首页
磁力链接怎么用
한국어
English
日本語
简体中文
繁體中文
[FreeCourseSite.com] Udemy - AWS Certified Security Specialty 2022
文件类型
收录时间
最后活跃
资源热度
文件大小
文件数量
视频
2022-2-21 00:03
2024-11-30 06:00
183
10.01 GB
201
磁力链接
magnet:?xt=urn:btih:7b67d1e255a20fe6e8a1d5a762d5be96df3d5f33
迅雷链接
thunder://QUFtYWduZXQ6P3h0PXVybjpidGloOjdiNjdkMWUyNTVhMjBmZTZlOGExZDVhNzYyZDViZTk2ZGYzZDVmMzNaWg==
二维码链接
种子下载(838888不存储任何种子文件)
种子下载线路1(迅雷)--推荐
种子下载线路2(比特彗星)
种子下载线路3(torcache)
3条线路均为国内外知名下载网站种子链接,内容跟本站无关!
相关链接
FreeCourseSite
com
Udemy
-
AWS
Certified
Security
Specialty
2022
文件列表
01 - Getting started with the course/001 Overview of the Course.mp4
55.14MB
02 - Domain 1 - Incident Response/001 Introduction to Domain 1.mp4
45.76MB
02 - Domain 1 - Incident Response/002 Case Study of Hacked Server.mp4
64.56MB
02 - Domain 1 - Incident Response/003 Dealing with AWS Abuse Notice.mp4
55.7MB
02 - Domain 1 - Incident Response/004 AWS GuardDuty.mp4
65.33MB
02 - Domain 1 - Incident Response/005 Whitelisting Alerts in AWS GuardDuty.mp4
29.87MB
02 - Domain 1 - Incident Response/007 Centralized Dashboards for GuardDuty Findings.mp4
34.03MB
02 - Domain 1 - Incident Response/008 Understanding Incident Response Terminology.mp4
106.93MB
02 - Domain 1 - Incident Response/009 Incident Response Use-Cases for Exams.mp4
9.77MB
02 - Domain 1 - Incident Response/010 Use Case - Dealing with Exposed Access Keys.mp4
111.95MB
02 - Domain 1 - Incident Response/011 Use Case - Dealing with compromised EC2 Instances.mp4
15.94MB
02 - Domain 1 - Incident Response/012 Incident Response in Cloud.mp4
43.15MB
02 - Domain 1 - Incident Response/013 Penetration Testing in AWS (New).mp4
23.59MB
03 - Domain 2 - Logging & Monitoring/001 Introduction to Vulnerability, Exploit, Payload.mp4
39.76MB
03 - Domain 2 - Logging & Monitoring/002 VEP Practical - Hacking inside a test farm.mp4
97.53MB
03 - Domain 2 - Logging & Monitoring/003 Understanding Automated Vulnerability Scanners.mp4
117.45MB
03 - Domain 2 - Logging & Monitoring/004 Common Vulnerabilities Exposures & CVSS.mp4
67.59MB
03 - Domain 2 - Logging & Monitoring/005 Introduction to AWS Inspector.mp4
25.89MB
03 - Domain 2 - Logging & Monitoring/006 AWS Inspector Vulnerability Scans.mp4
82.45MB
03 - Domain 2 - Logging & Monitoring/007 AWS Security Hub.mp4
73.03MB
03 - Domain 2 - Logging & Monitoring/008 Overview of Layer 7 Firewalls.mp4
49.68MB
03 - Domain 2 - Logging & Monitoring/009 Understanding AWS WAF.mp4
86.67MB
03 - Domain 2 - Logging & Monitoring/010 Implementing AWS WAF with ALB.mp4
39.06MB
03 - Domain 2 - Logging & Monitoring/011 Overview of AWS Systems Manager.mp4
32.86MB
03 - Domain 2 - Logging & Monitoring/012 Configure SSM Agent.mp4
51.41MB
03 - Domain 2 - Logging & Monitoring/013 Overview of Sessions Manager.mp4
37.5MB
03 - Domain 2 - Logging & Monitoring/014 SSM - Run Command.mp4
33.13MB
03 - Domain 2 - Logging & Monitoring/015 Overview of Patch Manager.mp4
36.08MB
03 - Domain 2 - Logging & Monitoring/016 EC2 Systems Manager - Parameter Store.mp4
22.13MB
03 - Domain 2 - Logging & Monitoring/017 Systems Manager Automation.mp4
