001 AWS KMS concepts.html
001 AWS Key Management Service (KMS) Fundamentals
001 Condition keys for AWS KMS.html
001 Deleting AWS KMS keys.html
001 Grants in AWS KMS.html
001 Key policies in AWS KMS.html
001 Managing keys.html
001 Rotating AWS KMS keys.html
001 Special-purpose keys.html
001 Using IAM policies with AWS KMS.html
002 Data keys.txt
002 Data key pairs.txt
002 Envelope encryption.txt
002 Implementing Envelope Encryption with AWS KMS
003 Demo Generating Data Keys for Envelope Encryption
004 Custom key stores.html
004 Demo Multi-Region Keys Imports and Deletion with AWS KMS
004 Importing key material in AWS KMS keys.html
004 Key material origin.txt
006 AWS CloudHSM Client SDKs.html
006 AWS CloudHSM command line tools.html
006 AWS CloudHSM use cases.html
006 Best practices for AWS CloudHSM.html
006 Creating More Secure Keys with AWS CloudHSM
006 Integrating third-party applications with AWS CloudHSM.html
007 Blocking Malicious Traffic with AWS WAF and AWS Firewall Manager
007 Customized web requests and responses in AWS WAF.html
007 Getting started with AWS Firewall Manager policies.html
007 How AWS WAF works with Amazon CloudFront features.html
007 IP sets and regex pattern sets.html
007 Rules.html
007 Rule groups.html
007 Web access control lists (web ACLs).html
007 Working with AWS Firewall Manager policies.html
008 Demo Implementing AWS WAF on Application Load Balancers
009 AWS Network Firewall example architectures with routing.html
009 Firewalls in AWS Network Firewall.html
009 Firewall behavior in AWS Network Firewall.html
009 Firewall policies in AWS Network Firewall.html
009 Intrusion Detection and Prevention via AWS Network Firewall
009 Rule groups in AWS Network Firewall.html
010 Locking Down CloudFront Distributions Integrated with Amazon S3
010 Using an Amazon S3 bucket.txt
010 Using custom URLs by adding alternate domain names (CNAMEs).html
012 Customizing at the edge with CloudFront Functions.html
012 Customizing at the edge with LambdaEdge.html
012 Restrictions on edge functions.html
012 Securing HTTP Calls with LambdaEdge
013 AWS Shield Advanced capabilities and options.html
013 AWS Shield Advanced overview.html
013 AWS Shield Advanced protected resources.html
013 AWS Shield Standard overview.html
013 Deciding whether to subscribe to AWS Shield Advanced and apply additional protections.html
013 Examples of basic DDoS resilient architectures.html
013 Preventing DDoS Attacks with AWS Shield
013 Responding to DDoS events.html
014 Auditing Compromised Resources with AWS Security Hub
015 Demo Exploring Security Scores in AWS Security Hub
016 AWS Client VPN.txt
016 AWS Site-to-Site VPN.html
016 AWS VPN CloudHub.html
016 Connect your VPC to remote networks using AWS Virtual Private Network.html
016 Network Security via VPNs
016 Third party software VPN appliance.txt
017 Configure Route Tables.html
017 Customizing VPCs Routing and Security Controls - Part 1
017 DHCP option sets in Amazon VPC.html
017 Middlebox routing.html
017 Subnets for your VPC.html
017 Work with AWS-managed prefix lists.html
017 Work with customer-managed prefix lists.html
018 Customizing VPCs Routing and Security Controls - Part 2
019 Compare NAT gateways and NAT instances.html
019 Connect VPCs using VPC peering.html
019 Connect to the internet using an internet gateway.html
019 Outbound IPv6 traffic using an egress-only internet gateway.html
019 Securely Connecting to VPCs
019 VPC peering limitations.txt
020 Private Service Connections via VPC Endpoints
020 VPC Endpoint Services.html
022 Section Summary
1679069603036-resources.zip