AWS Security Operations: Securing Core AWS Infrastructure Services
Pluralsight
Course Summary
This course is focused on securing core AWS infrastructure hosted at Amazon Web Services to stay safe and compliant while operating in the AWS Cloud using recommended security best practices.
-
+
Course Description
It is essential to ensure your cloud solution follows the best practices in governance, security operations, and acceptable risk. In this course, AWS Security Operations: Securing Core AWS Infrastructure Services, you'll learn how to define and deploy resources based on the defined level of acceptable risk and compliance requirements defined by your company and your needs. First, you'll start by looking at the management of access control and take a look at identity and access management controlling access to resources using IAM controls. Next, users, groups, and role-based policies are covered along with the different security tools that can be used for carrying out these tasks. Then, you'll take a look at securing your core infrastructure including EC2 instances, EBS volumes, and VPC creation and security options. Finally, you'll finish off the course by looking at the concept of edge locations specifically looking at elastic load-balancing both classic and application based route 53 DNS services, and the web application firewall and AWS shield services. By the end of this course, you'll have the knowledge to keep the core AWS infrastructure services in your environment secure.
-
+
Course Syllabus
Course Overview- 1m 39s
—Course Overview 1m 39sManaging Access Control- 1h 23m
—Securing Core Infrastructure Services 3m 56s
—Identity and Access Management 5m 3s
—Defining Security Controls 4m 10s
—Controlling Root Account Security 6m 2s
—Managing Multiple Accounts 8m 47s
—IAM Users and Security Controls 4m 17s
—Defining IAM Policy for the User 6m 15s
—Controlling Access to Resources 4m 36s
—Access Keys and Passwords 4m 46s
—Security Tools 4m 43s
—IAM Groups 1m 32s
—IAM Policies: The Basics 7m 35s
—IAM Policy Types 9m 21s
—Delegation and Federation 6m 57s
—Best Practices for Planning Access Control 5m 7sSecuring Core Infrastructure- 1h 35mSecuring Access to Edge Locations- 54m 16s