73.58MB
03 - Domain 2 - Logging & Monitoring/018 Systems Manager Inventory.mp4
33.32MB
03 - Domain 2 - Logging & Monitoring/019 Creating our First Inventory in SSM.mp4
15.7MB
03 - Domain 2 - Logging & Monitoring/020 Overview of Unified CloudWatch Agent.mp4
46.76MB
03 - Domain 2 - Logging & Monitoring/021 Unified CloudWatch Agent - Practical.mp4
70.13MB
03 - Domain 2 - Logging & Monitoring/023 Amazon EventBridge.mp4
37.18MB
03 - Domain 2 - Logging & Monitoring/024 AWS Athena.mp4
146.98MB
03 - Domain 2 - Logging & Monitoring/026 Improved Governance - AWS Config 01.mp4
97.43MB
03 - Domain 2 - Logging & Monitoring/027 Improved Governance - AWS Config 02.mp4
83.34MB
03 - Domain 2 - Logging & Monitoring/028 Trusted Advisor.mp4
60.95MB
03 - Domain 2 - Logging & Monitoring/029 Understanding CloudTrail.mp4
43.05MB
03 - Domain 2 - Logging & Monitoring/030 Creating First CloudTrail Trail.mp4
37.08MB
03 - Domain 2 - Logging & Monitoring/031 CloudTrail Event Types.mp4
46.6MB
03 - Domain 2 - Logging & Monitoring/032 CloudTrail - Log File Integrity Validation.mp4
86.01MB
03 - Domain 2 - Logging & Monitoring/034 Digest Delivery Times.mp4
17.58MB
03 - Domain 2 - Logging & Monitoring/035 Overview of Amazon Macie.mp4
43.08MB
03 - Domain 2 - Logging & Monitoring/036 Detecting Sensitive Files with Macie.mp4
62.46MB
03 - Domain 2 - Logging & Monitoring/037 S3 Event Notification.mp4
22.06MB
03 - Domain 2 - Logging & Monitoring/038 Overview of VPC Flow Logs.mp4
100.45MB
03 - Domain 2 - Logging & Monitoring/039 VPC Flow Logs In-Detail.mp4
34.57MB
03 - Domain 2 - Logging & Monitoring/040 Centralized Logging Architecture.mp4
36.29MB
03 - Domain 2 - Logging & Monitoring/041 Cross-Account Logging for CloudTrail and Config.mp4
67.84MB
03 - Domain 2 - Logging & Monitoring/043 Overview of Cross-Account Log Data Sharing.mp4
27.75MB
03 - Domain 2 - Logging & Monitoring/044 Cross-Account CloudWatch Logs - Part 01.mp4
76.19MB
03 - Domain 2 - Logging & Monitoring/045 Cross-Account CloudWatch Logs - Part 02.mp4
108.34MB
03 - Domain 2 - Logging & Monitoring/047 AWS SNS.mp4
58.17MB
04 - Domain 3 - Infrastructure Security/001 Bastion Hosts & SSH Agent Forwarding.mp4
75.35MB
04 - Domain 3 - Infrastructure Security/003 Introduction to Virtual Private Networks.mp4
47.15MB
04 - Domain 3 - Infrastructure Security/004 Understanding AWS Client VPN Endpoints.mp4
45.81MB
04 - Domain 3 - Infrastructure Security/005 Creating Client VPN Endpoints.mp4
158.28MB
04 - Domain 3 - Infrastructure Security/007 Overview of AWS VPN Tunnels.mp4
24.26MB
04 - Domain 3 - Infrastructure Security/008 Using AWS VPN for On-Premise to AWS connectivity.mp4
33.81MB
04 - Domain 3 - Infrastructure Security/009 Configuring first IPSec tunnel with OpenSwan - Part 01.mp4
65.77MB
04 - Domain 3 - Infrastructure Security/011 Configuring first IPSec tunnel with OpenSwan - Part 02.mp4
56.13MB
04 - Domain 3 - Infrastructure Security/012 VPC Peering.mp4
43.5MB
04 - Domain 3 - Infrastructure Security/013 Overview of VPC Endpoints.mp4
