AWS Security Best Practices for Developers
Offered By: LinkedIn Learning
Course Description
Overview
Create stronger, more secure applications for AWS deployment. Learn security best practices for Identity and Access Management, S3 storage, Key Management Service (KMS), and more.
Syllabus
Introduction
- Securing your application
- What you should know
- Important concepts
- Uses and access keys
- Roles and policies
- IAM key points
- Challenge: IAM roles and policies
- Solution: IAM roles and policies
- S3 as a static website
- Bucket policies
- S3 bucket encryption
- S3 object versioning and MFA delete
- S3 key points
- Challenge: S3 presigned URL challenge
- Solution: S3 presigned URL challenge
- Key Management Service (KMS) introduction
- Using AWS KMS
- KMS key points
- Challenge: Key Management Service
- Solution: Key Management Service
- Cognito concepts
- Workflow
- Cognito demonstration
- Cognito key points
- Challenge: Cognito automated login
- Solution: Cognito automated login
- Creating and managing certificates
- Using certificates with AWS Resources
- AWS Certificates Manager and EC2 instances
- Parameter Store for sensitive data
- Using Parameter Store from EC2
- Secrets Manager overview
- Root login alerts
- Detecting unauthorized instance stops
- Checking for unused credentials
- Get familiar with AWS tools
Taught by
Carlos Rivas
Related Courses
Getting Started with Amazon Simple Storage Service (S3)Amazon via Independent Deep Dive into Amazon Simple Storage Service (Amazon S3)
Amazon via Independent AWS Developer Series
Amazon via edX Crear y gestionar archivos con AWS S3
Coursera Project Network via Coursera Building Data Lakes on AWS
Amazon Web Services via Coursera