Security and Identity
This course is an introduction to AWS security. During this course, we will get started on the most important topics by covering the AWS Shared Responsibility model, the AWS Acceptable Use policy, and penetration testing rules. We will then explore each of the services in the security and identity category. Besides the most obvious of those, Identity and Access Management (IAM), we will also learn about AWS Directory Service, the brand new Inspector service (which is still in preview mode), the recently announced Web Application Firewall (WAF) and Microsoft AD, an Enterprise-level domain hosted in the cloud. Also, we will take a quick look at the most basic security best practices that we need to be aware of when working with AWS.
There are no big pre-requisites for this course, you just need to have general IT knowledge and some basic understanding of AWS. If you don't yet feel confident enough on AWS to tackle this, you should take a look at the AWS Fundamentals Learning Path prior to getting started.
After taking this course you should be able to identify who is responsible for what in the AWS cloud and describe all the services in the security and identity category.
If you have thoughts or suggestions for this course, please contact Cloud Academy at firstname.lastname@example.org.
About the Author
Andrew is an AWS certified professional who is passionate about helping others learn how to use and gain benefit from AWS technologies. Andrew has worked for AWS and for AWS technology partners Ooyala and Adobe. His favorite Amazon leadership principle is "Customer Obsession" as everything AWS starts with the customer. Passions around work are cycling and surfing, and having a laugh about the lessons learnt trying to launch two daughters and a few start ups.
Welcome to the AWS Security Fundamentals course. This course is a beginner-level introduction to some of the security concepts and services that you need to be aware of when running services in the Amazon Web Services cloud. This introduction will provide an overview of what you'll learn in the coming videos. In this introduction we'll discuss the pre-requisites, intended audience, scope, and learning objectives of this course. Although there are no mandatory pre-requisites for this course, you'll benefit from having a general understanding of cloud computing, and a basic understanding of Amazon Web Services. By basic I mean, you should understand the core AWS services such as Elastic Cloud Compute, Virtual Private Cloud, and the Simple Storage Service There's no need for concern if you're not an expert in any or all or these. Or if the AWS console GUI appears overwhelming. Cloud Academy has a library of content that can ease the learning curve. If you don't feel confident in these areas yet, I recommend completing the AWS fundamentals learning path prior to getting started with this course. The target audience for this course is anyone who wants to come up to speed with AWS security. That certainly includes those with security in their title, but also includes developers, DevOps engineers, product managers, and technical business managers, just to name a few. Further, this course will prove very useful for anyone planning to take the AWS associate level certification exams. Let's speak to the scope of this course. The learning objectives of this course are to introduce you to the key concepts of managing security on AWS Cloud Services. Following this course you'll be aware of the AWS shared responsibility model, be aware of the AWS services that help you control access, authentication and auditing of services in the AWS cloud. A summary of the most salient topics covered within this course includes, an introduction to the AWS Shared responsibility security model. We'll introduce the AWS Shared security model and build an understanding of who is responsible for and what when we run services in Amazon Web Services. How to control access to resources with the Identity and Access Management tool, IAM service. How we can control access to services using the Amazon Directory service. How we can assess our security posture using Amazon Inspector. How we can reduce known exploits and common attack patterns using Web Application Firewall. Lastly, we'll review some of the common best practices that are important in running cloud services. Please contact us at email@example.com with any questions, comments, or feedback. Okay, if you're ready, let's get started!