Table of contents
1. Introduction
9m 49s
Lock icon
About the Author | 2m 10s
Lock icon
Course Tools | 3m 43s
Lock icon
AWS Free Tier: Usage Tracking and Billing Widget | 3m 56s
2. Secure Global Infrastructure and Compliance
21m 8s
Lock icon
Regions, Availability Zones, and Endpoints | 8m 45s
Lock icon
VPC Endpoints | 8m 33s
Lock icon
IAM and Compliance | 3m 50s
3. Shared Responsibility and Trusted Advisor
10m 41s
Lock icon
Shared Responsibility Model | 5m 41s
Lock icon
Trusted Advisor | 5m
4. Identity and Access Management (IAM)
48m 8s
Lock icon
Root User | 8m 13s
Lock icon
Users and Groups | 10m 34s
Lock icon
Roles | 13m 24s
Lock icon
Policies | 10m 1s
Lock icon
Visual Editor for Policy Creation | 2m 2s
Lock icon
Access Advisor | 3m 54s
5. Encryption Essentials
1h 18m 35s
Lock icon
Symmetric and Asymmetric Encryption | 8m 20s
Lock icon
HSM and KMS | 10m 15s
Lock icon
AWS Security Essentials - KMS Integration with S3AWS Security Essentials - KMS Integration with S3 | 1h 0m
6. OS-Level Access
1h 47m 30s
Lock icon
Overview and SSH | 9m 56s
Lock icon
Bastion Host | 2m 7s
Lock icon
Linux Example | 16m 5s
Lock icon
Windows Remote Desktop Example | 7m 17s
Lock icon
Windows Bash Example | 7m 23s
Lock icon
Windows PuTTY Example | 4m 42s
Lock icon
AWS Security Essentials - Securing Connections with a Bastion HostAWS Security Essentials - Securing Connections with a Bastion Host | 1h 0m
7. Data Security
28m 3s
Lock icon
Securing Data at Rest: S3 and Glacier | 10m 4s
Lock icon
Securing Data at Rest: EBS and RDS | 5m 43s
Lock icon
Securing Data at Rest: DynamoDB and EMR | 4m 38s
Lock icon
Decommissioning Data and Media | 2m 42s
Lock icon
Securing Data in Transit | 4m 56s
8. OS Security
1h 30m 53s
Lock icon
Custom AMIs and Bootstrapping | 12m 27s
Lock icon
AWS Systems Manager- Patching/Automation | 14m 36s
Lock icon
Mitigating Malware and Abuse | 3m 50s
Lock icon
Preparing an Instance for a Custom AMIPreparing an Instance for a Custom AMI | 1h 0m
9. Infrastructure Security
2h 10m 47s
Lock icon
VPC Security | 8m 43s
Lock icon
Network Segmentation | 13m 31s
Lock icon
Strengthening and Threat Protection Layer | 7m 51s
Lock icon
Testing and Measurement | 2m 39s
Lock icon
AWS Web Application Firewall and Shield | 8m 3s
Lock icon
AWS Security Essentials - Network Segmentation LabAWS Security Essentials - Network Segmentation Lab | 1h 30m
10. Monitoring, Alerting , and Auditing
23m 49s
Lock icon
Monitoring Basics | 3m 40s
Lock icon
AWS Config | 5m 56s
Lock icon
AWS Systems Manager- Inventory and Insights | 4m 17s
Lock icon
AWS Inspector | 5m 52s
Lock icon
AWS GuardDuty | 4m 4s
Conclusion
43s
Lock icon
Thank You and Next Steps | 43s
About the author
A Cloud Guru
The Cloud Content team comprises subject matter experts hyper focused on services offered by the leading cloud vendors (AWS, GCP, and Azure), as well as cloud-related technologies such as Linux and DevOps. The team is thrilled to share their knowledge to help you build modern tech solutions from the ground up, secure and optimize your environments, and so much more!
More Courses by A G.
Get access now
Sign up to get immediate access to this course plus thousands more you can watch anytime, anywhere
Cancel
Close button icon