Tags
Language
Tags
June 2025
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 1 2 3 4 5
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Introduction To Aws Security

    Posted By: ELK1nG
    Introduction To Aws Security

    Introduction To Aws Security
    Published 7/2023
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English | Size: 2.57 GB | Duration: 3h 46m

    Learn the fundamentals of AWS security including Infrastructure Security, IAM, Data Protection, and Logging & Monitoring

    What you'll learn

    How to identify and address security concerns based on your AWS cloud architecture

    What you are responsible for securing versus what AWS is responsible for (Shared Responsibility)

    How to secure AWS infrastructure including VPC networks, access control (Security Groups, NACLs, etc…), and configuring important security services

    How to secure AWS data and services with proper Identity and Access Management (IAM) including users, roles, groups, policies, and end user management

    How to protect Cloud Data with access management, encryption at rest, and encryption keys management

    How to secure and protect your Amazon S3 buckets and objects by understanding bucket/object ownership, how to manage access, how to encrypt data, and more

    How to properly monitor, log, and alert in AWS, including using AWS CloudTrail and CloudWatch

    Requirements

    Basic knowledge of what the AWS cloud is (we don't recommend this being your very first AWS course)

    No programming experience required

    No prior cybersecurity required

    Description

    Learn how to secure your AWS cloud infrastructure with our comprehensive Introduction to AWS Security course. Designed for beginners or those looking to stay up-to-date with AWS security, this training course provides you with the essential knowledge and skills to protect your AWS environments and resources from all sorts of threats.Led by industry experts with extensive experience in AWS security, this course offers a deep dive into the fundamental concepts and best practices for securing cloud infrastructure in Amazon Web Services. You'll gain a solid understanding of Identity and Access Management (IAM), data access control and encryption (including securing Amazon S3), network and infrastructure security, as well as monitoring & logging.Our interactive learning approach combines comprehensive lessons, interactive diagrams, and hands-on lab exercises as well as challenges to help you both grasp security concepts and know how to apply them in real-world scenarios. You'll have the opportunity to reinforce your learning and gain hands-on experience configuring security measures directly in the AWS Management Console.Enroll in our Introduction to AWS Security course today and gain the knowledge and confidence to start protecting your AWS environment effectively!––––––––––––––––What makes this course differentProduction quality: We've been developing cloud and security training material for over 7 years and have taught hundreds of thousands of IT professionals all the way from individuals to Fortune 500 companies. Our production quality is top-notch and not only reflects expert experience but focuses on building practical skills with interactive diagrams, realistic lab scenarios, and other interactive elements.Interactive Diagrams: Concepts can be really boring to learn, especially when it's just someone reading slides. That's not what you get from this course. We've developed interactive diagrams that you can interact with as you're learning. That way, as we're discussing concepts or as we're deploying resources in the AWS cloud, you can visualize exactly what's going on side-by-side.Scenario-based: From the very beginning of the course, we set up a realistic and sample AWS multi-tier architecture, which we then evaluate from a security perspective to understand potential attack vectors. The rest of the course centers around this architecture and those security concerns so that we can learn how to properly defend our AWS resources, just as we would on the job as cloud security professionals.Hands-On and Lab-based: Every practical step we take in the course can be completed in your very own AWS account, and we will be adding actual lab scenarios for you to complete. Most if not all of them can be done for free using the AWS free tier. We inform you beforehand if there are any resources that will cost money so you can decide whether you want to complete those labs/steps or not.––––––––––––––––FAQ"Is this course practical or just conceptual?"This course includes both practical and conceptual. Because it's an introductory-level course, you need to learn important concepts before jumping in and doing, but we're firm believers in practical learning and we include both demos that walk you through-by-step and Lab Challenges where you complete realistic scenarios you could expect to see on the job."Do I need to have AWS experience before enrolling"Short answer: Yes. Longer answer: This is a course designed for beginners, but if you've never logged into AWS before, you won't be able to follow what's going on unless you have prior IT experience and/or experience with Azure/GCP."Do I need prior cybersecurity experience before enrolling?"While that would be helpful, it's not required. For example, if you are a developer using AWS to ship applications, you will get a lot of value from this course even though you are not a cybersec expert.––––––––––––––––About the authorsThis course was created, developed, and published in collaboration between Konstantinos Papapanagiotou and Christophe Limpalair.Kostas is a Cyber Security Consultant with over 19 years of security and IT consulting and research experience. He’s also been a volunteer for the OWASP nonprofit organization for over 17 years and is an OWASP Chapter Leader in Greece.Christophe is the founder and an author at Cybr, where he’s published many courses on topics of ethical hacking. You may also know him from Linux Academy / ACloudGuru, where he taught multiple AWS courses including associate and professional-level AWS certification courses, and helped tens of thousands of learners get certified. He also helped pioneer, develop, maintain, and secure Linux Academy’s cloud Hands-On Labs and Assessments technology which ran on a $1M budget on AWS and which required defense against malicious actors frequently trying to crypto mine and to launch attacks using our resources.Between Kostas and Christophe, the authors have years of experience working in AWS and building as well as securing production environments. They share that experience in this course to help you get started learning how to secure AWS resources and environments.

