YoVDO

AWS Well-Architected Framework: Security Pillar

Offered By: LinkedIn Learning

Tags

AWS Well-Architected Framework Courses Incident Response Courses Identity and Access Management (IAM) Courses Data Protection Courses Auditing Courses Identity and Access Management Courses

Course Description

Overview

Take a deeper look at the second pillar of the AWS Well-Architected Framework: security.

Syllabus

Introduction
  • Understanding the AWS Well-Architected Framework: The security pillar
  • What you should know
1. Design Principles of the Security Pillar
  • Security pillar overview
  • Design principles
  • Identity and Access Management
  • Demo: IAM security overview
  • Protecting AWS credentials
  • Identify threats: Detective controls
2. Identity and Security
  • AWS detective controls for security
  • Implement an auditing workflow
  • Challenge: Review a CloudTrail event
  • Solution: Review a CloudTrail event
3. Auditing
  • Auditing and notifications
  • Infrastructure protection
  • Key AWS services for infrastucture protection
4. Data and Protection
  • Data protection methods
  • Key AWS services for data protection
  • Protecting your data at rest at AWS
  • Protecting data in transit at AWS
  • Responding to security incidents
  • Managing incident response
  • Demo: Using the Well-Architected tool
Conclusion
  • Next steps

Taught by

Mark Wilkins

Related Courses

AWS Certified Security - Specialty 2020
A Cloud Guru
AWS Identity and Access Management (IAM) Concepts
A Cloud Guru
AZ-104 Microsoft Azure Administrator Certification Prep
A Cloud Guru
AZ-305: Designing Microsoft Azure Infrastructure Solutions
A Cloud Guru
AZ-500 Microsoft Azure Security Technologies
A Cloud Guru