42.29MB
04 - Domain 3 - Infrastructure Security/014 Implementing Gateway VPC Endpoints.mp4
93.63MB
04 - Domain 3 - Infrastructure Security/015 VPC Endpoint Policies.mp4
37.69MB
04 - Domain 3 - Infrastructure Security/016 Overview of Interface VPC Endpoints.mp4
71.85MB
04 - Domain 3 - Infrastructure Security/017 Implementing Interface Endpoints.mp4
45.93MB
04 - Domain 3 - Infrastructure Security/018 Network ACL.mp4
61.23MB
04 - Domain 3 - Infrastructure Security/019 Understanding Stateful vs Stateless Firewalls.mp4
98.94MB
04 - Domain 3 - Infrastructure Security/020 IDS IPS in AWS.mp4
30.21MB
04 - Domain 3 - Infrastructure Security/021 EBS Architecture & Secure Data Wiping.mp4
90.18MB
04 - Domain 3 - Infrastructure Security/022 Understanding the Content Delivery Networks.mp4
52.5MB
04 - Domain 3 - Infrastructure Security/023 Demo - CloudFront Distribution.mp4
84.32MB
04 - Domain 3 - Infrastructure Security/024 Understanding Edge Locations.mp4
55.24MB
04 - Domain 3 - Infrastructure Security/025 Deploying Cloudfront Distribution - Part 01.mp4
57.19MB
04 - Domain 3 - Infrastructure Security/026 Deploying Cloudfront Distribution - Part 02.mp4
67.82MB
04 - Domain 3 - Infrastructure Security/027 Understanding the Origin Access Identity.mp4
80.14MB
04 - Domain 3 - Infrastructure Security/028 Understanding importance of SNI in TLS protocol.mp4
56.52MB
04 - Domain 3 - Infrastructure Security/029 Overview of CloudFront Signed URLs.mp4
26.66MB
04 - Domain 3 - Infrastructure Security/030 Implementing CloudFront Signed URLs.mp4
74.85MB
04 - Domain 3 - Infrastructure Security/031 Field Level Encryption in CloudFront.mp4
81.93MB
04 - Domain 3 - Infrastructure Security/032 Real World example on DOS Implementation.mp4
82.88MB
04 - Domain 3 - Infrastructure Security/033 AWS Shield.mp4
27.3MB
04 - Domain 3 - Infrastructure Security/034 Mitigating DDOS Attacks.mp4
34.73MB
04 - Domain 3 - Infrastructure Security/036 Introduction to Application Programming Interface (API).mp4
161.02MB
04 - Domain 3 - Infrastructure Security/037 Understanding the working of API.mp4
65.6MB
04 - Domain 3 - Infrastructure Security/038 Building Lambda Function for our API.mp4
20.62MB
04 - Domain 3 - Infrastructure Security/039 Building our first API with API Gateway.mp4
52.38MB
04 - Domain 3 - Infrastructure Security/040 Lambda & S3.mp4
26.93MB
04 - Domain 3 - Infrastructure Security/041 EC2 Key-Pair Troubleshooting.mp4
105.46MB
04 - Domain 3 - Infrastructure Security/042 EC2 Tenancy Attribute.mp4
41.15MB
04 - Domain 3 - Infrastructure Security/043 AWS Artifact.mp4
30.77MB
04 - Domain 3 - Infrastructure Security/044
[email protected]
58.23MB
04 - Domain 3 - Infrastructure Security/045 Lambda@Edge Practical.mp4
27.28MB
04 - Domain 3 - Infrastructure Security/046 AWS Simple Email Service (SES) (New).mp4
20.45MB
04 - Domain 3 - Infrastructure Security/047 DNS Resolution in VPC.mp4
57.94MB
04 - Domain 3 - Infrastructure Security/048 DNS Query Logging.mp4
38.33MB
04 - Domain 3 - Infrastructure Security/049 Implementing Route53 Query Logging.mp4
