YoVDO

Working with Amazon VPC Network Access Analyzer

Offered By: Amazon Web Services via AWS Skill Builder

Tags

Cloud Security Courses Compliance Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Languages Available: Español (Latinoamérica) | Français | Bahasa Indonesia | 日本語 | 한국어 | Português (Brasil) | 中文(简体)

This lab demonstrates how to use the Network Access Analyzer feature in your Amazon VPC (Virtual Private Cloud). This feature helps you understand, verify, and improve your network security posture.


Level

Intermediate


Duration

1 Hours 0 Minutes


Course objectives

By the end of this lab, you will be able to:

      •    Understand, verify, and improve a network security posture.

      •    Demonstrate a network configuration meets compliance requirements.


Intended audience

This course is intended for:

      •    System Operations Engineers

      •    Network Engineers


Prerequisites

We recommend that attendees of this course have the following prerequisites:

      •    Knowledge about basic networking concepts (such as IP Addressing, CIDR notation, and routing)

      •    An understanding with basic cloud operations

      •    Familiarity with navigating the AWS Management Console.


Course outline

Task 1: Understanding the architectures you are working with

Task 2: Use a Network Access Scope template to analyze ingress traffic

Task 3: Create and analyze a VPC endpoint path

Task 4: Create a custom network access scope to analyze a private subnet

Task 5: Create a custom network access scope to analyze VPC segmentation

Task 6: Verify the use of a NAT gateway for internet traffic

Task 7: Duplicate and modify a Network Access Scope

Task 8: Validate a compliance requirement


Tags

Related Courses

Architecting Microsoft Azure Solutions
Microsoft via edX
Internetwork Security
Indian Institute of Technology, Kharagpur via Swayam
Network Security
Georgia Institute of Technology via Udacity
Microsoft Professional Orientation : Cloud Administration
Microsoft via edX
Cyber Threats and Attack Vectors
University of Colorado System via Coursera