AWS Security Best Practices for Developers
Offered By: LinkedIn Learning
Course Description
Overview
Create stronger, more secure applications for AWS deployment. Learn security best practices for Identity and Access Management, S3 storage, Key Management Service (KMS), and more.
Syllabus
Introduction
- Securing your application
- What you should know
- Important concepts
- Uses and access keys
- Roles and policies
- IAM key points
- Challenge: IAM roles and policies
- Solution: IAM roles and policies
- S3 as a static website
- Bucket policies
- S3 bucket encryption
- S3 object versioning and MFA delete
- S3 key points
- Challenge: S3 presigned URL challenge
- Solution: S3 presigned URL challenge
- Key Management Service (KMS) introduction
- Using AWS KMS
- KMS key points
- Challenge: Key Management Service
- Solution: Key Management Service
- Cognito concepts
- Workflow
- Cognito demonstration
- Cognito key points
- Challenge: Cognito automated login
- Solution: Cognito automated login
- Creating and managing certificates
- Using certificates with AWS Resources
- AWS Certificates Manager and EC2 instances
- Parameter Store for sensitive data
- Using Parameter Store from EC2
- Secrets Manager overview
- Root login alerts
- Detecting unauthorized instance stops
- Checking for unused credentials
- Get familiar with AWS tools
Taught by
Carlos Rivas
Related Courses
AWS Security FundamentalsAmazon via Independent AWS Security and Governance Administration for Professionals
Udemy Designing for Advanced Security within AWS
Pluralsight AWS Developer: Deployment and Security
Pluralsight Securing AWS Networks
Pluralsight