Securing AWS Networks
Offered By: Pluralsight
Course Description
Overview
As you prepare for an advanced networking certification, you need to have firm grip on securing the AWS network. This course will teach you the various services in the AWS security landscape and how to monitor and comply with your organization.
AWS has been introducing new services on a consistent basis and one of the challenges is to understand and select the right tool for the right problem. In this course, Securing AWS Networks, you’ll learn about various AWS services related to security and how to monitor and troubleshoot your network for issues. First, you’ll explore different industry compliance standards and how to use the AWS trusted advisor to comply with the standards and use AWS Artifact to prepare for your security audit. Next, you’ll discover how to monitor the compliance, the traffic flowing through our network and perform the required paperwork for penetration testing. Then, you'll touch on how to secure the data flow by setting up access control lists, taking steps to mitigate vulnerability attacks and encrypt/decrypt the data, both at rest and in motion. Finally, you’ll see how to identify PII data and detect any malicious activities in the network. When you’re finished with this course, you’ll have the skills and knowledge of securing both AWS and hybrid network, and how to comply and monitor to the standards imposed by your organization that are needed to get your advanced networking certification.
AWS has been introducing new services on a consistent basis and one of the challenges is to understand and select the right tool for the right problem. In this course, Securing AWS Networks, you’ll learn about various AWS services related to security and how to monitor and troubleshoot your network for issues. First, you’ll explore different industry compliance standards and how to use the AWS trusted advisor to comply with the standards and use AWS Artifact to prepare for your security audit. Next, you’ll discover how to monitor the compliance, the traffic flowing through our network and perform the required paperwork for penetration testing. Then, you'll touch on how to secure the data flow by setting up access control lists, taking steps to mitigate vulnerability attacks and encrypt/decrypt the data, both at rest and in motion. Finally, you’ll see how to identify PII data and detect any malicious activities in the network. When you’re finished with this course, you’ll have the skills and knowledge of securing both AWS and hybrid network, and how to comply and monitor to the standards imposed by your organization that are needed to get your advanced networking certification.
Taught by
Saravanan Dhandapani
Related Courses
Configure Standard Access Lists on Cisco RoutersCoursera Project Network via Coursera Authentication and Authorization using Node.js
Microsoft via edX CCNP Troubleshooting (300-135) Cert Prep
LinkedIn Learning Cisco CCNA (200-301) Cert Prep: Security, Automation, and Programmability
LinkedIn Learning Cisco CCNP ENARSI (300-410) Cert Prep: 3 Infrastructure Security
LinkedIn Learning