files Here !/01 - Introduction to Cloud Security/009 08 AWS Security solution NIST CyberSecurity Framework_pt.vtt
9.12KB
~Get Your Files Here !/01 - Introduction to Cloud Security/21334068-Shared-Responsibility-Model-V2.59d1eccec334b366627e9295b304202faf7b899b.jpg
111.44KB
~Get Your Files Here !/01 - Introduction to Cloud Security/external-assets-links.txt
1.24KB
~Get Your Files Here !/02 - Security by Design Principles/001 00 Introduction Security by Design Principles.mp4
8.76MB
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
~Get Your Files Here !/02 - Security by Design Principles/001 00 Introduction Security by Design Principles_de.vtt
2.04KB
~Get Your Files Here !/02 - Security by Design Principles/001 00 Introduction Security by Design Principles_es.vtt
1.97KB
~Get Your Files Here !/02 - Security by Design Principles/001 00 Introduction Security by Design Principles_fr.vtt
2.06KB
~Get Your Files Here !/02 - Security by Design Principles/001 00 Introduction Security by Design Principles_id.vtt
2.03KB
~Get Your Files Here !/02 - Security by Design Principles/001 00 Introduction Security by Design Principles_it.vtt
1.96KB
~Get Your Files Here !/02 - Security by Design Principles/001 00 Introduction Security by Design Principles_pt.vtt
1.99KB
~Get Your Files Here !/02 - Security by Design Principles/002 01 SbD Implement a Segregated Account Environment.mp4
12.61MB
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
~Get Your Files Here !/02 - Security by Design Principles/002 01 SbD Implement a Segregated Account Environment_de.vtt
2.87KB
~Get Your Files Here !/02 - Security by Design Principles/002 01 SbD Implement a Segregated Account Environment_es.vtt
2.75KB
~Get Your Files Here !/02 - Security by Design Principles/002 01 SbD Implement a Segregated Account Environment_fr.vtt
3.02KB
~Get Your Files Here !/02 - Security by Design Principles/002 01 SbD Implement a Segregated Account Environment_id.vtt
2.81KB
~Get Your Files Here !/02 - Security by Design Principles/002 01 SbD Implement a Segregated Account Environment_it.vtt
2.78KB
~Get Your Files Here !/02 - Security by Design Principles/002 01 SbD Implement a Segregated Account Environment_pt.vtt
2.81KB
~Get Your Files Here !/02 - Security by Design Principles/003 02 SbD Implement a Strong Identity Foundation.mp4
35.47MB
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
~Get Your Files Here !/02 - Security by Design Principles/003 02 SbD Implement a Strong Identity Foundation_de.vtt
8.32KB
~Get Your Files Here !/02 - Security by Design Principles/003 02 SbD Implement a Strong Identity Foundation_es.vtt
7.92KB
~Get Your Files Here !/02 - Security by Design Principles/003 02 SbD Implement a Strong Identity Foundation_fr.vtt
8.35KB
~Get Your Files Here !/02 - Security by Design Principles/003 02 SbD Implement a Strong Identity Foundation_id.vtt
7.8KB
~Get Your Files Here !/02 - Security by Design Principles/003 02 SbD Implement a Strong Identity Foundation_it.vtt
7.78KB
~Get Your Files Here !/02 - Security by Design Principles/003 02 SbD Implement a Strong Identity Foundation_pt.vtt
8.05KB
~Get Your Files Here !/02 - Security by Design Principles/004 03 SbD Enable Traceability.mp4
47.28MB
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
~Get Your Files Here !/02 - Security by Design Principles/004 03 SbD Enable Traceability_de.vtt
10.42KB
~Get Your Files Here !/02 - Security by Design Principles/004 03 SbD Enable Traceability_es.vtt
10.28KB
~Get Your Files Here !/02 - Security by Design Principles/004 03 SbD Enable Traceability_fr.vtt
10.83KB
~Get Your Files Here !/02 - Security by Design Principles/004 03 SbD Enable Traceability_id.vtt
10.27KB
~Get Your Files Here !/02 - Security by Design Principles/004 03 SbD Enable Traceability_it.vtt
10.09KB
~Get Your Files Here !/02 - Security by Design Principles/004 03 SbD Enable Traceability_pt.vtt
10.31KB
~Get Your Files Here !/02 - Security by Design Principles/005 04 SbD Apply Security at ALL layers.mp4
