AWS Security Essentials Course Outline
Overview
Security On AWS starts with a deep dive into the fundamentals of the shared security responsibility model. You will then learn the basics of how to enable security, auditing, and compliance in AWS with the tools, services, and features it provides.
Moving on, you will learn about access control in AWS for all resources. You will also learn about the security of your network, servers, data and applications in the AWS cloud using native AWS
security services.
By the end of this class, you will understand the complete AWS Security landscape, covering all aspects of end – to -end software and hardware security along with logging, auditing, and compliance of your IT environment in the AWS cloud.
Lastly, the class will wrap up with AWS best practices for security.
What You Will Learn:
-Learn about AWS Identity Management and Access control
-Gain the knowledge needed to create and secure your private network in AWS
-Understand and secure your infrastructure in AWS
-Understand monitoring, logging and auditing in AWS
-Ensure Data Security in AWS
-Explore AWS Security best practices
Course Outline
1: OVERVIEW OF SECURITY IN AWS
● AWS shared security responsibility model
● AWS Security responsibilities
● Customer security responsibilities
● AWS account security features
● AWS Security services
● AWS Security resources
● Summary
2: AWS IDENTITY AND ACCESS MANAGEMENT
● IAM features and tools
● IAM Authentication
● IAM Authorization
● Passwords Policy
● AWS credentials
● IAM limitations
● IAM best practices
● Summary
3: AWS VIRTUAL PRIVATE CLOUD
● VPC components
● VPC features and benefits
● VPC use cases
● VPC security
● Creating VPC
● VPC limits
● VPC best practices
● Summary
4: DATA SECURITY IN AWS
● Encryption and decryption fundamentals
● Securing data at rest
● Securing data in transit
● AWS KMS
● AWS CloudHSM
● Amazon Macie
● Summary
5: SECURING SERVERS IN AWS
● EC2 Security best practices
● EC2 Security
● Amazon Inspector
● AWS Shield
● Summary
6: SECURING APPLICATIONS IN AWS
● AWS Web Application Firewall (WAF)
● Signing AWS API requests
● Amazon Cognito
● Amazon API Gateway
● Summary
7: MONITORING IN AWS
● AWS CloudWatch
● Monitoring Amazon EC2
● Summary
8: LOGGING AND AUDITING IN AWS
● Logging in AWS
● AWS CloudWatch Logs
● AWS CloudTrail
● Auditing in AWS
● AWS Artifact
● AWS Config
● AWS Trusted Advisor
● AWS Service Catalog
● Summary
9: AWS SECURITY BEST PRACTICES
● Shared security responsibility model
● IAM security best practices
● VPC
● Data security
● Security of servers
● Application security
● Monitoring, logging, and auditing
● AWS CAF
● Summary
View outline in Word
ZSEC16