Companies Home Search Profile

Introduction to AWS Security

Focused View

Cybr Training,Christophe Limpalair

3:36:48

59 View
  • 1. About the course and authors.mp4
    04:26
  • 2. Please read before getting started!.html
  • 3.1 Access the interactive diagram for this lesson here. (It may ask you to create a free account in order to view. You do not need paid features to view this course’s content so you can ignore that!).html
  • 3. AWS cloud architecture.mp4
    03:35
  • 4.1 Access the interactive diagram for this lesson here. (It may ask you to create a free account in order to view. You do not need paid features to view this course’s content so you can ignore that!).html
  • 4. Security concerns with our architecture.mp4
    06:55
  • 5.1 Access the interactive diagram for this lesson here. (It may ask you to create a free account in order to view. You do not need paid features to view this course’s content so you can ignore that!).html
  • 5. Regions and Availability Zones (AZs).mp4
    03:35
  • 6.1 Access the interactive diagram for this lesson here. (It may ask you to create a free account in order to view. You do not need paid features to view this course’s content so you can ignore that!).html
  • 6. Shared responsibility in the cloud.mp4
    04:23
  • 7. [LAB] Create a billing alert to avoid surprise bills.html
  • 1. VPC Networks.mp4
    03:13
  • 2. Default VPCs.mp4
    07:11
  • 3. [DEMO] Creating VPCs and Subnets.mp4
    10:31
  • 4. How many VPCs should you use.mp4
    01:33
  • 5. [DEMO] Subnet, Route Table, and Gateway Configurations.mp4
    09:39
  • 6. [LAB] [Challenge] Create a VPC with public and private subnets.html
  • 7.1 Interactive Diagram for this lesson. (It may ask you to create a free account in order to view. You do not need paid features to view this course’s content so you can ignore that!).html
  • 7. [DEMO] Security Groups.mp4
    07:17
  • 8. Security Groups Best Practices.mp4
    04:45
  • 9.1 Interactive Diagram for this lesson. (It may ask you to create a free account in order to view. You do not need paid features to view this course’s content so you can ignore that!).html
  • 9. [DEMO] Network Access Control Lists (NACLs).mp4
    09:01
  • 10. [LAB] [Challenge] Configure security groups and NACLs to specific requirements.html
  • 11.1 Interactive Diagram for this lesson. (It may ask you to create a free account in order to view. You do not need paid features to view this course’s content so you can ignore that!).html
  • 11. Elastic Load Balancers.mp4
    03:37
  • 12. [DEMO] AWS WAF.mp4
    10:38
  • 13. [DEMO] AWS Network Firewall - Part 1.mp4
    05:50
  • 14. [DEMO] AWS Network Firewall - Part 2.mp4
    09:17
  • 15. DDoS Protection - AWS Shield.mp4
    03:55
  • 16. AWS Firewall Manager.mp4
    02:58
  • 1. Key Concepts of IAM in AWS.mp4
    05:05
  • 2. [DEMO] IAM in AWS - Getting Started.mp4
    06:06
  • 3. [DEMO] Creating our first admin user.mp4
    07:03
  • 4. Assigning Permissions - IAM Access Policies and Policy Conditions.mp4
    08:49
  • 5. IAM Roles.mp4
    05:29
  • 6. [DEMO] Creating a role for EC2 instances to access S3 Buckets.mp4
    05:50
  • 7. End user management - Amazon Cognito.mp4
    05:09
  • 1. Data protection in the cloud.mp4
    03:40
  • 2. EBS Data Protection and Encryption.mp4
    02:56
  • 3. Amazon RDS Data Protection and Encryption.mp4
    04:01
  • 4. Key Management with AWS KMS.mp4
    07:32
  • 5. [DEMO] Creating a symmetric encryption KMS Key.mp4
    08:38
  • 1. Understanding bucket ownership.mp4
    03:07
  • 2. Managing access to buckets.mp4
    03:10
  • 3. [Cheat Sheet] S3 Bucket Policies vs. ACLs vs. IAM Policies.html
  • 4. [LAB] [Challenge] Create an IAM role for secure access to S3 based on a scenario.html
  • 5. Using signed URLs.mp4
    01:38
  • 6. Encrypting S3 Data.mp4
    03:47
  • 7. [DEMO] Enable S3 Object Versioning.mp4
    04:22
  • 1. AWS log types and auditing options.mp4
    04:18
  • 2. [DEMO] Enable S3 server access logs.mp4
    03:50
  • 3. AWS CloudTrail.mp4
    05:27
  • 4. Amazon CloudWatch.mp4
    01:53
  • 5. Proper logging and monitoring.mp4
    02:39
  • 1. What now.html
  • Description


    Learn the fundamentals of AWS security including Infrastructure Security, IAM, Data Protection, and Logging & Monitoring

    What You'll Learn?


    • How to identify and address security concerns based on your AWS cloud architecture
    • What you are responsible for securing versus what AWS is responsible for (Shared Responsibility)
    • How to secure AWS infrastructure including VPC networks, access control (Security Groups, NACLs, etc...), and configuring important security services
    • How to secure AWS data and services with proper Identity and Access Management (IAM) including users, roles, groups, policies, and end user management
    • How to protect Cloud Data with access management, encryption at rest, and encryption keys management
    • How to secure and protect your Amazon S3 buckets and objects by understanding bucket/object ownership, how to manage access, how to encrypt data, and more
    • How to properly monitor, log, and alert in AWS, including using AWS CloudTrail and CloudWatch

    Who is this for?


  • Cloud Security Engineers
  • DevOps/DevSecOps Engineers
  • AWS enthusiasts
  • Developers building on AWS
  • Cloud Architects
  • IT Managers
  • What You Need to Know?


