AWS Security Best Practices for Developers
Offered By: LinkedIn Learning
Course Description
Overview
Create stronger, more secure applications for AWS deployment. Learn security best practices for Identity and Access Management, S3 storage, Key Management Service (KMS), and more.
Syllabus
Introduction
- Securing your application
- What you should know
- Important concepts
- Uses and access keys
- Roles and policies
- IAM key points
- Challenge: IAM roles and policies
- Solution: IAM roles and policies
- S3 as a static website
- Bucket policies
- S3 bucket encryption
- S3 object versioning and MFA delete
- S3 key points
- Challenge: S3 presigned URL challenge
- Solution: S3 presigned URL challenge
- Key Management Service (KMS) introduction
- Using AWS KMS
- KMS key points
- Challenge: Key Management Service
- Solution: Key Management Service
- Cognito concepts
- Workflow
- Cognito demonstration
- Cognito key points
- Challenge: Cognito automated login
- Solution: Cognito automated login
- Creating and managing certificates
- Using certificates with AWS Resources
- AWS Certificates Manager and EC2 instances
- Parameter Store for sensitive data
- Using Parameter Store from EC2
- Secrets Manager overview
- Root login alerts
- Detecting unauthorized instance stops
- Checking for unused credentials
- Get familiar with AWS tools
Taught by
Carlos Rivas
Related Courses
Communicating Data Science ResultsUniversity of Washington via Coursera Cloud Computing Applications, Part 2: Big Data and Applications in the Cloud
University of Illinois at Urbana-Champaign via Coursera Cloud Computing Infrastructure
University System of Maryland via edX Google Cloud Platform for AWS Professionals
Google via Coursera Introduction to Apache Spark and AWS
University of London International Programmes via Coursera