39.64MB
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
~Get Your Files Here !/02 - Security by Design Principles/005 04 SbD Apply Security at ALL layers_de.vtt
10.13KB
~Get Your Files Here !/02 - Security by Design Principles/005 04 SbD Apply Security at ALL layers_es.vtt
9.76KB
~Get Your Files Here !/02 - Security by Design Principles/005 04 SbD Apply Security at ALL layers_fr.vtt
10.38KB
~Get Your Files Here !/02 - Security by Design Principles/005 04 SbD Apply Security at ALL layers_id.vtt
9.8KB
~Get Your Files Here !/02 - Security by Design Principles/005 04 SbD Apply Security at ALL layers_it.vtt
9.5KB
~Get Your Files Here !/02 - Security by Design Principles/005 04 SbD Apply Security at ALL layers_pt.vtt
9.87KB
~Get Your Files Here !/02 - Security by Design Principles/006 05 SbD Automate Security Best Practices.mp4
32.37MB
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
~Get Your Files Here !/02 - Security by Design Principles/006 05 SbD Automate Security Best Practices_de.vtt
10.02KB
~Get Your Files Here !/02 - Security by Design Principles/006 05 SbD Automate Security Best Practices_es.vtt
9.36KB
~Get Your Files Here !/02 - Security by Design Principles/006 05 SbD Automate Security Best Practices_fr.vtt
10.16KB
~Get Your Files Here !/02 - Security by Design Principles/006 05 SbD Automate Security Best Practices_id.vtt
9.44KB
~Get Your Files Here !/02 - Security by Design Principles/006 05 SbD Automate Security Best Practices_it.vtt
9.36KB
~Get Your Files Here !/02 - Security by Design Principles/006 05 SbD Automate Security Best Practices_pt.vtt
9.51KB
~Get Your Files Here !/02 - Security by Design Principles/007 06 SbD Protect data - Encryption at rest and motion.mp4
36.53MB
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
~Get Your Files Here !/02 - Security by Design Principles/007 06 SbD Protect data - Encryption at rest and motion_de.vtt
10.27KB
~Get Your Files Here !/02 - Security by Design Principles/007 06 SbD Protect data - Encryption at rest and motion_es.vtt
9.75KB
~Get Your Files Here !/02 - Security by Design Principles/007 06 SbD Protect data - Encryption at rest and motion_fr.vtt
10.38KB
~Get Your Files Here !/02 - Security by Design Principles/007 06 SbD Protect data - Encryption at rest and motion_id.vtt
9.86KB
~Get Your Files Here !/02 - Security by Design Principles/007 06 SbD Protect data - Encryption at rest and motion_it.vtt
9.51KB
~Get Your Files Here !/02 - Security by Design Principles/007 06 SbD Protect data - Encryption at rest and motion_pt.vtt
10KB
~Get Your Files Here !/02 - Security by Design Principles/008 07 SbD Prepare for Security Events.mp4
20.66MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
~Get Your Files Here !/02 - Security by Design Principles/008 07 SbD Prepare for Security Events_de.vtt
4.86KB
~Get Your Files Here !/02 - Security by Design Principles/008 07 SbD Prepare for Security Events_es.vtt
4.6KB
~Get Your Files Here !/02 - Security by Design Principles/008 07 SbD Prepare for Security Events_fr.vtt
4.86KB
~Get Your Files Here !/02 - Security by Design Principles/008 07 SbD Prepare for Security Events_id.vtt
4.72KB
~Get Your Files Here !/02 - Security by Design Principles/008 07 SbD Prepare for Security Events_it.vtt
4.61KB
~Get Your Files Here !/02 - Security by Design Principles/008 07 SbD Prepare for Security Events_pt.vtt
4.64KB
~Get Your Files Here !/02 - Security by Design Principles/009 08 Security Incident Response At a glance.mp4
14.4MB
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
~Get Your Files Here !/02 - Security by Design Principles/009 08 Security Incident Response At a glance_de.vtt
5.27KB
~Get Your Files Here !/02 - Security by Design Principles/009 08 Security Incident Response At a glance_es.vtt
5.17KB
~Get Your Files Here !/02 - Security by Design Principles/009 08 Security Incident Response At a glance_fr.vtt
