AWS Cloud Security

More than 6.5 hours of video instruction to help you learn the skills necessary to implement security in an Amazon Web Services (AWS) Cloud environment.

AWS Cloud Security

Course Description

AWS Cloud Security from Pearson explores Amazon Web Services (AWS), which offers a scalable cloud computing platform designed for high availability and reliability, providing the tools that allow you to run a wide range of applications. Helping to protect the confidentiality, integrity, and availability (CIA) of your systems and data is of the utmost importance. The AWS infrastructure has been architected to be one of the most flexible and secure cloud computing environments available today. It is designed to provide an extremely scalable, highly reliable platform that allows customers to deploy applications and data quickly and securely. This course first covers the basics and rapid deployment capabilities of AWS to build a knowledge foundation for individuals who are brand new to cloud computing and AWS. You will explore the m... Read More »

AWS Cloud Security from Pearson explores Amazon Web Services (AWS), which offers a scalable cloud computing platform designed for high availability and reliability, providing the tools that allow you to run a wide range of applications. Helping to protect the confidentiality, integrity, and availability (CIA) of your systems and data is of the utmost importance. The AWS infrastructure has been architected to be one of the most flexible and secure cloud computing environments available today. It is designed to provide an extremely scalable, highly reliable platform that allows customers to deploy applications and data quickly and securely.

This course first covers the basics and rapid deployment capabilities of AWS to build a knowledge foundation for individuals who are brand new to cloud computing and AWS. You will explore the methods that AWS uses to secure its cloud services. You will learn how you, as an AWS customer, can have the most secure cloud solution possible for a wide variety of implementation scenarios. This course delves into the flexibility and agility needed to implement the most applicable security controls for your business functions in the AWS environment by deploying varying degrees of restrictive access to environments based on data sensitivity.

Through on-screen demos and detailed instruction, seasoned presenter Michael J. Shannon takes you through the key facets of AWS best practices and services in the areas of shared security and compliance; identity and access management; infrastructure security; data protection; and logging and monitoring to ensure that your AWS environment remains secure.

What you’ll learn:

  • Apply security concepts, models, and services in an AWS environment
  • Manage user account credentials and deploy AWS Identity and Access Management to access AWS services and resources securely
  • Protect your network through best practices using NACLs and security groups, as well as the security offered by AWS Web Application Firewall (WAF) and AWS Shield
  • Protect your data with IPsec, AWS Certificate Manager, AWS Key Management Services (KMS), AWS CloudHSM, and other key management approaches
  • Ensure that your AWS is secure through logging, monitoring and auditing, and reporting services available in AWS
Read Less
Course Details:

Target Audience

  • Existing certified cloud practitioners interested in building a strong security foundation to enhance their experience with Amazon EC2, VPC, and many other services.
  • Individuals preparing for the AWS Solutions Architect, Developer, and SysOps Administrator Associate certifications.
  • Anyone moving into or advancing in the IT and Information Security field
  • Prerequisites

  • This course requires basic knowledge of cloud networking and network security concepts and technologies.
  • Certificate Info:

    Type of Certification

    Certificate of Completion

    Format of Certification

    Digital and Print

    Professional Association/Affiliation

    This certificate is issued by Pearson LearnIT

    Method of Obtaining Certification

    Upon successful completion of the course, participants will receive a certificate of completion.

    Course Outline

    Lesson 1, AWS Security Fundamentals, covers security fundamentals including understanding the CIA triad; examining types and categories of controls; reviewing core AWS Services; and surveying common threats to AWS services.
    Lesson 2, AWS Shared Security Responsibility Model, covers the very important AWS shared security responsibility model. Topics include: understanding the shared security responsibility model; establishing AWS responsibilities, including security of and in the cloud. Finally, this lesson concludes with a look at strategies when planning for security.
    Lesson 3, AWS Compliance Services, is all about AWS compliance services. You will learn about the AWS premium support services; understand risk and compliance; and look at a case study of HIPAA security and compliance.
    Lesson 4, Understanding Users and Credentials, explores users and credentials as well as the account root user. In addition, you’ll learn to configure user accounts and credentials; learn about password policies; and review Identity and Access Management (IAM) best practices.
    Lesson 5, Identity and Access Management (IAM), looks deeper at the AWS IAM service. You will first learn the basics of IAM; explore IAM users and groups; IAM roles; managed and custom Policies; and examine IAM Federated Services, the AWS Security Token Service (STS); and wrap up with a look at AWS Cognito.
    Lesson 6, NACLs and Security Groups, covers network access control lists (NACLs)and security groups with a focus on understanding security zoning, network segmentation, and best Practices for network security in the cloud.
    Lesson 7, AWS WAF and AWS Shield, focuses on having a working knowledge of the mechanics of and working with the AWS Web Application Firewall (WAF) and AWS Shield. The lesson explores distributed denial of service (DDoS) protection and response; the AWS WAF Advanced API; deploying malware protection best practices, and surveying layered defense in the cloud.
    Lesson 8, Cryptographic Services, covers the basics of cryptographic services; IPsec fundamentals, IPsec in AWS; and AWS Certificate Manager.
    In Lesson 9, Key Management, explores AWS Key Management Services (KMS); how to protect EC2 key pairs; how to use encrypted EBS volumes; how to work with Server-Side Encryption (SSE) in S3; and concludes with a look at AWS CloudHSM Security.
    Lesson 10, Logging and Monitoring, covers topics including visibility and reporting; security reporting and logging in AWS; activating Flow Logs and Region-based CloudTrail; AWS Auditing; Pre-Audit Tasks, and concludes with a look at additional security services offered in an AWS environment.

    DON'T HAVE TIME?

    We can send you everything you need to know about this course through email.
    We respect your privacy. Your information is safe and will never be shared.