Companies Home Search Profile

AWS Security Essentials

Focused View

7:14:43

4 View
  • 001. AWS Security Essentials Introduction.mp4
    02:34
  • 001. Learning objectives.mp4
    00:37
  • 002. 1.1 Compliance Information.mp4
    05:01
  • 003. 1.2 Compliance Strategies.mp4
    06:17
  • 004. 1.3 Auditing and Reporting.mp4
    04:38
  • 005. 1.4 Least Privilege Concepts and Strategies.mp4
    04:47
  • 001. Learning objectives.mp4
    00:40
  • 002. 2.1 User and Identity Management Basics.mp4
    06:17
  • 003. 2.2 AWS Credentials and MFA.mp4
    04:22
  • 004. 2.3 AWS Root Account.mp4
    05:26
  • 005. 2.4 AWS IAM Users and Groups.mp4
    08:48
  • 006. 2.5 AWS IAM Roles and Policies.mp4
    03:39
  • 001. Learning objectives.mp4
    00:55
  • 002. 3.1 AWS Network Security Capabilities.mp4
    05:10
  • 003. 3.2 Security Documentation Types.mp4
    03:59
  • 004. 3.3 AWS Trusted Advisor.mp4
    04:16
  • 001. Learning objectives.mp4
    00:43
  • 002. 4.1 Strong Sign-in Mechanisms.mp4
    06:04
  • 003. 4.2 Temporary Credentials - Account Federation.mp4
    02:40
  • 004. 4.3 Temporary Credentials - Application Federation.mp4
    03:11
  • 005. 4.4 Temporary Credentials - Machine Identities.mp4
    02:54
  • 006. 4.5 Store and Use Secrets Securely.mp4
    05:21
  • 007. 4.6 Identity Provider Centralization.mp4
    01:58
  • 008. 4.7 Audit and Rotate Credentials.mp4
    03:23
  • 009. 4.8 User Groups and Attributes.mp4
    03:15
  • 001. Learning objectives.mp4
    00:45
  • 002. 5.1 AWS Policy Types.mp4
    04:37
  • 003. 5.2 Access Requirements.mp4
    02:32
  • 004. 5.3 Permission Policy Elements.mp4
    11:26
  • 005. 5.4 AWS Policy Evaluation Logic.mp4
    09:37
  • 006. 5.5 Emergency Access Strategies.mp4
    04:12
  • 007. 5.6 Permissions Reduction Strategies.mp4
    07:11
  • 008. 5.7 Permissions Guardrails.mp4
    02:57
  • 009. 5.8 Access Management Lifecycles.mp4
    03:03
  • 010. 5.9 Cross-Account Access.mp4
    02:58
  • 011. 5.10 AWS Organizations Sharing.mp4
    08:01
  • 012. 5.11 Third-party Sharing.mp4
    02:14
  • 001. Learning objectives.mp4
    00:40
  • 002. 6.1 Edge Security Services.mp4
    08:55
  • 003. 6.2 Defense in Depth Example.mp4
    03:41
  • 004. 6.3 VPC Security.mp4
    07:00
  • 005. 6.4 Network Encryption Options.mp4
    03:35
  • 006. 6.5 AWS Network Firewall.mp4
    05:37
  • 001. Learning objectives.mp4
    00:50
  • 002. 7.1 EC2 Vulnerability Management.mp4
    04:04
  • 003. 7.2 Secure Credentials and Secrets.mp4
    04:04
  • 004. 7.3 Network Connectivity Scenarios.mp4
    05:50
  • 005. 7.4 Extended Troubleshooting Scenario.mp4
    06:48
  • 001. Learning objectives.mp4
    00:43
  • 002. 8.1 Three Goals of Data Encryption.mp4
    02:00
  • 003. 8.2 Network Traffic Encryption Options.mp4
    02:11
  • 004. 8.3 Cross-region Data Protection.mp4
    03:08
  • 005. 8.4 AWS Certificate Manager.mp4
    03:27
  • 006. 8.5 AWS Private Certificate Authority.mp4
    02:39
  • 007. 8.6 In-transit Encryption Enforcement.mp4
    02:51
  • 001. Learning objectives.mp4
    00:42
  • 002. 9.1 Data Integrity Strategies.mp4
    02:51
  • 003. 9.2 At-rest Encryption Examples.mp4
    03:37
  • 004. 9.3 Symmetric Data Encryption.mp4
    03:42
  • 005. 9.4 KMS Features.mp4
    04:05
  • 006. 9.5 KMS Key Types.mp4
    04:29
  • 007. 9.6 KMS Access Control.mp4
    04:38
  • 008. 9.7 Other At-rest Encryption Strategies.mp4
    04:45
  • 009. 9.8 Data Modification Prevention.mp4
    03:40