5.47KB
~Get Your Files Here !/02 - Security by Design Principles/009 08 Security Incident Response At a glance_id.vtt
5.13KB
~Get Your Files Here !/02 - Security by Design Principles/009 08 Security Incident Response At a glance_it.vtt
5.02KB
~Get Your Files Here !/02 - Security by Design Principles/009 08 Security Incident Response At a glance_pt.vtt
5.14KB
~Get Your Files Here !/02 - Security by Design Principles/external-assets-links.txt
878B
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/001 00 Security Automation Moving from Reactive to Proactive.mp4
1.46MB
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
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/001 00 Security Automation Moving from Reactive to Proactive_de.vtt
299B
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/001 00 Security Automation Moving from Reactive to Proactive_es.vtt
299B
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/001 00 Security Automation Moving from Reactive to Proactive_fr.vtt
307B
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/001 00 Security Automation Moving from Reactive to Proactive_id.vtt
299B
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/001 00 Security Automation Moving from Reactive to Proactive_it.vtt
275B
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/001 00 Security Automation Moving from Reactive to Proactive_pt.vtt
257B
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/002 01 Security Automation Scenario01 Cloudtrail Disabled.mp4
29.09MB
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
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/002 01 Security Automation Scenario01 Cloudtrail Disabled_de.vtt
8.49KB
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/002 01 Security Automation Scenario01 Cloudtrail Disabled_es.vtt
8.11KB
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/002 01 Security Automation Scenario01 Cloudtrail Disabled_fr.vtt
8.54KB
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/002 01 Security Automation Scenario01 Cloudtrail Disabled_id.vtt
8.28KB
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/002 01 Security Automation Scenario01 Cloudtrail Disabled_it.vtt
7.95KB
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/002 01 Security Automation Scenario01 Cloudtrail Disabled_pt.vtt
8.14KB
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/003 02 Security Automation Scenario02 S3 Weak Bucket Policy.mp4
22.29MB
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
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/003 02 Security Automation Scenario02 S3 Weak Bucket Policy_de.vtt
6.04KB
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/003 02 Security Automation Scenario02 S3 Weak Bucket Policy_es.vtt
5.77KB
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/003 02 Security Automation Scenario02 S3 Weak Bucket Policy_fr.vtt
6.01KB
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/003 02 Security Automation Scenario02 S3 Weak Bucket Policy_id.vtt
5.82KB
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/003 02 Security Automation Scenario02 S3 Weak Bucket Policy_it.vtt
5.71KB
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/003 02 Security Automation Scenario02 S3 Weak Bucket Policy_pt.vtt
5.77KB
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/004 03 Security Automation Scenario03 Un-Authorized EC2 login.mp4
6.85MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/004 03 Security Automation Scenario03 Un-Authorized EC2 login_de.vtt
2.11KB
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/004 03 Security Automation Scenario03 Un-Authorized EC2 login_es.vtt
2.08KB
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/004 03 Security Automation Scenario03 Un-Authorized EC2 login_fr.vtt
2.17KB
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/004 03 Security Automation Scenario03 Un-Authorized EC2 login_id.vtt
2.1KB
