YoVDO

AWS Security Best Practices: Network Infrastructure

Offered By: Amazon Web Services via AWS Skill Builder

Tags

Amazon Web Services (AWS) Courses Network Infrastructure Courses Cloud Security Courses Network Segmentation Courses

Course Description

Overview

Course description

This course focuses on understanding and implementing Amazon Web Services (AWS) security best practices regarding network infrastructure with a deep dive into securing network infrastructure.

  • Course level: Intermediate
  • Duration: 1.5 hours

Activities

This course includes text, interactive activities, and knowledge checks.

Course objectives

In this course, you will learn to:

  • Design a secure network using network segmentation and security best practices
  • Select the appropriate AWS services to secure network architecture

Intended audience

This course is intended for:

  • Individuals responsible for professional services implementation and delivery at APN consulting partner organizations
  • Security Architects, Security Engineers, and Systems Operators
  • IT consultants designing, architecting, and maintaining applications and solutions to run securely in the AWS cloud

Prerequisites

Before attending this course, participants should have completed the following:

  • AWS Security Fundamentals
  • AWS Security Essentials
  • AWS Certified Solutions Architect – Associate certification or a strong background in information security concepts, techniques, and paradigms in the areas of networking, operating systems, data encryption, and operational controls

Course outline

Module 1: Designing the Network

  • Introduction to Designing the Network
  • Flexible and Secure
  • Connectivity Overview
  • DNS Operations and Security

Module 2: Securing the Network

  • Introduction to Securing the Network
  • Defense in Depth Review
  • AWS Network Security Mechanisms
  • AWS Security Services
  • Third-Party Security Solutions

Tags

Related Courses

Get Started with Network Security
Salesforce via Trailhead
Inside the Breach
LinkedIn Learning
Defense Evasion with ProxyChains
Pluralsight
IoT Device Security: Executive Briefing
Pluralsight
Lateral Movement with Infection Monkey
Pluralsight