Author
Released
6/25/2020Skill Level Intermediate
Duration
Views
- [Sharif] Hi, I'm Sharif Nijim, and I'd like to welcome you to our course on Enterprise Security in Amazon Web Services. Amazon Web Services, or AWS, is the acknowledged global leader in cloud computing. Startups are running in the cloud from the get-go, while established companies are migrating away from running their own data centers to operating their infrastructure using the public cloud. This course is designed to give you an understanding of the security tools available within AWS, and how to use them. We'll start off by exploring the shared responsibility model, so you can understand the boundary and responsibility between you and AWS. We'll look at how to effectively implement separation of duties. We'll delve into identity and access management, giving you a thorough understanding of IM concepts, including users, groups, roles, and policies. We'll continue by exploring S3 security, how to create and manage encryption keys to protect your data, and tools that help you with threat detection and service protection. Compliance goes hand-in-hand with security, and we'll get our hands on several services that will help you meet your compliance obligations. Finally, we'll explore tools and approaches to help you prepare for the inevitable IT audit. Let's get started!
Related Courses
-
AWS: Automation and Optimization
with Shyam Raj2h 9m Intermediate -
AWS: Storage and Data Management
with Brandon Rich4h 25m Intermediate -
AWS: Monitoring and Reporting
with Shyam Raj1h 17m Intermediate -
AWS: Networking
with Sharif Nijim3h 6m Intermediate
-
Introduction
-
AWS security overview1m 19s
-
What you should know1m 8s
-
-
1. AWS Security Foundations
-
Understanding CloudTrail3m 28s
-
2. Identity and Access Management (IAM) Concepts in AWS
-
Understanding IAM6m 17s
-
Understanding IAM policies4m 18s
-
Configuring IAM policies7m 21s
-
Understanding IAM groups1m 44s
-
Configuring IAM groups2m 51s
-
Challenge: IAM54s
-
Solution: IAM3m 21s
-
Understanding IAM roles1m 47s
-
Configuring IAM roles3m 38s
-
Granting temporary access6m 37s
-
-
3. S3 Access Management
-
Managing S3 access2m 23s
-
Accessing S3 privately3m 46s
-
Managing S3 with IAM2m 25s
-
S3 bucket policies4m 14s
-
Exploring presigned URLs5m 20s
-
-
4. Key Management
-
Creating a KMS key5m 32s
-
Using a KMS in S35m 9s
-
Using KMS and an IAM role3m 57s
-
Deleting a KMS key3m 19s
-
Using Secrets Manager4m 5s
-
Understanding AWS CloudHSM2m 31s
-
5. Internal Detective Controls
-
Understanding AWS Config4m 38s
-
Enabling AWS Config3m 38s
-
Exploring AWS Config results3m 47s
-
Understanding AWS GuardDuty4m 42s
-
Exploring AWS GuardDuty4m 41s
-
Understanding AWS Macie5m 51s
-
Exploring Amazon Detective4m 10s
-
Exploring Amazon Inspector4m 42s
-
-
6. Additional Protective Tools
-
Understanding AWS Shield3m 27s
-
7. Security Audits in AWS
-
Using AWS Security Hub5m 20s
-
Rotating access keys4m 18s
-
Understanding AWS Artifact3m 14s
-
Exploring Trusted Advisor4m 16s
-
Conclusion
-
Next steps2m 6s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: AWS security overview