YoVDO

Securing Applications on AWS

Offered By: Pluralsight

Tags

Amazon Web Services (AWS) Courses Waves Courses API Gateways Courses AWS Security Courses

Course Description

Overview

Learn how to use CloudWatch for monitoring, CloudTrail for auditing, Config for resource compliance, and Trusted Advisor for warnings. Explore how to protect against DDOS attacks with the WAF and use the API Gateway for creating and hosting APIs.

Many applications at AWS are over-hosted. In this course, Securing Applications on AWS, you will gain knowledge about how to protect over-hosted applications at AWS using a variety of powerful management tools provided by Amazon. First, you will look at the Web Application Firewall (WAF) and see how to protect against unwanted access from incoming public traffic, you will explore the API Gateway and how you can create and host APIs at AWS, and you will dive into Amazon Cognito which allows you to create user and identity pools that allow internal and external authentication and single sign-on access. Next, you will look at the operation of CloudWatch and its use of metrics which allow you to manage all of your AWS resources, as well as CloudTrail which helps to monitor all activity in your AWS account. Finally, you will see how to use TrustedAdvisor to alert you to account issues, and AWS Config to set rules for managing your infrastructure resources. When you are done with this course, you will know how to monitor, audit, protect, and take many other actions towards protecting your applications hosted on AWS.

Taught by

Mark Wilkins

Related Courses

Application Development using Microservices and Serverless
IBM via Coursera
AWS Application Services Overview
Amazon Web Services via AWS Skill Builder
AWS Application Services Overview (Indonesian)
Amazon Web Services via AWS Skill Builder
AWS Application Services Overview (Portuguese)
Amazon Web Services via AWS Skill Builder
AWS Application Services Overview (Spanish)
Amazon Web Services via AWS Skill Builder