Companies Home Search Profile

Complete Guide to AWS Security and Compliance Management

Focused View

Sharif Nijim

11:51:24

0 View
  • 01 - AWS security overview.mp4
    00:51
  • 02 - What you should know.mp4
    02:00
  • 01 - Understanding shared responsibility.mp4
    07:22
  • 02 - Understanding the AWS security landscape.mp4
    01:59
  • 03 - Understanding separation of duties.mp4
    03:50
  • 04 - Implementing separation of duties.mp4
    05:27
  • 05 - Understanding CloudTrail.mp4
    03:47
  • 06 - Enabling CloudTrail.mp4
    06:01
  • 07 - Understanding CloudWatch.mp4
    05:41
  • 08 - Understanding CloudWatch alarms.mp4
    04:11
  • 09 - Configuring Simple Notification Service.mp4
    07:22
  • 10 - Using a CloudWatch alarm.mp4
    07:06
  • 11 - Installing the command line interface (CLI) for Mac.mp4
    05:10
  • 12 - The command line interface (CLI) for Windows.mp4
    05:09
  • 01 - Understanding Identity and Access Management.mp4
    06:28
  • 02 - Understanding IAM policies.mp4
    04:15
  • 03 - Configure IAM policies.mp4
    10:11
  • 04 - Understanding IAM groups.mp4
    01:54
  • 05 - Configure IAM groups.mp4
    04:40
  • 06 - Configuring a password policy.mp4
    04:07
  • 07 - Configure IAM users Web console.mp4
    07:49
  • 08 - Configure IAM users CLI.mp4
    03:14
  • 09 - IAM challenge.mp4
    01:00
  • 10 - IAM challenge solution.mp4
    03:36
  • 11 - Configuring IAM roles.mp4
    03:13
  • 12 - Configuring IAM roles.mp4
    03:02
  • 13 - Validating an IAM role.mp4
    03:45
  • 14 - Extending CloudWatch.mp4
    03:43
  • 15 - Install CloudWatch agent.mp4
    07:23
  • 16 - Challenge IAM roles.mp4
    00:54
  • 17 - Solution IAM roles.mp4
    04:11
  • 18 - Understanding Security Token Service.mp4
    01:58
  • 19 - Creating a temporary access role.mp4
    03:46
  • 20 - Creating a temporary access policy.mp4
    04:54
  • 21 - Validating temporary access.mp4
    03:46
  • 22 - Challenge Super admin.mp4
    00:42
  • 23 - Solution Super admin.mp4
    04:20
  • 24 - Illustrating access restrictions.mp4
    02:02
  • 25 - Exploring IAM policy simulator.mp4
    07:31
  • 26 - Understanding Cognito.mp4
    04:02
  • 27 - Creating a Cognito user pool.mp4
    10:28
  • 28 - Creating a Cognito identity pool.mp4
    05:31
  • 29 - Understanding Verified Permissions.mp4
    03:53
  • 30 - Understanding federated access.mp4
    02:37
  • 31 - Enabling federated access.mp4
    05:08
  • 32 - Validating federated access.mp4
    03:36
  • 33 - Securing financial access.mp4
    03:37
  • 34 - Enabling financial access.mp4
    03:40
  • 01 - Understanding Organizations.mp4
    02:22
  • 02 - Understanding Control Tower.mp4
    02:45
  • 03 - Understanding IAM Identity Center.mp4
    03:55
  • 04 - Exploring IAM Identity Center.mp4
    08:11
  • 05 - Validating IAM Identity Center.mp4
    03:04
  • 06 - Understanding Resource Access Manager.mp4
    02:43
  • 07 - Exploring Resource Access Manager.mp4
    06:47
  • 01 - Understanding AWS Config.mp4
    04:54
  • 02 - Enabling AWS Config.mp4
    04:16
  • 03 - Exploring AWS Config results.mp4
    06:31
  • 04 - Exploring conformance packs.mp4
    03:35
  • 05 - Understanding AWS GuardDuty.mp4
    04:35
  • 06 - Exploring AWS GuardDuty.mp4
    03:37
  • 07 - Understand IAM Access Analyzer.mp4
    02:59
  • 08 - Exploring IAM Access Analyzer results.mp4
    04:47
  • 09 - Understanding Amazon Detective.mp4
    02:00
  • 10 - Exploring Amazon Detective.mp4
    05:26
  • 11 - Understanding Amazon Inspector.mp4
    03:05
  • 12 - Exploring Amazon Inspector.mp4
    03:48
  • 13 - Resolving an Inspector finding.mp4
    04:16
  • 14 - Understanding Amazon Security Lake.mp4
    02:14
  • 15 - Understanding IoT Device Defender.mp4
    10:41
  • 16 - Understanding AWS Elastic Disaster Recovery.mp4
    03:08
  • 17 - Configuring Elastic Disaster Recovery.mp4
    05:20
  • 18 - Configuring a source server.mp4
    05:28
  • 19 - Exploring AWS Elastic Disaster Recovery.mp4
    09:19
  • 20 - Removing a source server.mp4
    01:24
  • 01 - Understand Web Application Firewall.mp4
    04:33
  • 02 - Exploring Web Application Firewall.mp4
    03:29
  • 03 - Configuring Web Application Firewall.mp4
    06:30
  • 04 - Validating Web Application Firewall.mp4
    03:54
  • 05 - Understand AWS Shield.mp4
    05:15
  • 06 - Understanding AWS Firewall Manager.mp4
    03:16
  • 07 - Understanding AWS Network Firewall.mp4
    04:31
  • 08 - Understand AWS Verified Access.mp4
    04:21
  • 09 - Understanding DNS Firewall.mp4
