AWS Security Essentials
Focused View
7:14:43
4 View
001. AWS Security Essentials Introduction.mp4
02:34
001. Learning objectives.mp4
00:37
002. 1.1 Compliance Information.mp4
05:01
003. 1.2 Compliance Strategies.mp4
06:17
004. 1.3 Auditing and Reporting.mp4
04:38
005. 1.4 Least Privilege Concepts and Strategies.mp4
04:47
001. Learning objectives.mp4
00:40
002. 2.1 User and Identity Management Basics.mp4
06:17
003. 2.2 AWS Credentials and MFA.mp4
04:22
004. 2.3 AWS Root Account.mp4
05:26
005. 2.4 AWS IAM Users and Groups.mp4
08:48
006. 2.5 AWS IAM Roles and Policies.mp4
03:39
001. Learning objectives.mp4
00:55
002. 3.1 AWS Network Security Capabilities.mp4
05:10
003. 3.2 Security Documentation Types.mp4
03:59
004. 3.3 AWS Trusted Advisor.mp4
04:16
001. Learning objectives.mp4
00:43
002. 4.1 Strong Sign-in Mechanisms.mp4
06:04
003. 4.2 Temporary Credentials - Account Federation.mp4
02:40
004. 4.3 Temporary Credentials - Application Federation.mp4
03:11
005. 4.4 Temporary Credentials - Machine Identities.mp4
02:54
006. 4.5 Store and Use Secrets Securely.mp4
05:21
007. 4.6 Identity Provider Centralization.mp4
01:58
008. 4.7 Audit and Rotate Credentials.mp4
03:23
009. 4.8 User Groups and Attributes.mp4
03:15
001. Learning objectives.mp4
00:45
002. 5.1 AWS Policy Types.mp4
04:37
003. 5.2 Access Requirements.mp4
02:32
004. 5.3 Permission Policy Elements.mp4
11:26
005. 5.4 AWS Policy Evaluation Logic.mp4
09:37
006. 5.5 Emergency Access Strategies.mp4
04:12
007. 5.6 Permissions Reduction Strategies.mp4
07:11
008. 5.7 Permissions Guardrails.mp4
02:57
009. 5.8 Access Management Lifecycles.mp4
03:03
010. 5.9 Cross-Account Access.mp4
02:58
011. 5.10 AWS Organizations Sharing.mp4
08:01
012. 5.11 Third-party Sharing.mp4
02:14
001. Learning objectives.mp4
00:40
002. 6.1 Edge Security Services.mp4
08:55
003. 6.2 Defense in Depth Example.mp4
03:41
004. 6.3 VPC Security.mp4
07:00
005. 6.4 Network Encryption Options.mp4
03:35
006. 6.5 AWS Network Firewall.mp4
05:37
001. Learning objectives.mp4
00:50
002. 7.1 EC2 Vulnerability Management.mp4
04:04
003. 7.2 Secure Credentials and Secrets.mp4
04:04
004. 7.3 Network Connectivity Scenarios.mp4
05:50
005. 7.4 Extended Troubleshooting Scenario.mp4
06:48
001. Learning objectives.mp4
00:43
002. 8.1 Three Goals of Data Encryption.mp4
02:00
003. 8.2 Network Traffic Encryption Options.mp4
02:11
004. 8.3 Cross-region Data Protection.mp4
03:08
005. 8.4 AWS Certificate Manager.mp4
03:27
006. 8.5 AWS Private Certificate Authority.mp4
02:39
007. 8.6 In-transit Encryption Enforcement.mp4
02:51
001. Learning objectives.mp4
00:42
002. 9.1 Data Integrity Strategies.mp4
02:51
003. 9.2 At-rest Encryption Examples.mp4
03:37
004. 9.3 Symmetric Data Encryption.mp4
03:42
005. 9.4 KMS Features.mp4
04:05
006. 9.5 KMS Key Types.mp4
04:29
007. 9.6 KMS Access Control.mp4
04:38
008. 9.7 Other At-rest Encryption Strategies.mp4
04:45
009. 9.8 Data Modification Prevention.mp4
03:40
001. Learning objectives.mp4
00:43
002. 10.1 Data Retention Strategies.mp4
06:06
