Back to Course
Introduction to AWS Security
0% Complete
0/0 Steps
-
IntroductionAbout the course and authors
-
AWS cloud architecture
-
Security concerns with our architecture
-
Regions and Availability Zones (AZs)
-
Shared responsibility in the cloud
-
[LAB] Create a billing alert to avoid surprise bills
-
Infrastructure SecurityVPC networks
-
Default VPCs
-
[DEMO] Creating VPCs and Subnets
-
How many VPCs should you use?
-
[DEMO] Subnet, Route Table, and Gateway Configurations
-
[LAB] [Challenge] Create a VPC with public and private subnets
-
[DEMO] Security Groups (SGs)
-
Security Groups Best Practices
-
[DEMO] Network Access Control Lists (NACLs)
-
[LAB] [Challenge] Configure security groups and NACLs to specific requirements
-
Elastic Load Balancers
-
[DEMO] AWS WAF
-
[DEMO] AWS Network Firewall - Part 1
-
[DEMO] AWS Network Firewall - Part 2
-
AWS Shield for DDoS Protection
-
AWS Firewall Manager
-
Identity and Access Management (IAM)Key Concepts of IAM in AWS
-
[DEMO] Getting started with IAM in AWS
-
[DEMO] Creating our first admin user
-
Assigning permissions with policies
-
IAM Roles
-
End-User Management with Amazon Cognito
-
Data ProtectionData protection in the cloud
-
EBS Data Protection and Encryption
-
Amazon RDS Data Protection and Encryption
-
Key Management with AWS KMS
-
Amazon S3 Bucket ProtectionUnderstanding Bucket Ownership
-
Managing Access to Buckets
-
Using Signed URLs
-
Encrypting S3 Data
-
Amazon S3 Protection Summary
-
Logging and MonitoringAWS Log Types and Auditing Options
-
AWS CloudTrail
-
Amazon CloudWatch
-
Proper Logging and Monitoring
-
Wrap-up and Key TakeawaysWhat now?
Lesson available soon
Responses