AWS Security Best Practices: Network Infrastructure
Offered By: Amazon Web Services via AWS Skill Builder
Course Description
Overview
Course description
This course focuses on understanding and implementing Amazon Web Services (AWS) security best practices regarding network infrastructure with a deep dive into securing network infrastructure.
- Course level: Intermediate
- Duration: 1.5 hours
Activities
This course includes text, interactive activities, and knowledge checks.
Course objectives
In this course, you will learn to:
- Design a secure network using network segmentation and security best practices
- Select the appropriate AWS services to secure network architecture
Intended audience
This course is intended for:
- Individuals responsible for professional services implementation and delivery at APN consulting partner organizations
- Security Architects, Security Engineers, and Systems Operators
- IT consultants designing, architecting, and maintaining applications and solutions to run securely in the AWS cloud
Prerequisites
Before attending this course, participants should have completed the following:
- AWS Security Fundamentals
- AWS Security Essentials
- AWS Certified Solutions Architect – Associate certification or a strong background in information security concepts, techniques, and paradigms in the areas of networking, operating systems, data encryption, and operational controls
Course outline
Module 1: Designing the Network
- Introduction to Designing the Network
- Flexible and Secure
- Connectivity Overview
- DNS Operations and Security
Module 2: Securing the Network
- Introduction to Securing the Network
- Defense in Depth Review
- AWS Network Security Mechanisms
- AWS Security Services
- Third-Party Security Solutions
Tags
Related Courses
Architecting Microsoft Azure SolutionsMicrosoft via edX Internetwork Security
Indian Institute of Technology, Kharagpur via Swayam Network Security
Georgia Institute of Technology via Udacity Microsoft Professional Orientation : Cloud Administration
Microsoft via edX Cyber Threats and Attack Vectors
University of Colorado System via Coursera