~Get Your Files Here !/02 - Security by Design Principles/004 03 SbD Enable Traceability.mp4 49.6 MB
~Get Your Files Here !/01 - Introduction to Cloud Security/005 04 AWS Security solution Infrastructure Security.mp4 47.9 MB
~Get Your Files Here !/02 - Security by Design Principles/005 04 SbD Apply Security at ALL layers.mp4 41.6 MB
~Get Your Files Here !/02 - Security by Design Principles/007 06 SbD Protect data - Encryption at rest and motion.mp4 38.3 MB
~Get Your Files Here !/02 - Security by Design Principles/003 02 SbD Implement a Strong Identity Foundation.mp4 37.2 MB
~Get Your Files Here !/01 - Introduction to Cloud Security/009 08 AWS Security solution NIST CyberSecurity Framework.mp4 34.1 MB
~Get Your Files Here !/02 - Security by Design Principles/006 05 SbD Automate Security Best Practices.mp4 33.9 MB
~Get Your Files Here !/01 - Introduction to Cloud Security/004 03 AWS Security solution Detective Control.mp4 32.7 MB
~Get Your Files Here !/01 - Introduction to Cloud Security/006 05 AWS Security solution Data Protection.mp4 32.4 MB
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/002 01 Security Automation Scenario01 Cloudtrail Disabled.mp4 30.5 MB
~Get Your Files Here !/01 - Introduction to Cloud Security/007 06 AWS Security solution Incident Response.mp4 27.3 MB
~Get Your Files Here !/05 - AWS Security Next Steps & Call to Action/001 01 AWS Security Next Steps & Call to Action.mp4 24.0 MB
~Get Your Files Here !/04 - AWS Security Anit-Patterns/001 01 Security Anit-Patterns.mp4 23.5 MB
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/003 02 Security Automation Scenario02 S3 Weak Bucket Policy.mp4 23.4 MB
~Get Your Files Here !/02 - Security by Design Principles/008 07 SbD Prepare for Security Events.mp4 21.7 MB
~Get Your Files Here !/01 - Introduction to Cloud Security/003 02 AWS Security solution Identity.mp4 16.1 MB
~Get Your Files Here !/02 - Security by Design Principles/009 08 Security Incident Response At a glance.mp4 15.1 MB
~Get Your Files Here !/02 - Security by Design Principles/002 01 SbD Implement a Segregated Account Environment.mp4 13.2 MB
~Get Your Files Here !/01 - Introduction to Cloud Security/001 00 Why Cloud Security.mp4 12.5 MB
~Get Your Files Here !/01 - Introduction to Cloud Security/008 07 AWS Security solution Well Architected Framework Security - Pillar.mp4 9.8 MB
~Get Your Files Here !/02 - Security by Design Principles/001 00 Introduction Security by Design Principles.mp4 9.2 MB
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/004 03 Security Automation Scenario03 Un-Authorized EC2 login.mp4 7.2 MB
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/006 05 Security Automation Scenario05 GuardDuty Finding.mp4 3.9 MB
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/005 04 Security Automation Scenario04 Firewall Rule Disabled.mp4 3.2 MB
~Get Your Files Here !/01 - Introduction to Cloud Security/002 01 Introduction to AWS Security Services.mp4 3.0 MB
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/001 00 Security Automation Moving from Reactive to Proactive.mp4 1.5 MB
~Get Your Files Here !/01 - Introduction to Cloud Security/21334068-Shared-Responsibility-Model-V2.59d1eccec334b366627e9295b304202faf7b899b.jpg 114.1 kB
~Get Your Files Here !/02 - Security by Design Principles/004 03 SbD Enable Traceability_fr.vtt 11.1 kB
~Get Your Files Here !/02 - Security by Design Principles/004 03 SbD Enable Traceability_de.vtt 10.7 kB
~Get Your Files Here !/02 - Security by Design Principles/005 04 SbD Apply Security at ALL layers_fr.vtt 10.6 kB
~Get Your Files Here !/02 - Security by Design Principles/007 06 SbD Protect data - Encryption at rest and motion_fr.vtt 10.6 kB
~Get Your Files Here !/02 - Security by Design Principles/004 03 SbD Enable Traceability_pt.vtt 10.6 kB
