Cloud Security Masterclass
Just-In-Time (JIT) Access in GCP: Hands-on Demo
12:10
Cloud Security Masterclass
AWS RCPs Explained– Stop What SCPs Can’t
14:20
Cloud Security Masterclass
Using AI and RAG to generate “custom” Cloud Security Requirements
34:04
Cloud Security Masterclass
Cloud Security with AI: Natural Language Analysis of AWS IAM
16:02
Cloud Security Masterclass
GCP IAM Policy Inheritance – A Security Risk You Must Know!
11:42
Cloud Security Masterclass
Why GCP’s Basic Roles are Dangerous (And What to Use instead!)
9:01
Cloud Security Masterclass
Understanding Prompt Injection: Hands-On Demo with AWS & LLM
22:48
Cloud Security Masterclass
Hashing, Digital Signatures & how they secure AWS CloudTrail Logs
16:39
Cloud Security Masterclass
AWS CloudTrail Lake Explained (With Demo!)
14:24
Cloud Security Masterclass
AWS Security Labs | CloudTrail for auditing Data events
16:25
Cloud Security Masterclass
Mastering AWS KMS Grants #shorts #awssecurity #cybersecurity #cloudsecurity #keymanagement
1:00
Cloud Security Masterclass
AWS Security Labs | Mastering KMS Grants
24:47
Cloud Security Masterclass
AWS Security Labs | Web Application Firewall (WAF) | Preventing SSRF attack
18:34
Cloud Security Masterclass
AWS Security Labs | SSRF Exploitation Demo on AWS
13:42
Cloud Security Masterclass
AWS Security Labs | Interface VPC Endpoints | Privately Connect Lambda with RDS database
31:05
Cloud Security Masterclass
AWS Security Labs | Gateway VPC Endpoints | Privately connect EC2 and S3 bucket
19:51
Cloud Security Masterclass
AWS Security Labs | AWS VPC Flow Logs
26:07
Cloud Security Masterclass
AWS Security Labs | AWS Firewall Manager for auditing Security Groups
18:03
Cloud Security Masterclass
AWS Security Labs | VPC Connectivity to Internet using an Internet Gateway
18:11
Cloud Security Masterclass
AWS Security Labs | Detect AWS Root user activity
15:17
Cloud Security Masterclass
AWS IAM Session Policy: What You NEED To Know
11:29
Cloud Security Masterclass
Mastering AWS IAM: The Ultimate Guide to Service Control Policies
11:56
Cloud Security Masterclass
AWS Security: Mastering AWS Organizations
13:42
Cloud Security Masterclass
AWS IAM Permissions Boundaries Explained (and why you need them)
16:41
Cloud Security Masterclass
AWS Security - IAM | Policy Evaluation for AWS IAM and Resource Policy
19:13
Cloud Security Masterclass
AWS Resource Policies - What You NEED To Know
9:55
Cloud Security Masterclass
AWS IAM Policies: The Key to Bulletproof AWS Security
13:37
Cloud Security Masterclass
AWS Security - IAM | AWS Roles
10:49
Cloud Security Masterclass
AWS Security - IAM | AWS Users
12:11