Companies Home Search Profile

AWS: Security and Compliance

Focused View

Sharif Nijim

6:37:55

76 View
  • 01-AWS security overview.mp4
    01:41
  • 02-What you should know.mp4
    01:16
  • 01-Understanding shared responsibility.mp4
    07:22
  • 02-Understanding the AWS security landscape.mp4
    01:59
  • 03-Understanding separation of duties.mp4
    03:50
  • 04-Implementing separation of duties.mp4
    05:27
  • 05-Understanding CloudTrail.mp4
    03:47
  • 06-Enabling CloudTrail.mp4
    06:01
  • 07-Understanding Organizations.mp4
    02:22
  • 08-Installing the command line interface CLI for Mac.mp4
    05:10
  • 09-The command line interface CLI for Windows.mp4
    05:09
  • 01-Understanding Identity and Access Management.mp4
    06:28
  • 02-Understanding IAM policies.mp4
    04:15
  • 03-Configuring IAM policies.mp4
    08:19
  • 04-Understanding IAM groups.mp4
    01:54
  • 05-Configuring IAM groups.mp4
    03:24
  • 06-Configuring a password policy.mp4
    03:10
  • 07-Configuring IAM users Web console.mp4
    07:38
  • 08-Challenge IAM.mp4
    00:59
  • 09-Solution IAM.mp4
    04:04
  • 10-Understanding IAM roles.mp4
    01:54
  • 11-Configuring IAM roles.mp4
    03:13
  • 12-Validating an IAM role.mp4
    03:41
  • 13-Understanding Security Token Service.mp4
    01:58
  • 14-Creating a temporary access role.mp4
    03:41
  • 15-Creating a temporary access policy.mp4
    03:44
  • 16-Validating temporary access.mp4
    03:20
  • 17-Challenge Super admin.mp4
    00:42
  • 18-Solution Super admin.mp4
    04:06
  • 19-Illustrating access restrictions.mp4
    02:00
  • 20-Exploring IAM policy simulator.mp4
    07:07
  • 21-Understanding federated access.mp4
    02:37
  • 22-Enabling federated access.mp4
    06:32
  • 23-Securing financial access.mp4
    03:11
  • 24-Enabling financial access.mp4
    03:40
  • 25-Understanding Control Tower.mp4
    02:45
  • 01-Exploring S3 management options.mp4
    03:17
  • 02-Accessing S3 privately.mp4
    03:15
  • 03-Configuring private S3 access.mp4
    05:08
  • 04-Managing S3 with IAM.mp4
    03:00
  • 05-Restricting S3 access with IAM.mp4
    09:20
  • 06-Validating custom IAM S3 policy.mp4
    02:54
  • 07-Leveraging a custom IAM S3 policy.mp4
    04:17
  • 08-Creating an S3 bucket policy.mp4
    06:13
  • 09-Illustrating an S3 bucket policy with the CLI.mp4
    02:54
  • 10-Understanding S3 access control lists.mp4
    04:30
  • 11-Understanding public access in S3.mp4
    06:11
  • 12-Exploring presigned URLs.mp4
    07:18
  • 13-Reviewing S3 security.mp4
    02:08
  • 01-Understanding Key Management Service.mp4
    03:41
  • 02-Creating a KMS key.mp4
    04:19
  • 03-Creating a multi-Region KMS key.mp4
    03:47
  • 04-Using a KMS with S3 objects.mp4
    03:54
  • 05-Using KMS and an IAM role.mp4
    05:26
  • 06-Automating KMS key rotation.mp4
    03:48
  • 07-Deleting a KMS key.mp4
    05:13
  • 08-Enabling default EBS encryption.mp4
    05:59
  • 09-Understanding Secrets Manager.mp4
    02:14
  • 10-Using Secrets Manager.mp4
    04:17
  • 11-Enabling autorotation with Secrets Manager.mp4
    06:16
  • 12-Creating a multi-Region secret.mp4
    03:21
  • 13-Understanding Systems Manager.mp4
    03:44
  • 14-Using Systems Manager Parameter Store.mp4
    03:23
  • 15-Understanding AWS CloudHSM.mp4
    02:38
  • 01-Understanding AWS Config.mp4
    04:54
  • 02-Enabling AWS Config.mp4
    03:38
  • 03-Exploring AWS Config results.mp4
    04:35
  • 04-Using conformance packs.mp4
    03:15
  • 05-Understanding AWS GuardDuty.mp4
    04:12
  • 06-Exploring AWS GuardDuty.mp4
    02:33
  • 07-Understanding Amazon Macie.mp4
    03:11
  • 08-Configuring a Macie job.mp4
    06:18
  • 09-Exploring Macie results.mp4
    02:19
  • 10-Understanding IAM Access Analyzer.mp4
    03:43
  • 11-Understanding Amazon Detective.mp4
    01:55
  • 12-Exploring Amazon Detective.mp4
    08:45
  • 13-Understanding Amazon Inspector.mp4
    03:05
  • 14-Exploring Amazon Inspector.mp4
    04:15
  • 15-Resolving an Inspector finding.mp4
    02:37
  • 01-Understanding Web Application Firewall.mp4
    03:30
  • 02-Exploring Web Application Firewall.mp4
    03:12
  • 03-Configuring Web Application Firewall.mp4
    04:51
  • 04-Validating Web Application Firewall.mp4
    02:44
  • 05-Understanding AWS Shield.mp4
    04:13
  • 06-Understanding Certificate Manager.mp4
    02:26
  • 07-Configuring a private certificate authority.mp4
    04:09
  • 08-Creating a private certificate.mp4
    02:00
  • 09-Using a private certificate.mp4
    05:30
  • 01-Understanding AWS Security Hub.mp4
    03:05
  • 02-Using AWS Security Hub.mp4
    06:23
  • 03-Rotating access keys.mp4
    07:40
  • 04-Understanding AWS Artifact.mp4
    05:52
  • 05-Understanding Trusted Advisor.mp4
    06:15
  • 06-Exploring Trusted Advisor.mp4
    08:21
  • 07-Preparing for a security audit.mp4
    05:29
  • 01-Next steps.mp4
    02:09
  • Description


    Understanding—and successfully implementing—security concepts is essential to using Amazon Web Services (AWS) as your enterprise solution. In this course, instructor Sharif Nijim couples pragmatic advice with practical examples that show IT pros how to create a secure infrastructure within AWS. Sharif explores the shared responsibility model of security, which splits duties between your company and AWS, and introduces key Identity and Access Management (IAM) concepts, including users, groups, roles, and policies. Discover how to manage access to Simple Storage Service (S3); implement detective controls within AWS, including how to work with AWS Config and GuardDuty; use protective tools such as AWS Shield; and use AWS Key Management Service (KMS) to manage access keys. Plus, learn how to prepare for the inevitable audit of your AWS account(s).

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Sharif Nijim
    Sharif Nijim
    Instructor's Courses
    Passionately committed to creating an exceptional, applicable educational experience for our students. Areas of expertise include IT, cloud computing, and analytics.
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 96
    • duration 6:37:55
    • Release Date 2022/12/28