Login: Password:  Do not remember me

Categories




E-Books / Video TrainingPluralsight - AWS Security Operations - Securing Core AWS Infrastructure Services 2017 TUTORiAL



Pluralsight - AWS Security Operations - Securing Core AWS Infrastructure Services 2017 TUTORiAL
Pluralsight - AWS Security Operations - Securing Core AWS Infrastructure Services 2017 TUTORiAL | 498 MB

This course is focused on securing core AWS infrastructure hosted at Amazon Web Services to stay safe and compliant while operating in the AWS Cloud using recommended security best practices.

Course Overview 1m 39s
Course Overview 1m 39s
Managing Access Control 1h 23m 16s
Securing Core Infrastructure Services 3m 56s
Identity and Access Management 5m 3s
Defining Security Controls 4m 10s
Controlling Root Account Security 6m 2s
Managing Multiple Accounts 8m 47s
IAM Users and Security Controls 4m 17s
Defining IAM Policy for the User 6m 15s
Controlling Access to Resources 4m 36s
Access Keys and Passwords 4m 46s
Security Tools 4m 43s
IAM Groups 1m 32s
IAM Policies: The Basics7 m 35s
IAM Policy Types 9m 21s
Delegation and Federation 6m 57s
Best Practices for Planning Access Control 5m 7s
Securing Core Infrastructure 1h 35m 2s
Securing Core Infrastructure 3m 29s
Securing EC2 Infrastructure 8m 39s
Amazon Machine Instances 4m 41s
AMI Storage Choices and Key Pairs 2m 36s
EC2 Security Options 5m 14s
Interfaces and Addresses 7m 8s
Network Interfaces and Addresses 4m 3s
Dedicated Instances and Hosts 6m 56s
Securing EBS Volumes 3m 50s
EBS Volume and Snapshot Security 7m 35s
VPC Architecture 8m 26s
VPC Setup Options 3m 32s
VPC Security: Part A 7m 44s
VPC Security and Connectivity: Part B 7m 38s
VPC Security Considerations 5m 47s
Best Practices 7m 37s
Securing Access to Edge Locations 54m 16s
Securing Access to Edge Locations 2m 49s
Elastic Load Balancing 3m 8s
(Classic) Load Balancer 5m 32s
Elastic Load Balancer Operation 4m 46s
Classic ELB Security Features 2m 8s
Application Load Balancer 7m 34s
Elastic Load Balancer Setup 6m 55s
Route 53 6m 45s
AWS Web Application Firewall 5m 4s
Configuring the Web Application Firewall 3m 41s
Best Practices for Securing Access 5m 49s



Related News

Comments (0)

Add comment

Name:*
E-Mail:
Comment:
Security Code: *
reload, if the code cannot be seen

Search



Updates


«    September 2017    »
MonTueWedThuFriSatSun
 123
45678910
11121314151617
18192021222324
252627282930 


Friend Sites


Free Full Premium Downloads

Your Link Here ?
(Pagerank 4 or above)