EMR File System Client-side Encryption Using AWS KMS-managed Keys Reviews
1597 reviews
Simon S. · Reviewed כמעט 8 שנים ago
Some items may need to be updated.
Jodie S. · Reviewed כמעט 8 שנים ago
Oliver-Tobias R. · Reviewed כמעט 8 שנים ago
Jerome M. · Reviewed כמעט 8 שנים ago
Sugavaneswaran S. · Reviewed כמעט 8 שנים ago
Jason B. · Reviewed כמעט 8 שנים ago
Jason B. · Reviewed כמעט 8 שנים ago
Ben H. · Reviewed כמעט 8 שנים ago
Ben H. · Reviewed כמעט 8 שנים ago
Ben H. · Reviewed כמעט 8 שנים ago
This was one of the best!
Charles L. · Reviewed כמעט 8 שנים ago
as interesting as these are, it would be beneficial to explain what some of the terminal commands are. Additionally, because I have paid for credits to take this lab, it's fairly obnoxious that after the time is up I have to pay AGAIN for the lab if I wish to review. Furthermore the fact that the lab environment does not preload BEFORE I hit Start Lab and this further cuts into the precious lab time I PAID for I feel that the cost of these exercises is not worth it. It lacks depth in explanation to help better grasp and absorb the content for true understanding, as well as being absurdly costly for a one time event. I will not be recommending QuikLab courses to anyone.
Pierce C. · Reviewed כמעט 8 שנים ago
Luigi D. · Reviewed כמעט 8 שנים ago
Andreas C. · Reviewed כמעט 8 שנים ago
Endo N. · Reviewed כמעט 8 שנים ago
Kashyap D. · Reviewed כמעט 8 שנים ago
While this was an interesting LAB for creating a Hadoop Cluster, unsure how this taught me more skills with regards to AWS Security. Yes, it established that there's a KMS that can be used, but didn't really explore the more generic usages of this system.
Clive H. · Reviewed כמעט 8 שנים ago
While this was an interesting LAB for creating a Hadoop Cluster, unsure how this taught me more skills with regards to AWS Security. Yes, it established that there's a KMS that can be used, but didn't really explore the more generic usages of this system.
Clive H. · Reviewed כמעט 8 שנים ago
While this was an interesting LAB for creating a Hadoop Cluster, unsure how this taught me more skills with regards to AWS Security. Yes, it established that there's a KMS that can be used, but didn't really explore the more generic usages of this system.
Clive H. · Reviewed כמעט 8 שנים ago
2
UGUR A. · Reviewed כמעט 8 שנים ago
had an permissions error with IAM role requirements
George S. · Reviewed כמעט 8 שנים ago
Gary A. · Reviewed כמעט 8 שנים ago
Carl H. · Reviewed כמעט 8 שנים ago
Nicolas H. · Reviewed כמעט 8 שנים ago
Andrew G. · Reviewed כמעט 8 שנים ago
We do not ensure the published reviews originate from consumers who have purchased or used the products. Reviews are not verified by Google.