AWS Well-Architected Framework: Security Pillar
Offered By: LinkedIn Learning
Course Description
Overview
Take a deeper look at the second pillar of the AWS Well-Architected Framework: security.
Syllabus
Introduction
- Understanding the AWS Well-Architected Framework: The security pillar
- What you should know
- Security pillar overview
- Design principles
- Identity and Access Management
- Demo: IAM security overview
- Protecting AWS credentials
- Identify threats: Detective controls
- AWS detective controls for security
- Implement an auditing workflow
- Challenge: Review a CloudTrail event
- Solution: Review a CloudTrail event
- Auditing and notifications
- Infrastructure protection
- Key AWS services for infrastucture protection
- Data protection methods
- Key AWS services for data protection
- Protecting your data at rest at AWS
- Protecting data in transit at AWS
- Responding to security incidents
- Managing incident response
- Demo: Using the Well-Architected tool
- Next steps
Taught by
Mark Wilkins
Related Courses
Accounting, Business and Society: The Multi-faceted Role of AccountingThe Hong Kong University of Science and Technology via Coursera Auditing I: Conceptual Foundations of Auditing
University of Illinois at Urbana-Champaign via Coursera Auditing II: The Practice of Auditing
University of Illinois at Urbana-Champaign via Coursera AWS Foundations: Securing Your AWS Cloud (Traditional Chinese)
Amazon Web Services via AWS Skill Builder AWS IoT Device Defender Primer (Traditional Chinese)
Amazon Web Services via AWS Skill Builder