003. 10.2 Data Retention Services and Features.mp4
05:21
004. 10.3 KMS Asymmetric Keys.mp4
01:44
005. 10.4 Credential and Secret Rotation.mp4
03:00
006. 10.5 Secrets Manager Access Control.mp4
03:07
001. Learning objectives.mp4
00:34
002. 11.1 CloudWatch Alarms.mp4
04:31
003. 11.2 EventBridge Rules.mp4
04:32
004. 11.3 Security Alert Automation.mp4
01:59
005. 11.4 Troubleshooting Scenario 1.mp4
05:32
006. 11.5 Troubleshooting Scenario 2.mp4
04:36
001. Learning objectives.mp4
00:42
002. 12.1 AWS Security Log Sources.mp4
04:48
003. 12.2 Security Log Delivery, Storage, and Retention.mp4
05:45
004. 12.3 Troubleshooting Logging Permissions.mp4
04:18
005. 12.4 CloudTrail Troubleshooting Scenario.mp4
04:53
006. 12.5 Log Analysis Options.mp4
10:22
001. Learning objectives.mp4
00:47
002. 13.1 AWS Organizations.mp4
05:27
003. 13.2 AWS Control Tower.mp4
06:43
004. 13.3 AWS Control Tower Account Factory.mp4
02:07
005. 13.4 AWS Resource Groups.mp4
01:22
006. 13.5 AWS Organizations Tag Policies.mp4
02:57
007. 13.6 AWS Firewall Manager.mp4
02:41
008. 13.7 Resource Access Manager.mp4
03:16
001. Learning objectives.mp4
00:44
002. 14.1 AWS Macie.mp4
02:46
003. 14.2 AWS Config, CloudWatch Logs, and Security Hub.mp4
02:56
004. 14.3 AWS Audit Manager.mp4
02:41
005. 14.4 Well-Architected Framework and Tool.mp4
05:50
006. 14.5 Cost Analysis and Anomalies.mp4
05:44
001. Learning objectives.mp4
00:34
002. 15.1 Incident Response Plan Workflow.mp4
02:59
003. 15.2 Incident Response Preparation.mp4
05:06
004. 15.3 Security Service Deployment Part 1.mp4
10:57
005. 15.4 Security Service Deployment Part 2.mp4
06:17
001. Learning objectives.mp4
00:43
002. 16.1 Incident Response Detection and Analysis.mp4
02:44
003. 16.2 Alert Sources.mp4
05:00
004. 16.3 Security Alerting Types.mp4
02:45
005. 16.4 Incident Response Containment.mp4
02:50
006. 16.5 Source, Access, and Destination Containment.mp4
03:43
007. 16.6 Incident Response Eradication.mp4
04:19
008. 16.7 Incident Response Recovery.mp4
03:10
009. 16.8 Incident Response Post-Incident Activity.mp4
02:18
001. Module introduction.mp4
00:40
001. Module introduction.mp4
00:41
001. Module introduction.mp4
00:38
001. Module introduction.mp4
00:42
001. Module introduction.mp4
00:43
001. Module introduction.mp4
00:43
001. Module introduction.mp4
00:54
001. AWS Security Essentials Summary.mp4
00:43
More details
User Reviews
Rating
average 0
Focused display
Category

LiveLessons
View courses LiveLessonsPearson's video training library is an indispensable learning tool for today's competitive job market. Having essential technology training and certifications can open doors for career advancement and life enrichment. We take learning personally. We've published hundreds of up-to-date videos on wide variety of key topics for Professionals and IT Certification candidates. Now you can learn from renowned industry experts from anywhere in the world, without leaving home.
- language english
- Training sessions 118
- duration 7:14:43
- Release Date 2024/05/19