  • Basic knowledge of what the AWS cloud is (we don't recommend this being your very first AWS course)
  • No programming experience required
  • No prior cybersecurity required
  • More details


    Description

    Learn how to secure your AWS cloud infrastructure with our comprehensive Introduction to AWS Security course. Designed for beginners or those looking to stay up-to-date with AWS security, this training course provides you with the essential knowledge and skills to protect your AWS environments and resources from all sorts of threats.

    Led by industry experts with extensive experience in AWS security, this course offers a deep dive into the fundamental concepts and best practices for securing cloud infrastructure in Amazon Web Services. You'll gain a solid understanding of Identity and Access Management (IAM), data access control and encryption (including securing Amazon S3), network and infrastructure security, as well as monitoring & logging.

    Our interactive learning approach combines comprehensive lessons, interactive diagrams, and hands-on lab exercises as well as challenges to help you both grasp security concepts and know how to apply them in real-world scenarios. You'll have the opportunity to reinforce your learning and gain hands-on experience configuring security measures directly in the AWS Management Console.

    Enroll in our Introduction to AWS Security course today and gain the knowledge and confidence to start protecting your AWS environment effectively!


    --------------------------------


    What makes this course different

    Production quality: We've been developing cloud and security training material for over 7 years and have taught hundreds of thousands of IT professionals all the way from individuals to Fortune 500 companies. Our production quality is top-notch and not only reflects expert experience but focuses on building practical skills with interactive diagrams, realistic lab scenarios, and other interactive elements.

    Interactive Diagrams: Concepts can be really boring to learn, especially when it's just someone reading slides. That's not what you get from this course. We've developed interactive diagrams that you can interact with as you're learning. That way, as we're discussing concepts or as we're deploying resources in the AWS cloud, you can visualize exactly what's going on side-by-side.

    Scenario-based: From the very beginning of the course, we set up a realistic and sample AWS multi-tier architecture, which we then evaluate from a security perspective to understand potential attack vectors. The rest of the course centers around this architecture and those security concerns so that we can learn how to properly defend our AWS resources, just as we would on the job as cloud security professionals.

    Hands-On and Lab-based: Every practical step we take in the course can be completed in your very own AWS account, and we will be adding actual lab scenarios for you to complete. Most if not all of them can be done for free using the AWS free tier. We inform you beforehand if there are any resources that will cost money so you can decide whether you want to complete those labs/steps or not.


    --------------------------------

    FAQ

    "Is this course practical or just conceptual?"

    This course includes both practical and conceptual. Because it's an introductory-level course, you need to learn important concepts before jumping in and doing, but we're firm believers in practical learning and we include both demos that walk you through-by-step and Lab Challenges where you complete realistic scenarios you could expect to see on the job.

    "Do I need to have AWS experience before enrolling"

    Short answer: Yes. Longer answer: This is a course designed for beginners, but if you've never logged into AWS before, you won't be able to follow what's going on unless you have prior IT experience and/or experience with Azure/GCP.

    "Do I need prior cybersecurity experience before enrolling?"

    While that would be helpful, it's not required. For example, if you are a developer using AWS to ship applications, you will get a lot of value from this course even though you are not a cybersec expert.


    --------------------------------


    About the authors

    This course was created, developed, and published in collaboration between Konstantinos Papapanagiotou and Christophe Limpalair.

    Kostas is a Cyber Security Consultant with over 19 years of security and IT consulting and research experience. He’s also been a volunteer for the OWASP nonprofit organization for over 17 years and is an OWASP Chapter Leader in Greece.

    Christophe is the founder and an author at Cybr, where he’s published many courses on topics of ethical hacking. You may also know him from Linux Academy / ACloudGuru, where he taught multiple AWS courses including associate and professional-level AWS certification courses, and helped tens of thousands of learners get certified. He also helped pioneer, develop, maintain, and secure Linux Academy’s cloud Hands-On Labs and Assessments technology which ran on a $1M budget on AWS and which required defense against malicious actors frequently trying to crypto mine and to launch attacks using our resources.

    Between Kostas and Christophe, the authors have years of experience working in AWS and building as well as securing production environments. They share that experience in this course to help you get started learning how to secure AWS resources and environments.

    Who this course is for:

    • Cloud Security Engineers
    • DevOps/DevSecOps Engineers
    • AWS enthusiasts
    • Developers building on AWS
    • Cloud Architects
    • IT Managers

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Cybr Training
    Cybr Training
    Instructor's Courses
    We are an online community and training platform, and we're here to help you build your cybersecurity career.Cybr was founded in 2020 by veterans of the IT and training industries who have helped individuals learn new skills and get certified, and businesses deploy training initiatives across their organization.We believe that the world can be a safer place through training and community, and we intend to carry out that mission one person at a time! Join us on this mission and build your cybersecurity career regardless of your current skill level.
    Christophe Limpalair
    Christophe Limpalair
    Instructor's Courses
    After writing his first lines of code at the age of 11, Christophe developed a passion for technology. Frustrated with the state & cost of education, he spent the last few years training individuals and organizations (SMB & F500) on how to use the cloud by pioneering hands-on training technologies. After his journey of building two successful IT businesses to acquisition in the last six years, he realized that most struggle with building secure software, so he co-founded Cybr to help make the world a more secure place through community and training.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 41
    • duration 3:36:48
    • English subtitles has
    • Release Date 2023/08/15

    Courses related to Amazon AWS

    Courses related to Cyber Security

    Subtitle
    Cyber security Phishing analysis from Scratch
    Subtitle
    Certified Cybercop - Blue Team Part - 2
    Udemy Secbay Inc.
    Secbay Inc.
    Certified Cybercop - Blue Team Part - 2
    2:42:56
    English subtitles
    02/01/2023

    Courses related to Network Security