36.05MB
05 - Domain 4 - Identity & Access Management/001 Overview of AWS Organizations.mp4
42.84MB
05 - Domain 4 - Identity & Access Management/002 Creating our first AWS Organization & SCP.mp4
41.86MB
05 - Domain 4 - Identity & Access Management/003 Organizational Unit (OU) in AWS organization.mp4
20.14MB
05 - Domain 4 - Identity & Access Management/004 IAM Policy Evaluation Logic.mp4
49.41MB
05 - Domain 4 - Identity & Access Management/005 Identity and Resource Based Policies.mp4
23.38MB
05 - Domain 4 - Identity & Access Management/006 Understanding IAM Policies.mp4
46.41MB
05 - Domain 4 - Identity & Access Management/007 IAM Policies - Part 02.mp4
118.26MB
05 - Domain 4 - Identity & Access Management/008 Delegation - Cross Account Trust - Part 1.mp4
57.56MB
05 - Domain 4 - Identity & Access Management/009 Creating Cross-Account IAM Roles.mp4
62.17MB
05 - Domain 4 - Identity & Access Management/011 External ID in Delegation.mp4
70.98MB
05 - Domain 4 - Identity & Access Management/012 EC2 Instance Meta-Data.mp4
53.86MB
05 - Domain 4 - Identity & Access Management/013 Revising IAM Role.mp4
61.47MB
05 - Domain 4 - Identity & Access Management/014 Understanding working of an IAM role.mp4
14.39MB
05 - Domain 4 - Identity & Access Management/015 IPTABLES & Instance Meta-Data.mp4
30.91MB
05 - Domain 4 - Identity & Access Management/017 IAM - Version Element.mp4
88.81MB
05 - Domain 4 - Identity & Access Management/018 IAM Policy Variables.mp4
17.5MB
05 - Domain 4 - Identity & Access Management/020 Principal and NotPrincipal Element.mp4
41.53MB
05 - Domain 4 - Identity & Access Management/022 Implementing NotPrincipal Element.mp4
16MB
05 - Domain 4 - Identity & Access Management/024 Conditionl Element.mp4
47.07MB
05 - Domain 4 - Identity & Access Management/026 AWS Security Token Service.mp4
112.73MB
05 - Domain 4 - Identity & Access Management/027 Understanding Federation - Part 01.mp4
43.1MB
05 - Domain 4 - Identity & Access Management/028 Understanding Federation - Part 02.mp4
48.34MB
05 - Domain 4 - Identity & Access Management/030 Understanding SAML for SSO.mp4
98.36MB
05 - Domain 4 - Identity & Access Management/031 Overview of AWS Single Sign-On.mp4
19.81MB
05 - Domain 4 - Identity & Access Management/032 Implementing AWS SSO.mp4
56.27MB
05 - Domain 4 - Identity & Access Management/033 Integrating AWS SSO with AWS CLI.mp4
29.39MB
05 - Domain 4 - Identity & Access Management/034 AWS Cognito.mp4
81.96MB
05 - Domain 4 - Identity & Access Management/035 Understanding Active Directory.mp4
10.17MB
05 - Domain 4 - Identity & Access Management/036 Introduction to AWS Directory Service.mp4
58.82MB
05 - Domain 4 - Identity & Access Management/037 Domain Joining EC2 instance with Directory Service.mp4
109.57MB
05 - Domain 4 - Identity & Access Management/039 Trusts in Active Directory.mp4
22.12MB
05 - Domain 4 - Identity & Access Management/040 S3 Bucket Policies.mp4
96.48MB
05 - Domain 4 - Identity & Access Management/042 Regaining Access to Locked S3 Bucket.mp4
19.58MB
