Securing AWS Networks
Offered By: Pluralsight
Course Description
Overview
As you prepare for an advanced networking certification, you need to have firm grip on securing the AWS network. This course will teach you the various services in the AWS security landscape and how to monitor and comply with your organization.
AWS has been introducing new services on a consistent basis and one of the challenges is to understand and select the right tool for the right problem. In this course, Securing AWS Networks, you’ll learn about various AWS services related to security and how to monitor and troubleshoot your network for issues. First, you’ll explore different industry compliance standards and how to use the AWS trusted advisor to comply with the standards and use AWS Artifact to prepare for your security audit. Next, you’ll discover how to monitor the compliance, the traffic flowing through our network and perform the required paperwork for penetration testing. Then, you'll touch on how to secure the data flow by setting up access control lists, taking steps to mitigate vulnerability attacks and encrypt/decrypt the data, both at rest and in motion. Finally, you’ll see how to identify PII data and detect any malicious activities in the network. When you’re finished with this course, you’ll have the skills and knowledge of securing both AWS and hybrid network, and how to comply and monitor to the standards imposed by your organization that are needed to get your advanced networking certification.
AWS has been introducing new services on a consistent basis and one of the challenges is to understand and select the right tool for the right problem. In this course, Securing AWS Networks, you’ll learn about various AWS services related to security and how to monitor and troubleshoot your network for issues. First, you’ll explore different industry compliance standards and how to use the AWS trusted advisor to comply with the standards and use AWS Artifact to prepare for your security audit. Next, you’ll discover how to monitor the compliance, the traffic flowing through our network and perform the required paperwork for penetration testing. Then, you'll touch on how to secure the data flow by setting up access control lists, taking steps to mitigate vulnerability attacks and encrypt/decrypt the data, both at rest and in motion. Finally, you’ll see how to identify PII data and detect any malicious activities in the network. When you’re finished with this course, you’ll have the skills and knowledge of securing both AWS and hybrid network, and how to comply and monitor to the standards imposed by your organization that are needed to get your advanced networking certification.
Taught by
Saravanan Dhandapani
Related Courses
Communicating Data Science ResultsUniversity of Washington via Coursera Cloud Computing Applications, Part 2: Big Data and Applications in the Cloud
University of Illinois at Urbana-Champaign via Coursera Cloud Computing Infrastructure
University System of Maryland via edX Google Cloud Platform for AWS Professionals
Google via Coursera Introduction to Apache Spark and AWS
University of London International Programmes via Coursera