Enable security as part of your AWS architecture and prepare your response to security events like a security professional.
About This Video
Covers specialized data classifications, data encryption methods, AWS security services, and mechanisms you can use to implement them and secure your production environment
Make security operations and business-risk trade-off decisions with regards to cost, security, and deployment complexity when given a …
AWS Certified Security - Specialty
Video description
Enable security as part of your AWS architecture and prepare your response to security events like a security professional.
About This Video
Covers specialized data classifications, data encryption methods, AWS security services, and mechanisms you can use to implement them and secure your production environment
Make security operations and business-risk trade-off decisions with regards to cost, security, and deployment complexity when given a set of application requirements
Covers domains including Incident Response, Logging and Monitoring, Infrastructure Security, Identity and Access Management, and Data Protection
In Detail
The AWS Certified Security - Specialty certification gives AWS architects not only essential know-how, but also a strong foundation on which to build security into AWS architectures at every level. This course will teach you to apply security at all AWS layers, including encrypting and protecting data at rest and in transit and how to prepare for (and respond to) security events.
In this course, you'll learn how to secure your data and your AWS services/resources at multiple levels using a defense-in-depth approach. You'll learn how to protect your AWS credentials and resources using Identity and Access Management. You'll capture and analyze logs using CloudTrail, CloudWatch, and Athena. Finally, you'll learn how to implement network and instance security, encrypt data at rest and in transit and set up data backup, replication, and recovery.
By the end of this course, you'll be ready to control access to your AWS resources granularly. You will develop the skills to ace the exam for the Security Solutions certification.
If you're a cloud professional wanting to ace the AWS Certified Security - Specialty certification, or a cloud professional looking to build security layers into every AWS deployment to protect data at rest and in transit, then this course will be your go-to resource to achieve success.
Audience
This course is for cloud professionals who want to ace the AWS Certified Security – Specialty certification. Cloud professional looking to build security layers into every AWS deployment to protect data at rest and in transit will also benefit from this course. Prior knowledge of security controls for workloads on AWS (and IT security experience in designing and implementing security solutions) is assumed. Familiarity with AWS will be beneficial.
Chapter 2 : Understanding Infrastructure Security - Part One
Using Key Pairs with EC2 Instances
Understanding Hypervisors and Isolation in EC2 Instances
Get to Know AWS Secrets Manager
Leveraging AWS Systems Manager, Parameter Store, and Run Command Features
Chapter 3 : Understanding Infrastructure Security - Part Two
What Is a VPC?
Enabling Safe Internet Connectivity in VPCs
AWS Marketplace Security Products
Chapter 4 : Leverage AWS Services for Logging and Monitoring - Part One
Enabling Centralized Logging with CloudWatch
Leverage CloudTrail to Track User Activity and API Usage
Using Athena to Query Your Logs
Chapter 5 : Leveraging AWS Services for Logging and Monitoring - Part Two
Automated Security Assessments Using AWS Inspector
Intelligent Threat Detection Using AWS GuardDuty
Benefits of Using Trusted Advisor
Chapter 6 : Deep Dive into AWS Identity and Access Management - Part One
Overview of AWS IAM for User and Group Management
Deep Dive Into AWS IAM Roles and Policies
Using AWS Organizations and Service Control Policies
Chapter 7 : Deep Dive into AWS Identity and Access Management - Part Two
Enabling Active Directory Federation Within AWS
Understanding Cognito and Web Identity Federation
Chapter 8 : Ensuring Data Protection - Part One
Using AWS KMS to Easily Manage Data Encryption
Hands-On KMS
Restrict Access to S3 Buckets Using Policies and Pre-Signed URLs
Enabling Vault Lock in AWS Glacier
Chapter 9 : Ensuring Data Protection - Part Two
Force S3 to Use CloudFront
Getting to Know AWS Certificate Manager
Security Considerations and Features of AWS Load Balancers
Chapter 10 : Managing Incident Response
Overview of a DDoS Attack
Enabling AWS WAF and Shield to Protect Against DDoS Attacks
Configuring Throttling and Caching in API Gateway
Managing Compliance Requirements in AWS Using Artifact and Macie
Chapter 11 : Final Preparation
Booking Your Exam Seat
Exploring Relevant Whitepapers
Uncovering Additional Tips
Start your Free Trial Self paced Go to the Course We have partnered with providers to bring you collection of courses, When you buy through links on our site, we may earn an affiliate commission from provider.
This site uses cookies. By continuing to use this website, you agree to their use.I Accept