AWS Well-Architected Framework: Security Pillar
Offered By: LinkedIn Learning
Course Description
Overview
Take a deeper look at the second pillar of the AWS Well-Architected Framework: security.
Syllabus
Introduction
- Understanding the AWS Well-Architected Framework: The security pillar
- What you should know
- Security pillar overview
- Design principles
- Identity and Access Management
- Demo: IAM security overview
- Protecting AWS credentials
- Identify threats: Detective controls
- AWS detective controls for security
- Implement an auditing workflow
- Challenge: Review a CloudTrail event
- Solution: Review a CloudTrail event
- Auditing and notifications
- Infrastructure protection
- Key AWS services for infrastucture protection
- Data protection methods
- Key AWS services for data protection
- Protecting your data at rest at AWS
- Protecting data in transit at AWS
- Responding to security incidents
- Managing incident response
- Demo: Using the Well-Architected tool
- Next steps
Taught by
Mark Wilkins
Related Courses
Computing, Storage and Security with Google Cloud PlatformGoogle via Coursera Google Cloud Fundamentals: Core Infrastructure
Google via Coursera Google Cloud Fundamentals: Core Infrastructure en Español
Google Cloud via Coursera Google Cloud Fundamentals: Core Infrastructure en Français
Google Cloud via Coursera Google Cloud Fundamentals: Core Infrastructure 日本語版
Google Cloud via Coursera