  • 001. Learning objectives.mp4
    00:43
  • 002. 10.1 Data Retention Strategies.mp4
    06:06
  • 003. 10.2 Data Retention Services and Features.mp4
    05:21
  • 004. 10.3 KMS Asymmetric Keys.mp4
    01:44
  • 005. 10.4 Credential and Secret Rotation.mp4
    03:00
  • 006. 10.5 Secrets Manager Access Control.mp4
    03:07
  • 001. Learning objectives.mp4
    00:34
  • 002. 11.1 CloudWatch Alarms.mp4
    04:31
  • 003. 11.2 EventBridge Rules.mp4
    04:32
  • 004. 11.3 Security Alert Automation.mp4
    01:59
  • 005. 11.4 Troubleshooting Scenario 1.mp4
    05:32
  • 006. 11.5 Troubleshooting Scenario 2.mp4
    04:36
  • 001. Learning objectives.mp4
    00:42
  • 002. 12.1 AWS Security Log Sources.mp4
    04:48
  • 003. 12.2 Security Log Delivery, Storage, and Retention.mp4
    05:45
  • 004. 12.3 Troubleshooting Logging Permissions.mp4
    04:18
  • 005. 12.4 CloudTrail Troubleshooting Scenario.mp4
    04:53
  • 006. 12.5 Log Analysis Options.mp4
    10:22
  • 001. Learning objectives.mp4
    00:47
  • 002. 13.1 AWS Organizations.mp4
    05:27
  • 003. 13.2 AWS Control Tower.mp4
    06:43
  • 004. 13.3 AWS Control Tower Account Factory.mp4
    02:07
  • 005. 13.4 AWS Resource Groups.mp4
    01:22
  • 006. 13.5 AWS Organizations Tag Policies.mp4
    02:57
  • 007. 13.6 AWS Firewall Manager.mp4
    02:41
  • 008. 13.7 Resource Access Manager.mp4
    03:16
  • 001. Learning objectives.mp4
    00:44
  • 002. 14.1 AWS Macie.mp4
    02:46
  • 003. 14.2 AWS Config, CloudWatch Logs, and Security Hub.mp4
    02:56
  • 004. 14.3 AWS Audit Manager.mp4
    02:41
  • 005. 14.4 Well-Architected Framework and Tool.mp4
    05:50
  • 006. 14.5 Cost Analysis and Anomalies.mp4
    05:44
  • 001. Learning objectives.mp4
    00:34
  • 002. 15.1 Incident Response Plan Workflow.mp4
    02:59
  • 003. 15.2 Incident Response Preparation.mp4
    05:06
  • 004. 15.3 Security Service Deployment Part 1.mp4
    10:57
  • 005. 15.4 Security Service Deployment Part 2.mp4
    06:17
  • 001. Learning objectives.mp4
    00:43
  • 002. 16.1 Incident Response Detection and Analysis.mp4
    02:44
  • 003. 16.2 Alert Sources.mp4
    05:00
  • 004. 16.3 Security Alerting Types.mp4
    02:45
  • 005. 16.4 Incident Response Containment.mp4
    02:50
  • 006. 16.5 Source, Access, and Destination Containment.mp4
    03:43
  • 007. 16.6 Incident Response Eradication.mp4
    04:19
  • 008. 16.7 Incident Response Recovery.mp4
    03:10
  • 009. 16.8 Incident Response Post-Incident Activity.mp4
    02:18
  • 001. Module introduction.mp4
    00:40
  • 001. Module introduction.mp4
    00:41
  • 001. Module introduction.mp4
    00:38
  • 001. Module introduction.mp4
    00:42
  • 001. Module introduction.mp4
    00:43
  • 001. Module introduction.mp4
    00:43
  • 001. Module introduction.mp4
    00:54
  • 001. AWS Security Essentials Summary.mp4
    00:43
  • More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Pearson's video training library is an indispensable learning tool for today's competitive job market. Having essential technology training and certifications can open doors for career advancement and life enrichment. We take learning personally. We've published hundreds of up-to-date videos on wide variety of key topics for Professionals and IT Certification candidates. Now you can learn from renowned industry experts from anywhere in the world, without leaving home.
    • language english
    • Training sessions 118
    • duration 7:14:43
    • Release Date 2024/05/19