AWS: Enterprise Security

AWS: Enterprise Security

English | MP4 | AVC 1280×720 | AAC 48KHz 2ch | 4h 41m | 622 MB

Implement AWS securely. Learn about the different security tools within AWS—Identity and Access Management (IAM), Key Management Service (KMS), and more—as well as how to use them.

Understanding—and successfully implementing—security concepts is essential to using Amazon Web Services (AWS) as your enterprise solution. In this course, instructor Sharif Nijim couples pragmatic advice with practical examples that show IT pros how to create a secure infrastructure within AWS. Sharif explores the shared responsibility model of security, which splits duties between your company and AWS, and introduces key Identity and Access Management (IAM) concepts, including users, groups, roles, and policies. Discover how to manage access to Simple Storage Service (S3); implement detective controls within AWS, including how to work with AWS Config and GuardDuty; use protective tools such as AWS Shield; and use AWS Key Management Service (KMS) to manage access keys. Plus, learn how to prepare for the inevitable audit of your AWS account(s).

Table of Contents

1 AWS security overview
2 What you should know
3 Understanding shared responsibility
4 Understanding the AWS security landscape
5 Understanding separation of duties
6 Implementing separation of duties
7 Understanding CloudTrail
8 Enabling CloudTrail
9 Understanding AWS Organizations
10 The AWS Command Line Interface (CLI) for Mac
11 The AWS Command Line Interface (CLI) for Windows
12 Understanding IAM
13 Understanding IAM policies
14 Configuring IAM policies
15 Understanding IAM groups
16 Configuring IAM groups
17 Configuring web console access
18 Configuring IAM users Web console
19 Challenge IAM
20 Solution IAM
21 Understanding IAM roles
22 Configuring IAM roles
23 Understanding Security Token Service
24 Granting temporary access
25 Illustrating access restrictions
26 Exploring IAM policy simulator
27 Exploring federated access in AWS
28 Use case Securing financial access
29 Understanding Resource Access Manager
30 Managing S3 access
31 Accessing S3 privately
32 Managing S3 with IAM
33 Restricting S3 access with IAM
34 Illustrating EC2 S3 access with IAM
35 S3 bucket policies
36 Illustrating S3 bucket policies with CLI
37 Understanding S3 access control lists
38 Exploring presigned URLs
39 Understanding Key Management Service
40 Creating a KMS key
41 Using a KMS in S3
42 Using KMS and an IAM role
43 Automating KMS key rotation
44 Deleting a KMS key
45 Understanding Secrets Manager
46 Using Secrets Manager
47 Enabling auto-rotation with Secrets Manager
48 Understanding AWS CloudHSM
49 Understanding AWS Config
50 Enabling AWS Config
51 Exploring AWS Config results
52 Understanding AWS GuardDuty
53 Exploring AWS GuardDuty
54 Understanding AWS Macie
55 Understanding IAM Access Analyzer
56 Understanding Amazon Detective
57 Exploring Amazon Detective
58 Understanding Amazon Inspector
59 Exploring Amazon Inspector
60 Understanding web application firewall
61 Configuring web application firewall
62 Understanding AWS Shield
63 Understanding Certificate Manager
64 Creating a private certificate
65 Understanding AWS Security Hub
66 Using AWS Security Hub
67 Rotating access keys
68 Understanding AWS Artifact
69 Understanding Trusted Advisor
70 Exploring Trusted Advisor
71 Preparing for a security audit
72 Next steps