05 - Domain 4 - Identity & Access Management/044 Cross Account S3 Bucket Configuration.mp4
66.88MB
05 - Domain 4 - Identity & Access Management/046 Canned ACLs.mp4
57.05MB
05 - Domain 4 - Identity & Access Management/048 Understanding Presigned URLs.mp4
27.89MB
05 - Domain 4 - Identity & Access Management/049 S3 Versioning.mp4
51.55MB
05 - Domain 4 - Identity & Access Management/050 S3 - Cross Region Replication.mp4
14.24MB
05 - Domain 4 - Identity & Access Management/051 S3 Object Lock.mp4
52.57MB
05 - Domain 4 - Identity & Access Management/052 MFA Protected API Access.mp4
75.58MB
05 - Domain 4 - Identity & Access Management/054 IAM Permission Boundaries.mp4
61.9MB
05 - Domain 4 - Identity & Access Management/055 IAM and S3.mp4
22.08MB
05 - Domain 4 - Identity & Access Management/057 Troubleshooting IAM Policies.mp4
4.45MB
05 - Domain 4 - Identity & Access Management/059 Troubleshooting Answers - Solution 01.mp4
16.48MB
05 - Domain 4 - Identity & Access Management/060 Troubleshooting Answers - Solution 02.mp4
49.35MB
05 - Domain 4 - Identity & Access Management/061 Troubleshooting Answers - Solution 03.mp4
33.07MB
05 - Domain 4 - Identity & Access Management/062 Troubleshooting Answers - Solution 04.mp4
3.63MB
05 - Domain 4 - Identity & Access Management/063 Troubleshooting Answers - Solution 05.mp4
12.39MB
05 - Domain 4 - Identity & Access Management/064 AWS Control Tower.mp4
114.83MB
05 - Domain 4 - Identity & Access Management/065 IAM Service Role and Pass Role.mp4
81.47MB
05 - Domain 4 - Identity & Access Management/067 Amazon WorkMail.mp4
36.12MB
06 - Domain 5 - Data Protection/001 Introduction to Cryptography.mp4
80.78MB
06 - Domain 5 - Data Protection/002 Understanding communication Protocols.mp4
11.81MB
06 - Domain 5 - Data Protection/003 Plain Text vs Encrypted Text Based Protocols.mp4
77.84MB
06 - Domain 5 - Data Protection/004 Understanding the Disk Level encryption schemas.mp4
30.97MB
06 - Domain 5 - Data Protection/005 CloudHSM.mp4
19.32MB
06 - Domain 5 - Data Protection/006 AWS Key Management Service.mp4
22.2MB
06 - Domain 5 - Data Protection/007 Creating our first CMK.mp4
84.7MB
06 - Domain 5 - Data Protection/008 Envelope Encryption with KMS.mp4
37.74MB
06 - Domain 5 - Data Protection/009 Overview of Asymmetric Key Encryption.mp4
73.03MB
06 - Domain 5 - Data Protection/010 Asymmetric Keys with KMS.mp4
38.25MB
06 - Domain 5 - Data Protection/012 Digital Signing with KMS.mp4
35.98MB
06 - Domain 5 - Data Protection/014 AWS Key Management Service - Data Key Caching.mp4
56.8MB
06 - Domain 5 - Data Protection/015 AWS Key Management Service - Scheduled CMK Deletion.mp4
13.7MB
06 - Domain 5 - Data Protection/016 AWS Key Management Service - CMK Deletion & EBS Use-Case.mp4
51.29MB
06 - Domain 5 - Data Protection/017 Reducing Risk of Unmanageable CMK.mp4
12.06MB
06 - Domain 5 - Data Protection/018 KMS - Authentication and Access Control.mp4
19.2MB
06 - Domain 5 - Data Protection/019 KMS Policy Evaluation Logic - Use Case Solution - 01.mp4
7.17MB
