YoVDO

AWS Well-Architected Framework: Security Pillar

Offered By: LinkedIn Learning

Tags

AWS Well-Architected Framework Courses Incident Response Courses Identity and Access Management (IAM) Courses Data Protection Courses Auditing Courses Identity and Access Management Courses

Course Description

Overview

Take a deeper look at the second pillar of the AWS Well-Architected Framework: security.

Syllabus

Introduction
  • Understanding the AWS Well-Architected Framework: The security pillar
  • What you should know
1. Design Principles of the Security Pillar
  • Security pillar overview
  • Design principles
  • Identity and Access Management
  • Demo: IAM security overview
  • Protecting AWS credentials
  • Identify threats: Detective controls
2. Identity and Security
  • AWS detective controls for security
  • Implement an auditing workflow
  • Challenge: Review a CloudTrail event
  • Solution: Review a CloudTrail event
3. Auditing
  • Auditing and notifications
  • Infrastructure protection
  • Key AWS services for infrastucture protection
4. Data and Protection
  • Data protection methods
  • Key AWS services for data protection
  • Protecting your data at rest at AWS
  • Protecting data in transit at AWS
  • Responding to security incidents
  • Managing incident response
  • Demo: Using the Well-Architected tool
Conclusion
  • Next steps

Taught by

Mark Wilkins

Related Courses

Computing, Storage and Security with Google Cloud Platform
Google via Coursera
Google Cloud Fundamentals: Core Infrastructure
Google via Coursera
Google Cloud Fundamentals: Core Infrastructure en Español
Google Cloud via Coursera
Google Cloud Fundamentals: Core Infrastructure en Français
Google Cloud via Coursera
Google Cloud Fundamentals: Core Infrastructure 日本語版
Google Cloud via Coursera