YoVDO

Securing the Endpoint

Offered By: Amazon Web Services via AWS Skill Builder

Tags

Endpoint Security Courses DevOps Courses Amazon Elastic Block Store Courses Data Protection Courses Amazon Web Services Courses Amazon Machine Image Courses AWS Systems Manager Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!

Languages Available: Español (Latinoamérica) | Español (España) | Français | Bahasa Indonesia | Italiano | 日本語 | 한국어 | Português (Brasil) | 中文(简体)

In this lab, you create a custom Amazon Machine Image (AMI) that contains various configuration changes. You then deploy a new instance from the custom AMI and use user data scripts to the instance to add a new user specific to the function of the instance. You then learn how to use AWS Systems Manager to keep your instances patched. Finally, you use Amazon Elastic Block Store (Amazon EBS) encryption and security group rules to protect company data at rest and in transit.


Level

Intermediate


Duration

1 Hours 15 Minutes


Course Objectives

In this course, you will learn how to:

  • Create a custom AMI
  • Deploy a new EC2 instance from a custom AMI
  • Patch an EC2 instance using AWS Systems Manager
  • Encrypt an EBS volume
  • Understand how EBS encryption works and how it impacts other operations, such as snapshots
  • Use security groups to limit traffic between EC2 instances to only that which is encrypted


Intended Audience

This course is intended for:

  • DevOps Engineers
  • Security Engineers


Prerequisites

We recommend that attendees of this course have the following prerequisites:

  • Familiar with basic navigation of the AWS Management Console
  • Comfortable running commands in a Linux command line interface (CLI)


Course Outline

  • Task 1: Create a custom AMI from an existing EC2 instance
  • Task 2: Deploy a new EC2 instance from a custom AMI
  • Task 3: Patch instances with AWS Systems Manager Patch Manager
  • Task 4: Protect data at rest

Tags

Related Courses

Check Point Jump Start: Harmony Endpoint Security
Checkpoint via Coursera
Check Point Jump Start: Harmony Endpoint Security
Checkpoint via edX
Deploy Secure Endpoints for Users with ChromeOS
Google Cloud via Coursera
Systems and Application Security
(ISC)² via Coursera
Cybersecurity Architecture
IBM via Coursera