AWS Security

Managing AWS Accounts with IAM and Organizations

1
AWSS – Configuring IAM for a new account
2
AWSS – Creating IAM policies
3
AWSS – Creating a master account for AWS Organizations
4
AWSS – Creating a new account under an AWS Organization
5
AWSS – Switching roles with AWS Organizations

Securing Data on S3 with Policies and Techniques

1
AWSS – Creating S3 access control lists
2
AWSS – Creating an S3 bucket policy
3
AWSS – S3 cross-account access from the CLI
4
AWSS – S3 pre-signed URLs with an expiry time using the CLI and Python
5
AWSS – Encrypting data on S3
6
AWSS – Protecting data with versioning
7
AWSS – Implementing S3 cross-region replication within the same account
8
AWSS – Implementing S3 cross-region replication across accounts

User Pools and Identity Pools with Cognito

1
AWSS – Creating Amazon Cognito user pools
2
AWSS – Creating an Amazon Cognito app client
3
AWSS – User creation and user signups
4
AWSS – Implementing an admin authentication flow
5
AWSS – Implementing a client-side authentication flow
6
AWSS – Working with Cognito groups
7
AWSS – Federated identity with Cognito user pools

Key Management with KMS and CloudHSM

1
AWSS – Creating keys in KMS
2
AWSS – Using keys with external key material
3
AWSS – Rotating keys in KMS
4
AWSS – Granting permissions programmatically with grants
5
AWSS – Using key policies with conditional keys
6
AWSS – Sharing customer-managed keys across accounts
7
AWSS – Creating a CloudHSM cluster
8
AWSS – Initializing and activating a CloudHSM cluster

Network Security with VPC

1
AWSS – Creating a VPC in AWS
2
AWSS – Creating subnets in a VPC
3
AWSS – Configuring an internet gateway and a route table for internet access
4
AWSS – Setting up and configuring NAT gateways
5
AWSS – Working with NACLs
6
AWSS – Using a VPC gateway endpoint to connect to S3
7
AWSS – Configuring and using VPC flow logs

Working with EC2 Instances

1
AWSS – Creating and configuring security groups
2
AWSS – Launching an EC2 instance into a VPC
3
AWSS – Setting up and configuring NAT instances
4
AWSS – Creating and attaching an IAM role to an EC2 instance
5
AWSS – Using our own private and public keys with EC2
6
AWSS – Using EC2 user data to launch an instance with a web server
7
AWSS – Storing sensitive data with the Systems Manager Parameter Store
8
AWSS – Using KMS to encrypt data in EBS

Web Security Using ELBs | CloudFront | and WAF

1
AWSS – Enabling HTTPS on an EC2 instance
2
AWSS – Creating an SSL/TLS certificate with ACM
3
AWSS – Creating a classic load balancer
4
AWSS – Creating ELB target groups
5
AWSS – Using an application load balancer with TLS termination at the ELB
6
AWSS – Using a network load balancer with TLS termination at EC2
7
AWSS – Securing S3 using CloudFront and TLS
8
AWSS – Configuring and using the AWS web application firewall (WAF)

Monitoring with CloudWatch | CloudTrail and Config

1
AWSS – Creating an SNS topic to send emails
2
AWSS – Working with CloudWatch alarms and metrics
3
AWSS – Creating a dashboard in CloudWatch
4
AWSS – Creating a CloudWatch log group
5
AWSS – Working with CloudWatch events
6
AWSS – Reading and filtering logs in CloudTrail
7
AWSS – Creating a trail in CloudTrail
8
AWSS – Using Athena to query CloudTrail logs in S3
9
AWSS – Cross-account CloudTrail logging
10
AWSS – Integrating CloudWatch and CloudTrail
11
AWSS – Setting up and using AWS Config

Compliance with GuardDuty | Macie and Inspector

1
AWSS – Setting up and using Amazon GuardDuty
2
AWSS – Aggregating findings from multiple accounts in GuardDuty
3
AWSS – Setting up and using Amazon Macie
4
AWSS – Setting up and using Amazon Inspector
5
AWSS – Creating a custom Inspector template

Additional Services and Practices for AWS Security

1
AWSS – Setting up and using AWS Security Hub
2
AWSS – Setting up and using AWS SSO
3
AWSS – Setting up and using AWS Resource Access Manager
4
AWSS – Protecting S3 Glacier vaults with Vault Lock
5
AWSS – Using AWS Secrets Manager to manage RDS credentials
6
AWSS – Creating an AMI instead of using EC2 user data
7
AWSS – Using security products from AWS Marketplace
8
AWSS – Using AWS Trusted Advisor for recommendations
9
AWSS – Using AWS Artifact for compliance reports

Be the first to add a review.

Please, login to leave a review
Add to Wishlist
Enrolled: 0 students
Lectures: 76

Archive

Working hours

Monday 9:30 am - 6.00 pm
Tuesday 9:30 am - 6.00 pm
Wednesday 9:30 am - 6.00 pm
Thursday 9:30 am - 6.00 pm
Friday 9:30 am - 5.00 pm
Saturday Closed
Sunday Closed
AWS Security
Price:
Free