AWS Well-Architected Framework: Security Pillar
Offered By: LinkedIn Learning
Course Description
Overview
Take a deeper look at the second pillar of the AWS Well-Architected Framework: security.
Syllabus
Introduction
- Understanding the AWS Well-Architected Framework: The security pillar
- What you should know
- Security pillar overview
- Design principles
- Identity and Access Management
- Demo: IAM security overview
- Protecting AWS credentials
- Identify threats: Detective controls
- AWS detective controls for security
- Implement an auditing workflow
- Challenge: Review a CloudTrail event
- Solution: Review a CloudTrail event
- Auditing and notifications
- Infrastructure protection
- Key AWS services for infrastucture protection
- Data protection methods
- Key AWS services for data protection
- Protecting your data at rest at AWS
- Protecting data in transit at AWS
- Responding to security incidents
- Managing incident response
- Demo: Using the Well-Architected tool
- Next steps
Taught by
Mark Wilkins
Related Courses
AWS Well-Architected TrainingAmazon via Independent AWS Well-Architected Framework: Operational Excellence Pillar
LinkedIn Learning Introduction to AWS for Non-Engineers: 1 Cloud Concepts
LinkedIn Learning Learning the AWS Well-Architected Framework
LinkedIn Learning Real-World Cloud PM 3 of 3: Security, AWS Well-Architected
Advancing Women in Tech via Coursera