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/004 03 Security Automation Scenario03 Un-Authorized EC2 login_it.vtt
2.07KB
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/004 03 Security Automation Scenario03 Un-Authorized EC2 login_pt.vtt
2.12KB
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/005 04 Security Automation Scenario04 Firewall Rule Disabled.mp4
3.09MB
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
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/005 04 Security Automation Scenario04 Firewall Rule Disabled_de.vtt
1.03KB
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/005 04 Security Automation Scenario04 Firewall Rule Disabled_es.vtt
989B
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/005 04 Security Automation Scenario04 Firewall Rule Disabled_fr.vtt
1.04KB
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/005 04 Security Automation Scenario04 Firewall Rule Disabled_id.vtt
1023B
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/005 04 Security Automation Scenario04 Firewall Rule Disabled_it.vtt
1KB
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/005 04 Security Automation Scenario04 Firewall Rule Disabled_pt.vtt
1020B
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/006 05 Security Automation Scenario05 GuardDuty Finding.mp4
3.73MB
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
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/006 05 Security Automation Scenario05 GuardDuty Finding_de.vtt
1.2KB
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/006 05 Security Automation Scenario05 GuardDuty Finding_es.vtt
1.13KB
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/006 05 Security Automation Scenario05 GuardDuty Finding_fr.vtt
1.26KB
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/006 05 Security Automation Scenario05 GuardDuty Finding_id.vtt
1.12KB
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/006 05 Security Automation Scenario05 GuardDuty Finding_it.vtt
1.14KB
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/006 05 Security Automation Scenario05 GuardDuty Finding_pt.vtt
1.14KB
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/external-assets-links.txt
120B
~Get Your Files Here !/04 - AWS Security Anit-Patterns/001 01 Security Anit-Patterns.mp4
22.37MB
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
~Get Your Files Here !/04 - AWS Security Anit-Patterns/001 01 Security Anit-Patterns_de.vtt
6.42KB
~Get Your Files Here !/04 - AWS Security Anit-Patterns/001 01 Security Anit-Patterns_es.vtt
6.1KB
~Get Your Files Here !/04 - AWS Security Anit-Patterns/001 01 Security Anit-Patterns_fr.vtt
6.52KB
~Get Your Files Here !/04 - AWS Security Anit-Patterns/001 01 Security Anit-Patterns_id.vtt
6.21KB
~Get Your Files Here !/04 - AWS Security Anit-Patterns/001 01 Security Anit-Patterns_it.vtt
6.01KB
~Get Your Files Here !/04 - AWS Security Anit-Patterns/001 01 Security Anit-Patterns_pt.vtt
6.2KB
~Get Your Files Here !/05 - AWS Security Next Steps & Call to Action/001 01 AWS Security Next Steps & Call to Action.mp4
22.87MB
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
~Get Your Files Here !/05 - AWS Security Next Steps & Call to Action/001 01 AWS Security Next Steps & Call to Action_de.vtt
6.6KB
~Get Your Files Here !/05 - AWS Security Next Steps & Call to Action/001 01 AWS Security Next Steps & Call to Action_es.vtt
6.46KB
~Get Your Files Here !/05 - AWS Security Next Steps & Call to Action/001 01 AWS Security Next Steps & Call to Action_fr.vtt
6.78KB
~Get Your Files Here !/05 - AWS Security Next Steps & Call to Action/001 01 AWS Security Next Steps & Call to Action_id.vtt
6.56KB
~Get Your Files Here !/05 - AWS Security Next Steps & Call to Action/001 01 AWS Security Next Steps & Call to Action_it.vtt
6.46KB
~Get Your Files Here !/05 - AWS Security Next Steps & Call to Action/001 01 AWS Security Next Steps & Call to Action_pt.vtt
6.54KB
~Get Your Files Here !/Bonus Resources.txt
386B