AWS Security Services

Intermediate

LP Box Courses 8 Video Courses
LP Box quiz 6 Quiz sessions
LP Box Lab 3 Hands-on Labs
Duration 12h 14m
Karma ~430 karma points
Certificate 5182 students

This learning path has been designed to introduce you to many of the different AWS Security services that are available to help you implement varied levels of security within your AWS environment.  

Security is one of the most important factors when implementing cloud services as you must ensure that the data you are storing on the Cloud remains restricted, controlled, monitored, maintained and secured to the correct level.  

AWS has developed a number of AWS security services and management tools to help you protect your data and environment from unwanted exposures, vulnerabilities, and threats, but largely it's down to us as customers to ensure these AWS security services are implemented effectively.

This AWS Security Services learning path will introduce a number of key AWS security services that can be used effectively within your security processes and procedures to ensure that you remain protected from both internal and external threats.

The services covered within this learning path are as follows:

  • • AWS Identity & Access Management (IAM)
  • • AWS Key Management Service (KMS)
  • • AWS CloudHSM
  • • AWS WAF
  • • AWS CloudTrail
  • • Amazon Inspector
  • • AWS Trusted Advisor
  • • AWS Config

By the end of the AWS Security Services learning path, you would have a solid understanding of each of these AWS security services and will be able to confidently implement them within your own AWS environment.  

 

Instructors

Stuart Scott:

  • AWS: Overview of AWS Identity & Access Management (IAM)
  • Introduction to AWS Web Application Firewall
  • AWS CloudTrail: An Introduction
  • Amazon Inspector
  • AWS Config: An Introduction

Tom Lynch:

  • Amazon Web Services - Key Management Service (KMS)
  • Getting started with AWS CloudHSM

Richard Augenti:

  • Amazon Web Services Trusted Advisor

1

This course looks at one of the key Security services within AWS, Identity & Access Management, commonly referred to IAM. This service manages identities and their permissions that are able to access your AWS resources and so understanding how this service works and what you can do with it will help you to maintain a secure AWS environment. IAM is an important step in ensuring your resources are ...

2

Advanced roles and groups management using IAM AWS Identity and Access Management (IAM) is a web service that helps you securely control access to AWS resources for your users. You can specify permission to a single user or you can use groups to specify permissions for a collection of users, which can make those permissions easier to manage for those users. Furthermore you can use a Role for ...

3

4

About this Course KMS stands for Key Management Service. KMS is a service provided by and managed by AWS. The service allows you to easily encrypt your data with protected keys that cannot be exposed to anyone in plain text. The service is regionally based across all AZs in the region making it highly available with full auditing functions to encrypt your data at AWS and within your applications. ...

5

Amazon Key Management Service along with S3 and EBS data encryption Lab Overview Amazon Web Services Key Management Service (KMS) is a managed service that simplifies the creation and management of encryption keys used to encrypt/decrypt your data. Most storage related AWS services are supported by KMS, including: EBS (Elastic Block Store) S3 (Simple Storage Service) Redshift RDS (Relational ...

6

7

Course Description: AWS CloudHSM is the name of Amazon’s original encryption key solution. HSM stands for Hardware Security Module and in the solution provided by AWS is a Safenet Luna appliance hosted at AWS. The appliance is single tenant and exclusive to each customer. AWS only manages the hardware and base operation but does not manage the keys or even have the ability to access the key ...

8

Security is one of the hottest topics within the cloud industry right now, mostly due to uncertainty and a lack of understanding when it comes to knowing how to secure the cloud really is. With this in mind, public cloud vendors focus massive effort and resources into security, resulting in additional levels of security at all layers within their cloud architecture. This made way for the ...

9

10

Any information that helps to secure your Cloud infrastructure is of significant use to security engineers and architects, with AWS CloudTrail you have the ability to capture all AWS API calls made by users and/or services. Whenever an API request is made within your environment AWS CloudTrail can track that request with a host of metadata and record it in a Log which is then sent to AWS S3 for ...

11

12

With the ever increasing threats of attacks against the integrity, confidentiality, and availability of your data within your organization, the need to ensure strict security procedures and processes is paramount and learn how to use Amazon Inspector is key. AWS offers a wide range of security services to help you achieve the level of security that you need to enforce within your environment, and ...

13

With the ever-changing nature of Cloud Computing in AWS, through the use of Auto Scaling, and self-healing architecture mechanisms, having visibility and awareness of your AWS resources is invaluable. It can be difficult to understand what your resources within your infrastructure looks like, for example: • Understanding what resources you have • Having an awareness of the status of resource ...

14

Lab Overview AWS Config is a powerful tool in your security and governance toolkit. AWS Config can record and track changes to the configuration of many types of resources in AWS. Config Rules can be used to monitor compliance with your security and governance policies. You can leverage AWS Config managed rules to quickly get started with compliance checking of common policies. You are also able ...

15

16

About This Course: Trusted Advisor is an AWS support tool which assists with cost reduction, performance optimization, and security improvements. Trusted Advisor provides recommendations which are based on historical criteria from hundreds of thousands of servers throughout AWS infrastructure. This course will provide a good foundation to assist you with utilizing Trusted Advisor as a tool to ...

17

Complete all the steps to claim this certificate
Your Name Here
AWS Security Services
Certificate Sample