Skip to content
Learn The Content
Learn The Content
Home
About Us
Login
Register
Profile
Home
Profile
Leni Bartmann
This user account status is Approved
About
About
Posts
Posts
Comments
Comments
Really useful for AWS Security certification aspirants.
On
Analyzing architectures to identify monitoring requirements and sources of data for security monitoring
Does AWS offer any specific tools for integrity-checking?
On
Integrity-checking techniques (for example, hashing algorithms, digital signatures)
For those who have passed the AWS Certified Security exam, did you find many questions on Parameter Store?
On
Systems Manager Parameter Store
Need advice: Is it better to start with canary deployment for a mid-scale application?
On
Deployment strategies (for example, canary, blue/green, rolling)
I found the section on principal policies a bit lacking. Could use more examples.
On
Resource-based policies, service policies, and principal policies
What happens if I lose access to my root account's MFA device?
On
Establishing identity through an authentication system, based on requirements
Really helpful post!
On
Application migration tools (for example, AWS Application Discovery Service, AWS Application Migration Service)
Super helpful guide. Cleared a lot of my doubts!
On
Designing S3 Lifecycle mechanisms to retain data for required retention periods (for example, S3 Object Lock, S3 Glacier Vault Lock, S3 Lifecycle policy)
Thanks for clarifying the importance of data augmentation in model performance!
On
Format, normalize, augment, and scale data.
Found a typo in the third paragraph. Otherwise, good info.
On
Appropriate logs and metrics to assess network performance and reachability issues (for example, packet loss)
load more comments
Search for: