magnet:?xt=urn:btih:A0B546FECCAB7E575A81AB9F05DEBFA5E41E9CDC
53 - 8.1 Understanding Cryptography Basics.mp4 1.5 GB
35 - 6.2 Deploying Best Practices for Network Security in the Cloud.mp4 1.4 GB
30 - 5.7 Understanding AWS Security Token Service (STS).mp4 1.3 GB
47 - 7.5 Understanding AWS Shield.mp4 1.2 GB
12 - 2.4 Surveying Strategies When Planning for Security.mp4 1.2 GB
50 - 7.8 Surveying Layered Defense in the Cloud.mp4 1.2 GB
05 - 1.2 Examining Types and Categories of Controls.mp4 1.1 GB
22 - 4.4 Deploying Identity and Access Management Best Practices.mp4 816.3 MB
43 - 7.1 Understanding Web Application Firewall (WAF).mp4 721.1 MB
10 - 2.2 Establishing AWS Responsibilities - Security of the Cloud.mp4 505.9 MB
04 - 1.1 Understanding the CIA Triad.mp4 471.8 MB
07 - 1.4 Surveying Common Threats to AWS Services.mp4 467.2 MB
60 - 9.3 Protecting EC2 Key Pairs.mp4 376.7 MB
11 - 2.3 Establishing Customer Responsibilities - Security in the Cloud.mp4 362.4 MB
34 - 6.1 Understanding Security Zoning and Network Segmentation.mp4 336.8 MB
68 - 10.3 Understanding AWS Auditing.mp4 304.3 MB
55 - 8.3 Examining IPsec in AWS.mp4 295.5 MB
09 - 2.1 Understanding the Shared Security Responsibility Model.mp4 290.8 MB
15 - 3.2 Understanding Risk and Compliance.mp4 256.4 MB
66 - 10.1 Understanding Security Reporting and Logging in AWS.mp4 222.8 MB