Join Sharif Nijim for an in-depth discussion in this video Next steps, part of Amazon Web Services: Enterprise Security.
- [Instructor] Thanks for watching…enterprise security in AWS.…It's been a real pleasure accompanying you…on this exploration of security concepts…and tools within AWS.…I hope you gained an appreciation…for what a robust and complicated platform AWS represents,…and that the seeds for secure operations…are flourishing in your mind.…You should have a good understanding…of the AWS shared responsibility model,…how to implement and manage security policies,…the various security controls within S3,…and approaches for handling security related audits.…
AWS does a great job of maintaining accurate documentation…for its service offerings.…I highly recommend looking it over.…It's available at aws.amazon.com/documentation.…If you are looking to bounce ideas…off like minded people, the AWS user groups…provide a friendly environment in which to do so.…You can find them at aws.amazon.com/usergroups.…Finally, I encourage you to explore other AWS…and security related courses in the library.…
Sharif Nijim couples pragmatic advice with practical examples that educate IT pros on how to create a secure infrastructure within Amazon Web Services. Sharif explores the shared responsibility model of security, which splits duties between your company and AWS, and introduces key identity and access management concepts, including users, groups, roles, and policies. Learn how to configure Identity and Access Manager (IAM) and Simple Storage Service (S3) access management, including policies and access control lists. At the end of the course, Sharif helps you prepare for the inevitable audit of your AWS account(s).
This course is also part of a series designed to help you prepare for the AWS Certified SysOps Administrator – Associate certification exam.
- The AWS shared responsibility model and security landscape
- Enabling CloudTrail
- Configuring AWS Identity and Access Management (IAM)
- Configuring IAM users, groups, and policies
- Granting temporary access
- Controlling access to Simple Storage Service (S3)
- Preparing for security audits
- Getting audit help from Trusted Advisor