AWS Security Operations: Securing Core AWS Infrastructure Services
Offered By: Pluralsight
Course Description
Overview
This course is focused on securing core AWS infrastructure hosted at Amazon Web Services to stay safe and compliant while operating in the AWS Cloud using recommended security best practices.
It is essential to ensure your cloud solution follows the best practices in governance, security operations, and acceptable risk. In this course, AWS Security Operations: Securing Core AWS Infrastructure Services, you'll learn how to define and deploy resources based on the defined level of acceptable risk and compliance requirements defined by your company and your needs. First, you'll start by looking at the management of access control and take a look at identity and access management controlling access to resources using IAM controls. Next, users, groups, and role-based policies are covered along with the different security tools that can be used for carrying out these tasks. Then, you'll take a look at securing your core infrastructure including EC2 instances, EBS volumes, and VPC creation and security options. Finally, you'll finish off the course by looking at the concept of edge locations specifically looking at elastic load-balancing both classic and application based route 53 DNS services, and the web application firewall and AWS shield services. By the end of this course, you'll have the knowledge to keep the core AWS infrastructure services in your environment secure.
It is essential to ensure your cloud solution follows the best practices in governance, security operations, and acceptable risk. In this course, AWS Security Operations: Securing Core AWS Infrastructure Services, you'll learn how to define and deploy resources based on the defined level of acceptable risk and compliance requirements defined by your company and your needs. First, you'll start by looking at the management of access control and take a look at identity and access management controlling access to resources using IAM controls. Next, users, groups, and role-based policies are covered along with the different security tools that can be used for carrying out these tasks. Then, you'll take a look at securing your core infrastructure including EC2 instances, EBS volumes, and VPC creation and security options. Finally, you'll finish off the course by looking at the concept of edge locations specifically looking at elastic load-balancing both classic and application based route 53 DNS services, and the web application firewall and AWS shield services. By the end of this course, you'll have the knowledge to keep the core AWS infrastructure services in your environment secure.
Syllabus
- Course Overview 1min
- Managing Access Control 83mins
- Securing Core Infrastructure 95mins
- Securing Access to Edge Locations 54mins
Taught by
Mark Wilkins
Related Courses
Cybersecurity and Its Ten DomainsUniversity System of Georgia via Coursera Bases de données relationnelles : Comprendre pour maîtriser
Inria (French Institute for Research in Computer Science and Automation) via France Université Numerique Desarrollo de Aplicaciones Web: Seguridad
University of New Mexico via Coursera Web Application Development: Security
University of New Mexico via Coursera Computing, Storage and Security with Google Cloud Platform
Google via Coursera