This is an introductory course on how to isolate your AWS instances with elastic network interfaces. In this course, we discuss an approach to managing the forensics of your system in AWS. We also review how you can manage the isolation of your compromised instances for security and forensics purposes by using network interfaces in conjunction with security groups and permissions.
Rédigez votre propre commentaire
Only registered users can write reviews. Please Sign in or create an account