~Get Your Files Here !/02 - Security by Design Principles/004 03 SbD Enable Traceability_es.vtt 10.5 kB
~Get Your Files Here !/02 - Security by Design Principles/007 06 SbD Protect data - Encryption at rest and motion_de.vtt 10.5 kB
~Get Your Files Here !/02 - Security by Design Principles/004 03 SbD Enable Traceability_id.vtt 10.5 kB
~Get Your Files Here !/02 - Security by Design Principles/006 05 SbD Automate Security Best Practices_fr.vtt 10.4 kB
~Get Your Files Here !/02 - Security by Design Principles/005 04 SbD Apply Security at ALL layers_de.vtt 10.4 kB
~Get Your Files Here !/02 - Security by Design Principles/004 03 SbD Enable Traceability_it.vtt 10.3 kB
~Get Your Files Here !/02 - Security by Design Principles/006 05 SbD Automate Security Best Practices_de.vtt 10.3 kB
~Get Your Files Here !/02 - Security by Design Principles/007 06 SbD Protect data - Encryption at rest and motion_pt.vtt 10.2 kB
~Get Your Files Here !/02 - Security by Design Principles/005 04 SbD Apply Security at ALL layers_pt.vtt 10.1 kB
~Get Your Files Here !/02 - Security by Design Principles/007 06 SbD Protect data - Encryption at rest and motion_id.vtt 10.1 kB
~Get Your Files Here !/02 - Security by Design Principles/005 04 SbD Apply Security at ALL layers_id.vtt 10.0 kB
~Get Your Files Here !/02 - Security by Design Principles/005 04 SbD Apply Security at ALL layers_es.vtt 10.0 kB
~Get Your Files Here !/02 - Security by Design Principles/007 06 SbD Protect data - Encryption at rest and motion_es.vtt 10.0 kB
~Get Your Files Here !/01 - Introduction to Cloud Security/009 08 AWS Security solution NIST CyberSecurity Framework_fr.vtt 9.9 kB
~Get Your Files Here !/02 - Security by Design Principles/007 06 SbD Protect data - Encryption at rest and motion_it.vtt 9.7 kB
~Get Your Files Here !/02 - Security by Design Principles/006 05 SbD Automate Security Best Practices_pt.vtt 9.7 kB
~Get Your Files Here !/02 - Security by Design Principles/005 04 SbD Apply Security at ALL layers_it.vtt 9.7 kB
~Get Your Files Here !/01 - Introduction to Cloud Security/005 04 AWS Security solution Infrastructure Security_fr.vtt 9.7 kB
~Get Your Files Here !/02 - Security by Design Principles/006 05 SbD Automate Security Best Practices_id.vtt 9.7 kB
~Get Your Files Here !/01 - Introduction to Cloud Security/009 08 AWS Security solution NIST CyberSecurity Framework_de.vtt 9.6 kB
~Get Your Files Here !/02 - Security by Design Principles/006 05 SbD Automate Security Best Practices_it.vtt 9.6 kB
~Get Your Files Here !/02 - Security by Design Principles/006 05 SbD Automate Security Best Practices_es.vtt 9.6 kB
~Get Your Files Here !/01 - Introduction to Cloud Security/005 04 AWS Security solution Infrastructure Security_pt.vtt 9.4 kB
~Get Your Files Here !/01 - Introduction to Cloud Security/009 08 AWS Security solution NIST CyberSecurity Framework_pt.vtt 9.3 kB
~Get Your Files Here !/01 - Introduction to Cloud Security/009 08 AWS Security solution NIST CyberSecurity Framework_es.vtt 9.3 kB
~Get Your Files Here !/01 - Introduction to Cloud Security/009 08 AWS Security solution NIST CyberSecurity Framework_id.vtt 9.3 kB
~Get Your Files Here !/01 - Introduction to Cloud Security/005 04 AWS Security solution Infrastructure Security_de.vtt 9.2 kB
~Get Your Files Here !/01 - Introduction to Cloud Security/009 08 AWS Security solution NIST CyberSecurity Framework_it.vtt 9.2 kB
~Get Your Files Here !/01 - Introduction to Cloud Security/005 04 AWS Security solution Infrastructure Security_es.vtt 9.2 kB
~Get Your Files Here !/01 - Introduction to Cloud Security/005 04 AWS Security solution Infrastructure Security_it.vtt 9.1 kB
~Get Your Files Here !/01 - Introduction to Cloud Security/005 04 AWS Security solution Infrastructure Security_id.vtt 9.0 kB
