AWS Security Essentials (Video Course)

AWS Security Essentials (Video Course)

English | MP4 | AVC 1280×720 | AAC 44KHz 2ch | 118 Lessons (7h 15m) | 1.57 GB

Secure your AWS cloud environment against cyber threats.

Get a deep understanding of AWS security concepts to protect your cloud infrastructure against cyber threats
Gain foundational knowledge of security strategies and implementation patterns to navigate the complexities of cloud security
Strategize your incident response and threat detection performance through preparation, detection, analysis, containment, and post incident activity

Get the best knowledge to secure your AWS environment. Learn efficient and effective practices for securing your AWS environment–set up encryption and implement mechanisms and advanced monitoring solutions for threat detection. You will stay ahead of threats and ensure protection for your data and application. Best-selling author and trainer Chad Smith will guide you through tools and techniques to secure your AWS resources, while also learning how to proactively detect and mitigate potential vulnerabilities.

This master class contains lessons from:

  • AWS Certified Security Specialty Certification Video (SCS-C02)
  • AWS Certified Cloud Practitioner Complete Video Course (CLF-C01)
Table of Contents

Introduction
1 AWS Security Essentials Introduction

Lesson 1 AWS Compliance Introduction
2 Learning objectives
3 Compliance Information
4 Compliance Strategies
5 Auditing and Reporting
6 Least Privilege Concepts and Strategies

Lesson 2 AWS Identity Management Introduction
7 Learning objectives
8 User and Identity Management Basics
9 AWS Credentials and MFA
10 AWS Root Account
11 AWS IAM Users and Groups
12 AWS IAM Roles and Policies

Lesson 3 AWS Security Support Introduction
13 Learning objectives
14 AWS Network Security Capabilities
15 Security Documentation Types
16 AWS Trusted Advisor

Lesson 4 AWS Authentication
17 Learning objectives
18 Strong Sign-in Mechanisms
19 Temporary Credentials – Account Federation
20 Temporary Credentials – Application Federation
21 Temporary Credentials – Machine Identities
22 Store and Use Secrets Securely
23 Identity Provider Centralization
24 Audit and Rotate Credentials
25 User Groups and Attributes

Lesson 5 AWS Authorization
26 Learning objectives
27 AWS Policy Types
28 Access Requirements
29 Permission Policy Elements
30 AWS Policy Evaluation Logic
31 Emergency Access Strategies
32 Permissions Reduction Strategies
33 Permissions Guardrails
34 Access Management Lifecycles
35 Cross-Account Access
36 AWS Organizations Sharing
37 Third-party Sharing

Lesson 6 AWS Network Security
38 Learning objectives
39 Edge Security Services
40 Defense in Depth Example
41 VPC Security
42 Network Encryption Options
43 AWS Network Firewall

Lesson 7 AWS Compute Security
44 Learning objectives
45 EC2 Vulnerability Management
46 Secure Credentials and Secrets
47 Network Connectivity Scenarios
48 Extended Troubleshooting Scenario

Lesson 8 AWS In-Transit Data Protection
49 Learning objectives
50 Three Goals of Data Encryption
51 Network Traffic Encryption Options
52 Cross-region Data Protection
53 AWS Certificate Manager
54 AWS Private Certificate Authority
55 In-transit Encryption Enforcement

Lesson 9 AWS At-Rest Data Protection
56 Learning objectives
57 Data Integrity Strategies
58 At-rest Encryption Examples
59 Symmetric Data Encryption
60 KMS Features
61 KMS Key Types
62 KMS Access Control
63 Other At-rest Encryption Strategies
64 Data Modification Prevention

Lesson 10 AWS Data Lifecycle and Secret Management
65 Learning objectives
66 Data Retention Strategies
67 Data Retention Services and Features
68 KMS Asymmetric Keys
69 Credential and Secret Rotation
70 Secrets Manager Access Control

Lesson 11 AWS Security Monitoring
71 Learning objectives
72 CloudWatch Alarms
73 EventBridge Rules
74 Security Alert Automation
75 Troubleshooting Scenario 1
76 Troubleshooting Scenario 2

Lesson 12 AWS Security Logging
77 Learning objectives
78 AWS Security Log Sources
79 Security Log Delivery, Storage, and Retention
80 Troubleshooting Logging Permissions
81 CloudTrail Troubleshooting Scenario
82 Log Analysis Options

Lesson 13 AWS Resource Governance
83 Learning objectives
84 AWS Organizations
85 AWS Control Tower
86 AWS Control Tower Account Factory
87 AWS Resource Groups
88 AWS Organizations Tag Policies
89 AWS Firewall Manager
90 Resource Access Manager

Lesson 14 AWS Security Compliance
91 Learning objectives
92 AWS Macie
93 AWS Config, CloudWatch Logs, and Security Hub
94 AWS Audit Manager
95 Well-Architected Framework and Tool
96 Cost Analysis and Anomalies

Lesson 15 AWS Incident Response Plan Implementation
97 Learning objectives
98 Incident Response Plan Workflow
99 Incident Response Preparation
100 Security Service Deployment Part 1
101 Security Service Deployment Part 2

Lesson 16 AWS Security Incident Detection
102 Learning objectives
103 Incident Response Detection and Analysis
104 Alert Sources
105 Security Alerting Types
106 Incident Response Containment
107 Source, Access, and Destination Containment
108 Incident Response Eradication
109 Incident Response Recovery
110 Incident Response Post-Incident Activity

Module 1 AWS Security Foundations
111 Module introduction

Module 2 AWS Authentication and Authorization
112 Module introduction

Module 3 AWS Infrastructure Security
113 Module introduction

Module 4 AWS Data Protection
114 Module introduction

Module 5 AWS Security Logging and Monitoring
115 Module introduction

Module 6 AWS Security Governance and Compliance
116 Module introduction

Module 7 Incident Response and Threat Detection
117 Module introduction

Summary
118 AWS Security Essentials Summary

Homepage