YoVDO

AWS for Architects: Advanced Security

Offered By: LinkedIn Learning

Tags

Amazon Web Services (AWS) Courses User Authentication Courses Encryption Courses Data Protection Courses Application Security Courses Cloud Security Courses Identity and Access Management Courses

Course Description

Overview

Learn how to use AWS advanced security services, techniques, and tools to secure cloud-based architecture.

Syllabus

Introduction
  • Welcome
  • What you should know
  • About using cloud services
1. Implement Core Security Tasks
  • AWS Shared Security Responsibility Model overview
  • Well-architected five security principles
  • Core AWS account tools
  • Core AWS IAM objects
  • AWS organizations and root account
  • Object tagging
  • Billing management
  • CloudWatch logs and alerts
  • CloudTrail analysis with Athena
  • Trusted Advisor security alerts
2. Implement Identity and Access Management
  • IAM users and groups
  • IAM policies
  • IAM roles
  • Design user authentication
  • User authentication using AWS Simple AD
  • Secure authentication with Cognito
  • Secure user authentication using AD Federation
3. Implement Infrastructure Protection
  • Infrastructure and threat models
  • VPC and security groups
  • VPC Flow Logs and GuardDuty
  • Certificate Manager and WAF to secure load balancers
  • Inspector to monitor EC2 configurations
  • Config for locking service deployment
  • Service Catalog for AMI deployment
  • Systems Manager for OS management
4. Implement Data Protection
  • Data classification and protection
  • Use Macie to locate sensitive data
  • Encryption on AWS
  • AWS IAM Key Management Service
  • Data protection at rest in S3
  • Encrypt data in transit and VPC endpoints
  • Data backup, replication, and recovery
5. Implement Application Security
  • Application security concerns
  • Secure a serverless website
  • Secure a dynamic website
  • Secure an internal business application
  • Secure a big data pipeline
  • Secure an IoT and machine learning application
  • Prepare for a security audit
Conclusion
  • Next steps

Taught by

Lynn Langit

Related Courses

Architecting Microsoft Azure Solutions
Microsoft via edX
Internetwork Security
Indian Institute of Technology, Kharagpur via Swayam
Network Security
Georgia Institute of Technology via Udacity
Microsoft Professional Orientation : Cloud Administration
Microsoft via edX
Cyber Threats and Attack Vectors
University of Colorado System via Coursera