AWS Security Best Practices for Developers
Offered By: LinkedIn Learning
Course Description
Overview
Create stronger, more secure applications for AWS deployment. Learn security best practices for Identity and Access Management, S3 storage, Key Management Service (KMS), and more.
Syllabus
Introduction
- Securing your application
- What you should know
- Important concepts
- Uses and access keys
- Roles and policies
- IAM key points
- Challenge: IAM roles and policies
- Solution: IAM roles and policies
- S3 as a static website
- Bucket policies
- S3 bucket encryption
- S3 object versioning and MFA delete
- S3 key points
- Challenge: S3 presigned URL challenge
- Solution: S3 presigned URL challenge
- Key Management Service (KMS) introduction
- Using AWS KMS
- KMS key points
- Challenge: Key Management Service
- Solution: Key Management Service
- Cognito concepts
- Workflow
- Cognito demonstration
- Cognito key points
- Challenge: Cognito automated login
- Solution: Cognito automated login
- Creating and managing certificates
- Using certificates with AWS Resources
- AWS Certificates Manager and EC2 instances
- Parameter Store for sensitive data
- Using Parameter Store from EC2
- Secrets Manager overview
- Root login alerts
- Detecting unauthorized instance stops
- Checking for unused credentials
- Get familiar with AWS tools
Taught by
Carlos Rivas
Related Courses
Windows 10 Features for a Mobile Workforce: Configuring Additional ResourcesedX Computing, Storage and Security with Google Cloud Platform
Google via Coursera Deep Dive into Amazon Elastic Block Store (EBS)
Amazon via Independent これだけは知っておきたい公衆無線LANセキュリティ対策 (pt23)
gacco Security Best Practices in Google Cloud
Google Cloud via Coursera