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/002 01 Security Automation Scenario01 Cloudtrail Disabled_fr.vtt 8.7 kB
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/002 01 Security Automation Scenario01 Cloudtrail Disabled_de.vtt 8.7 kB
~Get Your Files Here !/02 - Security by Design Principles/003 02 SbD Implement a Strong Identity Foundation_fr.vtt 8.6 kB
~Get Your Files Here !/02 - Security by Design Principles/003 02 SbD Implement a Strong Identity Foundation_de.vtt 8.5 kB
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/002 01 Security Automation Scenario01 Cloudtrail Disabled_id.vtt 8.5 kB
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/002 01 Security Automation Scenario01 Cloudtrail Disabled_pt.vtt 8.3 kB
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/002 01 Security Automation Scenario01 Cloudtrail Disabled_es.vtt 8.3 kB
~Get Your Files Here !/02 - Security by Design Principles/003 02 SbD Implement a Strong Identity Foundation_pt.vtt 8.2 kB
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/002 01 Security Automation Scenario01 Cloudtrail Disabled_it.vtt 8.1 kB
~Get Your Files Here !/02 - Security by Design Principles/003 02 SbD Implement a Strong Identity Foundation_es.vtt 8.1 kB
~Get Your Files Here !/02 - Security by Design Principles/003 02 SbD Implement a Strong Identity Foundation_id.vtt 8.0 kB
~Get Your Files Here !/02 - Security by Design Principles/003 02 SbD Implement a Strong Identity Foundation_it.vtt 8.0 kB
~Get Your Files Here !/05 - AWS Security Next Steps & Call to Action/001 01 AWS Security Next Steps & Call to Action_fr.vtt 6.9 kB
~Get Your Files Here !/01 - Introduction to Cloud Security/004 03 AWS Security solution Detective Control_fr.vtt 6.8 kB
~Get Your Files Here !/05 - AWS Security Next Steps & Call to Action/001 01 AWS Security Next Steps & Call to Action_de.vtt 6.8 kB
~Get Your Files Here !/05 - AWS Security Next Steps & Call to Action/001 01 AWS Security Next Steps & Call to Action_id.vtt 6.7 kB
~Get Your Files Here !/01 - Introduction to Cloud Security/004 03 AWS Security solution Detective Control_de.vtt 6.7 kB
~Get Your Files Here !/05 - AWS Security Next Steps & Call to Action/001 01 AWS Security Next Steps & Call to Action_pt.vtt 6.7 kB
~Get Your Files Here !/04 - AWS Security Anit-Patterns/001 01 Security Anit-Patterns_fr.vtt 6.7 kB
~Get Your Files Here !/05 - AWS Security Next Steps & Call to Action/001 01 AWS Security Next Steps & Call to Action_es.vtt 6.6 kB
~Get Your Files Here !/05 - AWS Security Next Steps & Call to Action/001 01 AWS Security Next Steps & Call to Action_it.vtt 6.6 kB
~Get Your Files Here !/04 - AWS Security Anit-Patterns/001 01 Security Anit-Patterns_de.vtt 6.6 kB
~Get Your Files Here !/01 - Introduction to Cloud Security/004 03 AWS Security solution Detective Control_pt.vtt 6.5 kB
~Get Your Files Here !/01 - Introduction to Cloud Security/004 03 AWS Security solution Detective Control_id.vtt 6.4 kB
~Get Your Files Here !/01 - Introduction to Cloud Security/004 03 AWS Security solution Detective Control_es.vtt 6.4 kB
~Get Your Files Here !/01 - Introduction to Cloud Security/006 05 AWS Security solution Data Protection_fr.vtt 6.4 kB
~Get Your Files Here !/04 - AWS Security Anit-Patterns/001 01 Security Anit-Patterns_id.vtt 6.4 kB
~Get Your Files Here !/04 - AWS Security Anit-Patterns/001 01 Security Anit-Patterns_pt.vtt 6.3 kB
~Get Your Files Here !/01 - Introduction to Cloud Security/004 03 AWS Security solution Detective Control_it.vtt 6.3 kB
~Get Your Files Here !/01 - Introduction to Cloud Security/006 05 AWS Security solution Data Protection_de.vtt 6.3 kB
~Get Your Files Here !/04 - AWS Security Anit-Patterns/001 01 Security Anit-Patterns_es.vtt 6.2 kB
