Example Image with Text
Use this Image with Text block to balance out your text content with a complementary visual to strengthen messaging and help your students connect with your product, course, or coaching. You can introduce yourself with a profile picture and author bio, showcase a student testimonial with their smiling face, or highlight an experience with a screenshot.
Example Text
Use this Text block to tell your course or coaching’s story.
Write anything from one-liners to detailed paragraphs that tell your visitors more about what you’re selling.
This block - along with other blocks that contain text content - supports various text formatting such as header sizes, font styles, alignment, ordered and unordered lists, hyperlinks and colors.
Example Title
Use this block to showcase testimonials, features, categories, or more. Each column has its own individual text field. You can also leave the text blank to have it display nothing and just showcase an image.
Example Title
Use this block to showcase testimonials, features, categories, or more. Each column has its own individual text field. You can also leave the text blank to have it display nothing and just showcase an image.
Example Title
Use this block to showcase testimonials, features, categories, or more. Each column has its own individual text field. You can also leave the text blank to have it display nothing and just showcase an image.
Example Curriculum
- 01.Securing Core Infrastructure Services (3:56)
- 02.Identity and Access Management (5:03)
- 03.Defining Security Controls (5:03)
- 04.Controlling Root Account Security (6:02)
- 05.Managing Multiple Accounts (8:47)
- 06.IAM Users and Security Controls (4:17)
- 07.Defining IAM Policy for the User (6:15)
- 08.Controlling Access to Resources (4:36)
- 09.Access Keys and Passwords (4:46)
- 10.Security Tools (4:43)
- 11.IAM Groups (1:32)
- 12.IAM Policies - The Basics (7:35)
- 13.IAM Policy Types (9:21)
- 14.Delegation and Federation (6:57)
- 15.Best Practices for Planning Access Control (5:07)
- 01.Securing Core Infrastructure (3:29)
- 02.Securing EC2 Infrastructure (8:39)
- 03.Amazon Machine Instances (4:41)
- 04.AMI Storage Choices and Key Pairs (2:36)
- 05.EC2 Security Options (5:14)
- 06.Interfaces and Addresses (7:08)
- 07.Network Interfaces and Addresses (4:03)
- 08.Dedicated Instances and Hosts (6:56)
- 09.Securing EBS Volumes (3:50)
- 10.EBS Volume and Snapshot Security (7:35)
- 11.VPC Architecture (8:26)
- 12.VPC Setup Options (3:32)
- 13.VPC Security - Part A (7:44)
- 14.VPC Security and Connectivity - Part B (7:38)
- 15.VPC Security Considerations (5:47)
- 16.Best Practices (7:37)
- 01.Securing Access to Edge Locations (2:49)
- 02.Elastic Load Balancing (3:08)
- 03._Classic_ Load Balancer (5:32)
- 04.Elastic Load Balancer Operation (4:46)
- 05.Classic ELB Security Features (2:08)
- 06.Application Load Balancer (7:34)
- 07.Elastic Load Balancer Setup (6:54)
- 08.Route 53 (6:44)
- 09.AWS Web Application Firewall (5:04)
- 10.Configuring the Web Application Firewall (3:41)
- 11.Best Practices for Securing Access (5:49)
Example Image with Text
Use this Image with Text block to balance out your text content with a complementary visual to strengthen messaging and help your students connect with your product, course, or coaching. You can introduce yourself with a profile picture and author bio, showcase a student testimonial with their smiling face, or highlight an experience with a screenshot.
Example Featured Products
Showcase other available courses, bundles, and coaching products you’re selling with the Featured Products block to provide alternatives to visitors who may not be interested in this specific product.