This learning path has been designed to introduce you to many of the different AWS Security services that are available to help you implement varied levels of security within your AWS environment.
Security is one of the most important factors when implementing cloud services as you must ensure that the data you are storing on the Cloud remains restricted, controlled, monitored, maintained and secured to the correct level.
AWS has developed a number of AWS security services and management tools to help you protect your data and environment from unwanted exposures, vulnerabilities, and threats, but largely it's down to us as customers to ensure these AWS security services are implemented effectively.
This AWS Security Services learning path will introduce a number of key AWS security services that can be used effectively within your security processes and procedures to ensure that you remain protected from both internal and external threats.
The services covered within this learning path are as follows:
- AWS Identity & Access Management (IAM)
- AWS Key Management Service (KMS)
- AWS CloudHSM
- AWS WAF
- AWS CloudTrail
- Amazon Inspector
- AWS Config
By the end of the AWS Security Services learning path, you would have a solid understanding of each of these AWS security services and will be able to confidently implement them within your own AWS environment.
- AWS: Overview of AWS Identity & Access Management (IAM)
- Introduction to AWS Web Application Firewall
- AWS CloudTrail: An Introduction
- Amazon Inspector
- AWS Config: An Introduction
- Amazon Web Services - Key Management Service (KMS)
- Getting started with AWS CloudHSM
- April 6, 2018 - Added Learning Path Exam
- September 21st 2018 - Added Course 'Enforcing Compliance & Security Controls with Amazon Macie'
- September 21st 2018 - Added Course 'Understanding Amazon GuardDuty'
- September 21st 2018 - Added Lab 'Detecting EC2 Threats with Amazon GuardDuty
Learning Path Steps
This course looks at one of the key Security services within AWS, Identity & Access Management, commonly referred to IAM. This service manages identities and their permissions that are able to access your AWS resources and so understanding how this service ...
Learn how to manage our organization using IAM Users and Groups and IAM Roles
Knowledge Check: Overview of AWS Identity and Access Management (IAM)
Course Description Unencrypted data can be read and seen by anyone who has access to it, and data stored at-rest or sent between two locations, in-transit, is known as ‘plaintext’ or ‘cleartext’ data. The data is plain to see and can be seen and under...
In this lab, you'll learn about Amazon Key Management Service to encrypt S3 and EBS Data at an intermediate level. Get started today!
AWS Key Management Service (KMS) Intermediate
Course Description: AWS CloudHSM is the name of Amazon’s original encryption key solution. HSM stands for Hardware Security Module and in the solution provided by AWS is a Safenet Luna appliance hosted at AWS. The appliance is single tenant and exclusive t...
Explore the 3 AWS services, designed to help protect your web applications from external malicious activity, with this course. Once getting started, this course will delve into depth on all three services, comprised of AWS Web Application Firewall Service (...
Any information that helps to secure your Cloud infrastructure is of significant use to security engineers and architects, with AWS CloudTrail you have the ability to capture all AWS API calls made by users and/or services. Whenever an API request is made ...
AWS CloudTrail Intermediate
With the ever increasing threats of attacks against the integrity, confidentiality, and availability of your data within your organization, the need to ensure strict security procedures and processes is paramount and learn how to use Amazon Inspector is key...
With the ever-changing nature of Cloud Computing in AWS, through the use of Auto Scaling, and self-healing architecture mechanisms, having visibility and awareness of your AWS resources is invaluable. It can be difficult to understand what your resources wi...
Compliance check using AWS Config Rules: See how AWS Config can enhance your security and compliance with AWS managed rules and custom rules with AWS Lambda
AWS Config Intermediate
Course Description Amazon Macie was launched in the summer of 2017, much to the delight of cloud security engineers. Amazon Macie is a powerful security and compliance service that provides an automatic method to detect, identify, and classify data within ...
Course Description During AWS re:Invent 2017, AWS launched their 11th security service in the on-going drive to help its customers protect and secure their applications, environments, and accounts. This service was Amazon GuardDuty, a regionally based, int...
Learn how to use Amazon GuardDuty to automatically uncover malicious EC2 activity and configure threat lists to improve the security of your AWS environments.
Exam: Security Services on AWS
About the Author
Stuart has been working within the IT industry for two decades covering a huge range of topic areas and technologies, from data centre and network infrastructure design, to cloud architecture and implementation.
To date, Stuart has created 50+ courses relating to Cloud, most within the AWS category with a heavy focus on security and compliance
He is AWS certified and accredited in addition to being a published author covering topics across the AWS landscape.
In January 2016 Stuart was awarded ‘Expert of the Year Award 2015’ from Experts Exchange for his knowledge share within cloud services to the community.
Stuart enjoys writing about cloud technologies and you will find many of his articles within our blog pages.