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/003 02 Security Automation Scenario02 S3 Weak Bucket Policy_de.vtt 6.2 kB
~Get Your Files Here !/04 - AWS Security Anit-Patterns/001 01 Security Anit-Patterns_it.vtt 6.2 kB
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/003 02 Security Automation Scenario02 S3 Weak Bucket Policy_fr.vtt 6.2 kB
~Get Your Files Here !/01 - Introduction to Cloud Security/006 05 AWS Security solution Data Protection_pt.vtt 6.1 kB
~Get Your Files Here !/01 - Introduction to Cloud Security/006 05 AWS Security solution Data Protection_id.vtt 6.0 kB
~Get Your Files Here !/01 - Introduction to Cloud Security/006 05 AWS Security solution Data Protection_es.vtt 6.0 kB
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/003 02 Security Automation Scenario02 S3 Weak Bucket Policy_id.vtt 6.0 kB
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/003 02 Security Automation Scenario02 S3 Weak Bucket Policy_pt.vtt 5.9 kB
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/003 02 Security Automation Scenario02 S3 Weak Bucket Policy_es.vtt 5.9 kB
~Get Your Files Here !/01 - Introduction to Cloud Security/006 05 AWS Security solution Data Protection_it.vtt 5.9 kB
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/003 02 Security Automation Scenario02 S3 Weak Bucket Policy_it.vtt 5.8 kB
~Get Your Files Here !/02 - Security by Design Principles/009 08 Security Incident Response At a glance_fr.vtt 5.6 kB
~Get Your Files Here !/01 - Introduction to Cloud Security/007 06 AWS Security solution Incident Response_fr.vtt 5.5 kB
~Get Your Files Here !/02 - Security by Design Principles/009 08 Security Incident Response At a glance_de.vtt 5.4 kB
~Get Your Files Here !/02 - Security by Design Principles/009 08 Security Incident Response At a glance_es.vtt 5.3 kB
~Get Your Files Here !/01 - Introduction to Cloud Security/007 06 AWS Security solution Incident Response_de.vtt 5.3 kB
~Get Your Files Here !/02 - Security by Design Principles/009 08 Security Incident Response At a glance_pt.vtt 5.3 kB
~Get Your Files Here !/02 - Security by Design Principles/009 08 Security Incident Response At a glance_id.vtt 5.3 kB
~Get Your Files Here !/01 - Introduction to Cloud Security/007 06 AWS Security solution Incident Response_es.vtt 5.2 kB
~Get Your Files Here !/01 - Introduction to Cloud Security/007 06 AWS Security solution Incident Response_pt.vtt 5.2 kB
~Get Your Files Here !/02 - Security by Design Principles/009 08 Security Incident Response At a glance_it.vtt 5.1 kB
~Get Your Files Here !/01 - Introduction to Cloud Security/007 06 AWS Security solution Incident Response_id.vtt 5.1 kB
~Get Your Files Here !/01 - Introduction to Cloud Security/007 06 AWS Security solution Incident Response_it.vtt 5.0 kB
~Get Your Files Here !/02 - Security by Design Principles/008 07 SbD Prepare for Security Events_de.vtt 5.0 kB
~Get Your Files Here !/02 - Security by Design Principles/008 07 SbD Prepare for Security Events_fr.vtt 5.0 kB
~Get Your Files Here !/02 - Security by Design Principles/008 07 SbD Prepare for Security Events_id.vtt 4.8 kB
~Get Your Files Here !/02 - Security by Design Principles/008 07 SbD Prepare for Security Events_pt.vtt 4.8 kB
~Get Your Files Here !/02 - Security by Design Principles/008 07 SbD Prepare for Security Events_it.vtt 4.7 kB
~Get Your Files Here !/02 - Security by Design Principles/008 07 SbD Prepare for Security Events_es.vtt 4.7 kB
~Get Your Files Here !/01 - Introduction to Cloud Security/003 02 AWS Security solution Identity_fr.vtt 4.5 kB
~Get Your Files Here !/01 - Introduction to Cloud Security/003 02 AWS Security solution Identity_de.vtt 4.4 kB
~Get Your Files Here !/01 - Introduction to Cloud Security/001 00 Why Cloud Security_fr.vtt 4.4 kB
