AWS Security Operations: Securing Core AWS Infrastructure Services
This course is focused on securing core AWS infrastructure hosted at Amazon Web Services to stay safe and compliant while operating in the AWS Cloud using recommended security best practices.
What you'll learn
It is essential to ensure your cloud solution follows the best practices in governance, security operations, and acceptable risk. In this course, AWS Security Operations: Securing Core AWS Infrastructure Services, you'll learn how to define and deploy resources based on the defined level of acceptable risk and compliance requirements defined by your company and your needs. First, you'll start by looking at the management of access control and take a look at identity and access management controlling access to resources using IAM controls. Next, users, groups, and role-based policies are covered along with the different security tools that can be used for carrying out these tasks. Then, you'll take a look at securing your core infrastructure including EC2 instances, EBS volumes, and VPC creation and security options. Finally, you'll finish off the course by looking at the concept of edge locations specifically looking at elastic load-balancing both classic and application based route 53 DNS services, and the web application firewall and AWS shield services. By the end of this course, you'll have the knowledge to keep the core AWS infrastructure services in your environment secure.
Table of contents
- Securing Core Infrastructure Services 4m
- Identity and Access Management 5m
- Defining Security Controls 4m
- Controlling Root Account Security 6m
- Managing Multiple Accounts 9m
- IAM Users and Security Controls 4m
- Defining IAM Policy for the User 6m
- Controlling Access to Resources 5m
- Access Keys and Passwords 5m
- Security Tools 5m
- IAM Groups 2m
- IAM Policies: The Basics 8m
- IAM Policy Types 9m
- Delegation and Federation 7m
- Best Practices for Planning Access Control 5m
- Securing Core Infrastructure 3m
- Securing EC2 Infrastructure 9m
- Amazon Machine Instances 5m
- AMI Storage Choices and Key Pairs 3m
- EC2 Security Options 5m
- Interfaces and Addresses 7m
- Network Interfaces and Addresses 4m
- Dedicated Instances and Hosts 7m
- Securing EBS Volumes 4m
- EBS Volume and Snapshot Security 8m
- VPC Architecture 8m
- VPC Setup Options 4m
- VPC Security: Part A 8m
- VPC Security and Connectivity: Part B 8m
- VPC Security Considerations 6m
- Best Practices 8m
- Securing Access to Edge Locations 3m
- Elastic Load Balancing 3m
- (Classic) Load Balancer 6m
- Elastic Load Balancer Operation 5m
- Classic ELB Security Features 2m
- Application Load Balancer 8m
- Elastic Load Balancer Setup 7m
- Route 53 7m
- AWS Web Application Firewall 5m
- Configuring the Web Application Firewall 4m
- Best Practices for Securing Access 6m