    02:00
  • 10 - Configuring DNS Firewall.mp4
    06:11
  • 01 - Understanding Amazon Macie.mp4
    03:11
  • 02 - Configuring a Macie job.mp4
    09:25
  • 03 - Exploring Macie results.mp4
    02:53
  • 04 - Understanding Key Management Service.mp4
    03:41
  • 05 - Creating a KMS key.mp4
    05:08
  • 06 - Creating a multi-region KMS key.mp4
    04:14
  • 07 - Using a KMS in S3.mp4
    05:43
  • 08 - Using KMS and an IAM role.mp4
    07:31
  • 09 - Automating KMS key rotation.mp4
    04:21
  • 10 - Deleting a KMS key.mp4
    06:10
  • 11 - Enabling EBS default encryption.mp4
    08:11
  • 12 - Understanding Secrets Manager.mp4
    02:14
  • 13 - Using Secrets Manager.mp4
    05:18
  • 14 - Enabling autorotation with Secrets Manager.mp4
    07:58
  • 15 - Creating a multi-region secret.mp4
    04:10
  • 16 - Deleting a Secrets Manager secret.mp4
    05:59
  • 17 - Understanding AWS CloudHSM.mp4
    02:38
  • 18 - Understanding Systems Manager.mp4
    03:44
  • 19 - Implementing Systems Manager.mp4
    03:52
  • 20 - Resolving compliance with Systems Manager.mp4
    05:16
  • 21 - Creating Resource Groups.mp4
    03:09
  • 22 - Patching with Systems Manager.mp4
    03:46
  • 23 - Understanding Incident Manager.mp4
    02:38
  • 24 - Using Parameter Store.mp4
    04:02
  • 25 - Understand Certificate Manager.mp4
    04:00
  • 26 - Creating a private certificate authority.mp4
    04:52
  • 27 - Creating a private certificate.mp4
    02:40
  • 28 - Using a private certificate.mp4
    06:43
  • 29 - Understanding Payment Cryptography.mp4
    04:51
  • 30 - Challenge KMS.mp4
    01:28
  • 31 - Solution KMS.mp4
    05:34
  • 01 - Exploring S3 management options.mp4
    05:06
  • 02 - Accessing S3 privately.mp4
    03:15
  • 03 - Configuring private S3 access.mp4
    06:13
  • 04 - Managing S3 with IAM.mp4
    03:00
  • 05 - Restricting S3 access with IAM.mp4
    11:27
  • 06 - Validating custom IAM S3 policy.mp4
    04:09
  • 07 - Leveraging S3 IAM policies in EC2.mp4
    05:57
  • 08 - Creating an S3 bucket policy.mp4
    08:05
  • 09 - Illustrating S3 bucket policies with CLI.mp4
    04:29
  • 10 - Understanding S3 access control lists.mp4
    05:16
  • 11 - Understanding public access in S3.mp4
    07:11
  • 12 - S3 public access best practices.mp4
    04:19
  • 13 - Exploring pre-signed URLs.mp4
    10:16
  • 14 - Understanding S3 Access Grants.mp4
    04:37
  • 15 - Understanding S3 Access Points.mp4
    05:28
  • 16 - Exploring S3 Access Points.mp4
    09:32
  • 17 - Understanding data protection schemes.mp4
    07:30
  • 18 - S3 security and compliance best practices.mp4
    04:44
  • 19 - Challenge S3 replication challenge.mp4
    01:52
  • 20 - Solution S3 replication challenge.mp4
    10:36
  • 21 - Challenge S3 lifecycle challenge.mp4
    00:56
  • 22 - Solution S3 lifecycle challenge.mp4
    04:32
  • 01 - Understanding AWS Security Hub.mp4
    03:05
  • 02 - Using AWS Security Hub.mp4
    05:57
  • 03 - Rotating access keys.mp4
    08:06
  • 04 - Understand AWS Artifact.mp4
    06:41
  • 05 - Understanding Trusted Advisor.mp4
    08:29
  • 06 - Exploring Trusted Advisor.mp4
    07:49
  • 07 - Understanding Audit Manager.mp4
    03:53
  • 08 - Exploring Audit Manager.mp4
    09:26
  • 09 - Prepare for a security audit.mp4
    05:08
  • 01 - Next steps.mp4
    02:58
  • Description


    Understanding—and successfully implementing—security concepts is essential to using AWS as your enterprise solution. In this course, instructor Sharif Nijim couples pragmatic advice with practical examples that educate IT pros on how to create a secure infrastructure within Amazon Web Services. Explore the shared responsibility model of security, which splits duties between your company and AWS. Deep dive into key identity and access management concepts, including users, groups, roles, and policies. Find out how to create a secure infrastructure within AWS. Plus, complete several hands-on challenges that enable you to work independently and develop solutions on topics including IAM roles, KMS, S3, and data breaches.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Sharif Nijim
    Sharif Nijim
    Instructor's Courses
    Passionately committed to creating an exceptional, applicable educational experience for our students. Areas of expertise include IT, cloud computing, and analytics.
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 148
    • duration 11:51:24
    • English subtitles has
    • Release Date 2024/12/06

    Courses related to Amazon AWS