06 - Domain 5 - Data Protection/021 KMS Policy Evaluation Logic - Use Case Solution - 01.mp4
17.85MB
06 - Domain 5 - Data Protection/022 KMS Policy Evaluation Logic - Use Case 02.mp4
7.08MB
06 - Domain 5 - Data Protection/024 KMS Policy Evaluation Logic - Use Case Solution - 02.mp4
11.14MB
06 - Domain 5 - Data Protection/025 KMS Policy Evaluation Logic - Use Case - 03.mp4
1.88MB
06 - Domain 5 - Data Protection/027 KMS Policy Evaluation Logic - Use Case Solution - 03 (New).mp4
5.64MB
06 - Domain 5 - Data Protection/028 KMS Grants.mp4
70.9MB
06 - Domain 5 - Data Protection/030 Importing Key Material to KMS.mp4
17.63MB
06 - Domain 5 - Data Protection/032 KMS ViaService.mp4
73.13MB
06 - Domain 5 - Data Protection/034 Migrating Encrypted KMS Data Across Regions.mp4
54.83MB
06 - Domain 5 - Data Protection/035 Multi-Region KMS.mp4
58.97MB
06 - Domain 5 - Data Protection/036 Benefits of CloudHSM over KMS.mp4
6.4MB
06 - Domain 5 - Data Protection/037 S3 Encryption.mp4
77.74MB
06 - Domain 5 - Data Protection/038 Revising Classic Load Balancers.mp4
70.69MB
06 - Domain 5 - Data Protection/039 Overview of Load Balancer Types.mp4
18.09MB
06 - Domain 5 - Data Protection/040 Overview of Application Load Balancer.mp4
55.36MB
06 - Domain 5 - Data Protection/041 Path Based Routing in ALB.mp4
65.08MB
06 - Domain 5 - Data Protection/042 ELB Access Logs.mp4
82.18MB
06 - Domain 5 - Data Protection/043 Revising ELB Listener Configuration.mp4
82.94MB
06 - Domain 5 - Data Protection/044 ELB Listeners - Understanding HTTP vs TCP Listeners.mp4
73MB
06 - Domain 5 - Data Protection/045 Understanding AWS Certificate Manager.mp4
19.42MB
06 - Domain 5 - Data Protection/046 Deploying SSLTLS certificate with ACM.mp4
23.67MB
06 - Domain 5 - Data Protection/047 Configuring ELB with HTTPS for SSL Offloading.mp4
22.48MB
06 - Domain 5 - Data Protection/048 Glacier Vault and Vault Lock.mp4
26.46MB
06 - Domain 5 - Data Protection/049 DynamoDB Encryption.mp4
12.8MB
06 - Domain 5 - Data Protection/050 Overview of AWS Secrets Manager.mp4
20.08MB
06 - Domain 5 - Data Protection/051 RDS Integration with AWS Secrets Manager.mp4
75.48MB
06 - Domain 5 - Data Protection/052 Encryption Context in KMS.mp4
37.51MB
07 - Important points for Exams/001 Important Pointers - Domain 1.mp4
55.92MB
07 - Important points for Exams/002 Important Pointers - Domain 2.mp4
34.05MB
07 - Important points for Exams/003 Important Pointers - Domain 3.mp4
30.3MB
07 - Important points for Exams/004 Important Pointers - Domain 4.mp4
56.9MB
07 - Important points for Exams/005 Important Pointers - Domain 5.mp4
70.41MB
07 - Important points for Exams/006 Updated - Important Pointers for Exams.mp4
16.7MB
友情提示
不会用的朋友看这里 把磁力链接复制到离线下载,或者bt下载软件里即可下载文件,或者直接复制迅雷链接到迅雷里下载! 亲,你造吗?将网页分享给您的基友,下载的人越多速度越快哦!
违规内容投诉邮箱:
[email protected]
概述 838888磁力搜索是一个磁力链接搜索引擎,是学术研究的副产品,用于解决资源过度分散的问题 它通过BitTorrent协议加入DHT网络,实时的自动采集数据,仅存储文件的标题、大小、文件列表、文件标识符(磁力链接)等基础信息 838888磁力搜索不下载任何真实资源,无法判断资源的合法性及真实性,使用838888磁力搜索服务的用户需自行鉴别内容的真伪 838888磁力搜索不上传任何资源,不提供Tracker服务,不提供种子文件的下载,这意味着838888磁力搜索 838888磁力搜索是一个完全合法的系统