YoVDO

AWS Well-Architected Framework: Security Pillar

Offered By: LinkedIn Learning

Tags

AWS Well-Architected Framework Courses Incident Response Courses Identity and Access Management (IAM) Courses Data Protection Courses Auditing Courses Identity and Access Management Courses

Course Description

Overview

Take a deeper look at the second pillar of the AWS Well-Architected Framework: security.

Syllabus

Introduction
  • Understanding the AWS Well-Architected Framework: The security pillar
  • What you should know
1. Design Principles of the Security Pillar
  • Security pillar overview
  • Design principles
  • Identity and Access Management
  • Demo: IAM security overview
  • Protecting AWS credentials
  • Identify threats: Detective controls
2. Identity and Security
  • AWS detective controls for security
  • Implement an auditing workflow
  • Challenge: Review a CloudTrail event
  • Solution: Review a CloudTrail event
3. Auditing
  • Auditing and notifications
  • Infrastructure protection
  • Key AWS services for infrastucture protection
4. Data and Protection
  • Data protection methods
  • Key AWS services for data protection
  • Protecting your data at rest at AWS
  • Protecting data in transit at AWS
  • Responding to security incidents
  • Managing incident response
  • Demo: Using the Well-Architected tool
Conclusion
  • Next steps

Taught by

Mark Wilkins

Related Courses

Accounting, Business and Society: The Multi-faceted Role of Accounting
The Hong Kong University of Science and Technology via Coursera
Auditing I: Conceptual Foundations of Auditing
University of Illinois at Urbana-Champaign via Coursera
Auditing II: The Practice of Auditing
University of Illinois at Urbana-Champaign via Coursera
AWS Foundations: Securing Your AWS Cloud (Traditional Chinese)
Amazon Web Services via AWS Skill Builder
AWS IoT Device Defender Primer (Traditional Chinese)
Amazon Web Services via AWS Skill Builder