    Overview

    Section 1: Introduction

    Lecture 1 About the course and authors

    Lecture 2 Please read before getting started!

    Lecture 3 AWS cloud architecture

    Lecture 4 Security concerns with our architecture

    Lecture 5 Regions and Availability Zones (AZs)

    Lecture 6 Shared responsibility in the cloud

    Lecture 7 [LAB] Create a billing alert to avoid surprise bills

    Section 2: Infrastructure Security

    Lecture 8 VPC Networks

    Lecture 9 Default VPCs

    Lecture 10 [DEMO] Creating VPCs and Subnets

    Lecture 11 How many VPCs should you use?

    Lecture 12 [DEMO] Subnet, Route Table, and Gateway Configurations

    Lecture 13 [LAB] [Challenge] Create a VPC with public and private subnets

    Lecture 14 [DEMO] Security Groups

    Lecture 15 Security Groups Best Practices

    Lecture 16 [DEMO] Network Access Control Lists (NACLs)

    Lecture 17 [LAB] [Challenge] Configure security groups and NACLs to specific requirements

    Lecture 18 Elastic Load Balancers

    Lecture 19 [DEMO] AWS WAF

    Lecture 20 [DEMO] AWS Network Firewall - Part 1

    Lecture 21 [DEMO] AWS Network Firewall - Part 2

    Lecture 22 DDoS Protection - AWS Shield

    Lecture 23 AWS Firewall Manager

    Section 3: Identity and Access Management

    Lecture 24 Key Concepts of IAM in AWS

    Lecture 25 [DEMO] IAM in AWS - Getting Started

    Lecture 26 [DEMO] Creating our first admin user

    Lecture 27 Assigning Permissions - IAM Access Policies and Policy Conditions

    Lecture 28 IAM Roles

    Lecture 29 [DEMO] Creating a role for EC2 instances to access S3 Buckets

    Lecture 30 End user management - Amazon Cognito

    Section 4: Data Protection

    Lecture 31 Data protection in the cloud

    Lecture 32 EBS Data Protection and Encryption

    Lecture 33 Amazon RDS Data Protection and Encryption

    Lecture 34 Key Management with AWS KMS

    Lecture 35 [DEMO] Creating a symmetric encryption KMS Key

    Section 5: Amazon S3 Bucket Protection

    Lecture 36 Understanding bucket ownership

    Lecture 37 Managing access to buckets

    Lecture 38 [Cheat Sheet] S3 Bucket Policies vs. ACLs vs. IAM Policies

    Lecture 39 [LAB] [Challenge] Create an IAM role for secure access to S3 based on a scenario

    Lecture 40 Using signed URLs

    Lecture 41 Encrypting S3 Data

    Lecture 42 [DEMO] Enable S3 Object Versioning

    Section 6: Logging and Monitoring

    Lecture 43 AWS log types and auditing options

    Lecture 44 [DEMO] Enable S3 server access logs

    Lecture 45 AWS CloudTrail

    Lecture 46 Amazon CloudWatch

    Lecture 47 Proper logging and monitoring

    Section 7: Wrap-up and Key Takeaways

    Lecture 48 What now?

    Cloud Security Engineers,DevOps/DevSecOps Engineers,AWS enthusiasts,Developers building on AWS,Cloud Architects,IT Managers