~Get Your Files Here !/01 - Introduction to Cloud Security/003 02 AWS Security solution Identity_es.vtt 4.3 kB
~Get Your Files Here !/01 - Introduction to Cloud Security/003 02 AWS Security solution Identity_pt.vtt 4.3 kB
~Get Your Files Here !/01 - Introduction to Cloud Security/003 02 AWS Security solution Identity_id.vtt 4.3 kB
~Get Your Files Here !/01 - Introduction to Cloud Security/003 02 AWS Security solution Identity_it.vtt 4.2 kB
~Get Your Files Here !/01 - Introduction to Cloud Security/001 00 Why Cloud Security_de.vtt 4.2 kB
~Get Your Files Here !/01 - Introduction to Cloud Security/001 00 Why Cloud Security_pt.vtt 4.1 kB
~Get Your Files Here !/01 - Introduction to Cloud Security/001 00 Why Cloud Security_id.vtt 4.0 kB
~Get Your Files Here !/01 - Introduction to Cloud Security/001 00 Why Cloud Security_it.vtt 4.0 kB
~Get Your Files Here !/01 - Introduction to Cloud Security/001 00 Why Cloud Security_es.vtt 4.0 kB
~Get Your Files Here !/02 - Security by Design Principles/002 01 SbD Implement a Segregated Account Environment_fr.vtt 3.1 kB
~Get Your Files Here !/02 - Security by Design Principles/002 01 SbD Implement a Segregated Account Environment_de.vtt 2.9 kB
~Get Your Files Here !/02 - Security by Design Principles/002 01 SbD Implement a Segregated Account Environment_id.vtt 2.9 kB
~Get Your Files Here !/02 - Security by Design Principles/002 01 SbD Implement a Segregated Account Environment_pt.vtt 2.9 kB
~Get Your Files Here !/02 - Security by Design Principles/002 01 SbD Implement a Segregated Account Environment_it.vtt 2.8 kB
~Get Your Files Here !/02 - Security by Design Principles/002 01 SbD Implement a Segregated Account Environment_es.vtt 2.8 kB
~Get Your Files Here !/01 - Introduction to Cloud Security/008 07 AWS Security solution Well Architected Framework Security - Pillar_fr.vtt 2.4 kB
~Get Your Files Here !/01 - Introduction to Cloud Security/008 07 AWS Security solution Well Architected Framework Security - Pillar_id.vtt 2.3 kB
~Get Your Files Here !/01 - Introduction to Cloud Security/008 07 AWS Security solution Well Architected Framework Security - Pillar_de.vtt 2.3 kB
~Get Your Files Here !/01 - Introduction to Cloud Security/008 07 AWS Security solution Well Architected Framework Security - Pillar_pt.vtt 2.3 kB
~Get Your Files Here !/01 - Introduction to Cloud Security/008 07 AWS Security solution Well Architected Framework Security - Pillar_es.vtt 2.3 kB
~Get Your Files Here !/01 - Introduction to Cloud Security/008 07 AWS Security solution Well Architected Framework Security - Pillar_it.vtt 2.3 kB
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/004 03 Security Automation Scenario03 Un-Authorized EC2 login_fr.vtt 2.2 kB
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/004 03 Security Automation Scenario03 Un-Authorized EC2 login_pt.vtt 2.2 kB
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/004 03 Security Automation Scenario03 Un-Authorized EC2 login_de.vtt 2.2 kB
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/004 03 Security Automation Scenario03 Un-Authorized EC2 login_id.vtt 2.1 kB
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/004 03 Security Automation Scenario03 Un-Authorized EC2 login_es.vtt 2.1 kB
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/004 03 Security Automation Scenario03 Un-Authorized EC2 login_it.vtt 2.1 kB
~Get Your Files Here !/02 - Security by Design Principles/001 00 Introduction Security by Design Principles_fr.vtt 2.1 kB
~Get Your Files Here !/02 - Security by Design Principles/001 00 Introduction Security by Design Principles_de.vtt 2.1 kB
~Get Your Files Here !/02 - Security by Design Principles/001 00 Introduction Security by Design Principles_id.vtt 2.1 kB
