Table of contents
1. Introduction
9m 47s
Lock icon
About the Author | 2m 9s
Lock icon
Course Tools | 3m 42s
Lock icon
AWS Free Tier: Usage Tracking and Billing Widget | 3m 56s
2. Secure Global Infrastructure and Compliance
21m 6s
Lock icon
Regions, Availability Zones, and Endpoints | 8m 45s
Lock icon
VPC Endpoints | 8m 32s
Lock icon
IAM and Compliance | 3m 49s
3. Shared Responsibility and Trusted Advisor
10m 40s
Lock icon
Shared Responsibility Model | 5m 40s
Lock icon
Trusted Advisor | 5m
4. Identity and Access Management (IAM)
48m 5s
Lock icon
Root User | 8m 13s
Lock icon
Users and Groups | 10m 34s
Lock icon
Roles | 13m 23s
Lock icon
Policies | 10m 1s
Lock icon
Visual Editor for Policy Creation | 2m 1s
Lock icon
Access Advisor | 3m 53s
5. Encryption Essentials
1h 18m 34s
Lock icon
Symmetric and Asymmetric Encryption | 8m 19s
Lock icon
HSM and KMS | 10m 15s
Lock icon
AWS Security Essentials - KMS Integration with S3 | 1h 0m
6. OS-Level Access
1h 47m 26s
Lock icon
Overview and SSH | 9m 55s
Lock icon
Bastion Host | 2m 7s
Lock icon
Linux Example | 16m 4s
Lock icon
Windows Remote Desktop Example | 7m 16s
Lock icon
Windows Bash Example | 7m 23s
Lock icon
Windows PuTTY Example | 4m 41s
Lock icon
AWS Security Essentials - Securing Connections with a Bastion Host | 1h 0m
7. Data Security
27m 58s
Lock icon
Securing Data at Rest: S3 and Glacier | 10m 3s
Lock icon
Securing Data at Rest: EBS and RDS | 5m 42s
Lock icon
Securing Data at Rest: DynamoDB and EMR | 4m 37s
Lock icon
Decommissioning Data and Media | 2m 41s
Lock icon
Securing Data in Transit | 4m 55s
8. OS Security
1h 30m 50s
Lock icon
Custom AMIs and Bootstrapping | 12m 26s
Lock icon
AWS Systems Manager- Patching/Automation | 14m 35s
Lock icon
Mitigating Malware and Abuse | 3m 49s
Lock icon
Preparing an Instance for a Custom AMI | 1h 0m
9. Infrastructure Security
2h 10m 44s
Lock icon
VPC Security | 8m 42s
Lock icon
Network Segmentation | 13m 31s
Lock icon
Strengthening and Threat Protection Layer | 7m 50s
Lock icon
Testing and Measurement | 2m 38s
Lock icon
AWS Web Application Firewall and Shield | 8m 3s
Lock icon
AWS Security Essentials - Network Segmentation Lab | 1h 30m
10. Monitoring, Alerting , and Auditing
23m 48s
Lock icon
Monitoring Basics | 3m 40s
Lock icon
AWS Config | 5m 56s
Lock icon
AWS Systems Manager- Inventory and Insights | 4m 16s
Lock icon
AWS Inspector | 5m 52s
Lock icon
AWS GuardDuty | 4m 4s
Conclusion
42s
Lock icon
Thank You and Next Steps | 42s
About the author
Pluralsight
The Cloud Content team comprises subject matter experts hyper focused on services offered by the leading cloud vendors (AWS, GCP, and Azure), as well as cloud-related technologies such as Linux and DevOps. The team is thrilled to share their knowledge to help you build modern tech solutions from the ground up, secure and optimize your environments, and so much more!
More Courses by Pluralsight
Get access now
Sign up to get immediate access to this course plus thousands more you can watch anytime, anywhere
Cancel
Close button icon