image
AWS Incident Response: Isolating your EC2 instances
Introduction
Difficulty
Intermediate
Duration
16m
Students
1115
Ratings
5/5
Description

This course covers a few strategies for isolating your EC2 instances in response to a security event and explores the pros and cons of those strategies.

Learning Objectives

  • Learn how to isolate an EC2 instance's network communication with various levels of granularity 
  • Understand the positives and negatives associated with each technique

Intended Audience

I would recommend this course for any solutions architects, developers, system administrators, and network administrators who are responsible for the security of their architectures.

Prerequisites

To get the most out of this course, you should have a decent understanding of cloud computing and cloud architectures, specifically with Amazon Web Services. You should know about VPC, Security groups, NACLS, and all the basic level networking concepts for AWS. It would be helpful if you had some background in IT or network security, but it's not required.

Transcript

Hello, my name is Will Meadows and in this course, we are going to go over a few strategies for isolating your EC2 instances in response to a security event. Although this might be a very rare occurrence, I think this course is beneficial to anyone looking to get a deeper understanding of network security.

If you have any questions about anything I cover in this series please let me know at will.meadows@cloudacademy.com.

Alternatively, you can always get in touch with us here at Cloud Academy by sending an email to support@cloudacademy.com and one of our cloud experts will reply to your question, concern, or comment. 

I would recommend this course for any solutions architects, developers, system administrators, and network administrators who are responsible for security of their architectures.

Our learning objectives for this course are: To understand how to isolate an EC2 instances’ network communication with various levels of granularity. We will also look to understand the positives and negatives associated with each technique we are about to cover.

Finally, you will be able to perform this isolation and know the steps required to isolate an EC2 instance at each network level.

You should have a decent understanding of cloud computing and cloud architectures, specifically with Amazon Web Services. You should know about VPC, Security groups, NACLS, and all the basic level networking concepts for AWS. It would be helpful if you have some background in IT or network security, but not required.

Feedback on our courses here at Cloud Academy are valuable to both us as trainers and any students looking to take the same course in the future. If you have any feedback, positive or negative, it would be greatly appreciated if you could send an email to support@cloudacademy.com.

Please note that, at the time of writing this content, all course information was accurate.  AWS implements hundreds of updates every month as part of its ongoing drive to innovate and enhance its services.

As a result, minor discrepancies may appear in the course content over time.  Here at Cloud Academy, we strive to keep our content up to date in order to provide the best training available. 

So, if you notice any information that is outdated, please contact support@cloudacademy.com.  This will allow us to update the course during its next release cycle.

About the Author

William Meadows is a passionately curious human currently living in the Bay Area in California. His career has included working with lasers, teaching teenagers how to code, and creating classes about cloud technology that are taught all over the world. His dedication to completing goals and helping others is what brings meaning to his life. In his free time, he enjoys reading Reddit, playing video games, and writing books.