~Get Your Files Here !/02 - Security by Design Principles/001 00 Introduction Security by Design Principles_pt.vtt 2.0 kB
~Get Your Files Here !/02 - Security by Design Principles/001 00 Introduction Security by Design Principles_es.vtt 2.0 kB
~Get Your Files Here !/02 - Security by Design Principles/001 00 Introduction Security by Design Principles_it.vtt 2.0 kB
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/006 05 Security Automation Scenario05 GuardDuty Finding_fr.vtt 1.3 kB
~Get Your Files Here !/01 - Introduction to Cloud Security/external-assets-links.txt 1.3 kB
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/006 05 Security Automation Scenario05 GuardDuty Finding_de.vtt 1.2 kB
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/006 05 Security Automation Scenario05 GuardDuty Finding_it.vtt 1.2 kB
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/006 05 Security Automation Scenario05 GuardDuty Finding_pt.vtt 1.2 kB
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/006 05 Security Automation Scenario05 GuardDuty Finding_es.vtt 1.2 kB
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/006 05 Security Automation Scenario05 GuardDuty Finding_id.vtt 1.1 kB
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/005 04 Security Automation Scenario04 Firewall Rule Disabled_fr.vtt 1.1 kB
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/005 04 Security Automation Scenario04 Firewall Rule Disabled_de.vtt 1.1 kB
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/005 04 Security Automation Scenario04 Firewall Rule Disabled_it.vtt 1.0 kB
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/005 04 Security Automation Scenario04 Firewall Rule Disabled_id.vtt 1.0 kB
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/005 04 Security Automation Scenario04 Firewall Rule Disabled_pt.vtt 1.0 kB
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/005 04 Security Automation Scenario04 Firewall Rule Disabled_es.vtt 989 Bytes
~Get Your Files Here !/02 - Security by Design Principles/external-assets-links.txt 878 Bytes
~Get Your Files Here !/01 - Introduction to Cloud Security/002 01 Introduction to AWS Security Services_fr.vtt 533 Bytes
~Get Your Files Here !/01 - Introduction to Cloud Security/002 01 Introduction to AWS Security Services_pt.vtt 510 Bytes
~Get Your Files Here !/01 - Introduction to Cloud Security/002 01 Introduction to AWS Security Services_es.vtt 498 Bytes
~Get Your Files Here !/01 - Introduction to Cloud Security/002 01 Introduction to AWS Security Services_it.vtt 489 Bytes
~Get Your Files Here !/01 - Introduction to Cloud Security/002 01 Introduction to AWS Security Services_de.vtt 480 Bytes
~Get Your Files Here !/01 - Introduction to Cloud Security/002 01 Introduction to AWS Security Services_id.vtt 472 Bytes
~Get Your Files Here !/Bonus Resources.txt 386 Bytes
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/001 00 Security Automation Moving from Reactive to Proactive_fr.vtt 307 Bytes
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/001 00 Security Automation Moving from Reactive to Proactive_de.vtt 299 Bytes
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/001 00 Security Automation Moving from Reactive to Proactive_es.vtt 299 Bytes
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/001 00 Security Automation Moving from Reactive to Proactive_id.vtt 299 Bytes
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/001 00 Security Automation Moving from Reactive to Proactive_it.vtt 275 Bytes
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/001 00 Security Automation Moving from Reactive to Proactive_pt.vtt 257 Bytes
Get Bonus Downloads Here.url 182 Bytes
~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/external-assets-links.txt 120 Bytes