AWS Developer Associate 2021: Security Controls
Amazon Web Services 2021
| Intermediate
- 14 videos | 1h 54m 35s
- Includes Assessment
- Earns a Badge
Ensuring the security of your operating systems and applications is a necessary preventative measure. If you're responsible for maintaining AWS applications, you need to know the methods and tools involved in securing them. Use this course to become familiar with the security controls available in AWS to protect its services. Learn how security policies and user permissions manage access to resources. See what's meant by a host-based intrusion detection system (HIDS) and a host-based intrusion prevention system (HIPS). And find out how to achieve application security using hardened baselines. Moving on, study methods for monitoring and endpoint security. Then examine how AWS Firewall Manager, Amazon API Gateway, Amazon GuardDuty, Amazon Detective, AWS Audit Manager, and AWS Backup work. This course helps prepare learners for the AWS Certified Developer - Associate 2021 certification exam. Upon completion, you'll know what AWS security controls you should use.
WHAT YOU WILL LEARN
-
discover the key concepts covered in this courseidentify cloud security policies including password, lockout, blacklisting, and whitelisting and summarize how they're used to enforce securitydescribe how cloud user permissions and roles are used to manage access to resourcesdefine host-based intrusion detection systems (HIDS) and host-based intrusion prevention systems (HIPS)outline how to achieve application security using hardened baselinesoutline methods for monitoring file integrity, logs, and eventsdescribe how features such as encryption can be applied to API endpoints, applications, the OS, and storage and file systems to increase security
-
describe the features, components, capabilities, and requirements applicable when working with AWS Firewall Managerdescribe what Amazon API Gateway is used for and considerations involved when using itoutline how Amazon GuardDuty provides continuous security monitoring, with reference to terminology and concepts pertaining to this servicesummarize how Amazon Detective can be used to analyze, investigate, and identify the root cause of security findings or suspicious activities and detail some usage considerations and prerequisitesdescribe what AWS Audit Manager can be used for, how it works, and how you would set it updescribe the features of AWS Backup, name the services that work with it, and detail considerations for its usesummarize the key concepts covered in this course
IN THIS COURSE
-
1.Course Overview1m 52sUP NEXT
-
2.Cloud Security Policies14m 39s
-
3.Cloud User Permissions12m 24s
-
4.Host-based IDS and Host-based IPS6m 53s
-
5.Hardened Baselines for App Security8m 30s
-
6.File Integrity and Event Monitoring7m 44s
-
7.Endpoint Security Best Practices13m 18s
-
8.AWS Firewall Manager Capabilities and Requirements7m 34s
-
9.Considerations When Using Amazon API Gateway7m 11s
-
10.Amazon GuardDuty Terminology and Concepts10m 8s
-
11.Amazon Detective Functionality and Usage6m 50s
-
12.How AWS Audit Manager Works8m 20s
-
13.AWS Backup Features and Usage Considerations8m 20s
-
14.Course Summary52s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.