English | MP4 | AVC 1280×720 | AAC 44KHz 2ch | 6h 41m | 2.49 GB
AWS Cloud Security LiveLessons explores Amazon Web Services (AWS), which offers a scalable cloud computing platform designed for high availability and reliability, providing the tools that allow you to run a wide range of applications. Helping to protect the confidentiality, integrity, and availability (CIA) of your systems and data is of the utmost importance. The AWS infrastructure has been architected to be one of the most flexible and secure cloud computing environments available today. It is designed to provide an extremely scalable, highly reliable platform that allows customers to deploy applications and data quickly and securely.
This course first covers the basics and rapid deployment capabilities of AWS to build a knowledge foundation for individuals who are brand new to cloud computing and AWS. You will explore the methods that AWS uses to secure their cloud services. You will learn how you, as an AWS customer, can have the most secure cloud solution possible for a wide variety of implementation scenarios. This course delves into the flexibility and agility needed to implement the most applicable security controls for your business functions in the AWS environment through deploying varying degrees of restrictive access to environments based on data sensitivity.
Through onscreen demos and detailed instruction, seasoned presenter Michael J. Shannon takes you through the key facets of AWS best practices and services in the areas of shared security and compliance; identity and access management; infrastructure security; data protection; and logging and monitoring to ensure that your AWS environment remains secure.
Topics include:
- AWS Security Fundamentals
- AWS Shared Security Responsibility Model
- AWS Compliance Services
- Understanding Users and Credentials
- Identity and Access Management (IAM)
- NACLs and Security Groups
- AWS WAF and AWS Shield
- Cryptographic Services
- Key Management
- Visibility and Reporting
Learn How To
- Apply security concepts, models, and services in an AWS environment
- Manage user account credentials and deploy AWS Identity and Access Management (IAM) to manage access to AWS services and resources securely
- Protect your network through best practices using NACLs and security groups, as well as the security offered by AWS Web Application Firewall (WAF) and AWS Shield
- Protect your data with IPsec, AWS Certificate Manager, AWS Key Management Services (KMS), AWS CloudHSM, and other key management approaches
- Ensure that your AWS environment is secure through logging, monitoring, auditing, and reporting services available in AWS
Table of Contents
01 AWS Cloud Security – Introduction
02 Module introduction
03 Learning objectives
04 1.1 Understanding the CIA Triad
05 1.2 Examining Types and Categories of Controls
06 1.4 Surveying Common Threats to AWS Services
07 Learning objectives
08 2.1 Understanding the Shared Security Responsibility Model
09 2.2 Establishing AWS Responsibilities – Security of the Cloud
10 2.3 Establishing Customer Responsibilities – Security in the Cloud
11 2.4 Surveying Strategies When Planning for Security
12 Learning objectives
13 3.1 Understanding AWS Premium Support Services
14 3.2 Understanding Risk and Compliance
15 3.3 Case Study – HIPAA Security and Compliance (and GDPR)
16 Module introduction
17 Learning objectives
18 4.1 Examining the Account Root User
19 4.2 Exploring User Accounts and Credentials
20 4.3 Exploring Password Policies
21 4.4 Deploying Identity and Access Management Best Practices
22 Learning objectives
23 5.1 Understanding IAM
24 5.2 Exploring IAM Users and Groups
25 5.3 Exploring IAM Roles
26 5.4 Exploring IAM Managed Policies
27 5.5 Exploring IAM Custom Policies
28 5.6 Exploring IAM Federated Services
29 5.7 Understanding AWS Security Token Service (STS)
30 5.8 Understanding AWS Cognito
31 Module introduction
32 Learning objectives
33 6.1 Understanding Security Zoning and Network Segmentation
34 6.2 Deploying Best Practices for Network Security in the Cloud
35 6.3 Comparing Security Groups to Network ACLs
36 6.4 Working with Network ACLs
37 6.5 Surveying Recommended NACL Scenarios
38 6.6 Understanding Security Groups
39 6.7 Working with Security Groups
40 6.8 Understanding Security Groups for Windows Instances
41 Learning objectives
42 7.1 Understanding Web Application Firewall (WAF)
43 7.2 Working with WAF
44 7.3 Exploring DDoS Protection and Response
45 7.4 Exploring AWS WAF Advanced API
46 7.5 Understanding AWS Shield
47 7.6 Working with AWS Shield
48 7.7 Deploying Malware Protection Best Practices
49 7.8 Surveying Layered Defense in the Cloud
50 Module introduction
51 Learning objectives
52 8.1 Understanding Cryptography Basics
53 8.2 Understanding IPsec Fundamentals
54 8.4 Exploring AWS Certificate Manager
55 Learning objectives
56 9.1 Understanding AWS Key Management Services (KMS)
57 9.2 Working with AWS KMS
58 9.3 Protecting EC2 Key Pairs
59 9.4 Using Encrypted EBS Volumes
60 9.5 Examining Server Side Encryption (SSE) in S3
61 9.6 Exploring AWS CloudHSM Security
62 Module introduction
63 Learning objectives
64 10.1 Understanding Security Reporting and Logging in AWS
65 10.2 Activating FlowLogs and Region-based CloudTrail
66 10.3 Understanding AWS Auditing
67 10.4 Exploring Pre-Audit Tasks
68 10.5 Surveying Additional Security Services
69 AWS Cloud Security – Summary
Resolve the captcha to access the links!