AWS Developer Associate 2022: Security Controls

Amazon Web Services    |    Intermediate
  • 14 videos | 1h 26m 17s
  • Includes Assessment
  • Earns a Badge
Rating 4.8 of 16 users Rating 4.8 of 16 users (16)
Ensuring the security of your operating systems and applications is a necessary preventative measure. Those responsible for maintaining AWS applications need to understand the methods and tools involved in securing them. In this course, you will learn how security policies and user permissions manage access to resources, beginning with host-based intrusion detection systems (HIDS) and host-based intrusion prevention systems (HIPS). Next, you'll discover how to use hardened baselines to achieve application security. Then you'll explore monitoring methods and endpoint security best practices. Finally, you'll investigate the use of AWS Firewall Manager, Amazon API Gateway, Amazon GuardDuty, Amazon Detective, AWS Audit Manager, and AWS Backup. This course helps prepare for the AWS Certified Developer - Associate 2022 certification exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Identify cloud security policies, including password, lockout, blacklisting, and whitelisting, and outline how they are used to enforce security
    Recognize how cloud user permissions and roles are used to manage access to resources
    Outline the use of host-based intrusion detection systems (hids) and host-based intrusion prevention systems (hips)
    Identify how to achieve application security using hardened baselines
    Recognize methods for monitoring file integrity, logs, and events
    Recognize how features such as encryption can be applied to api endpoints, applications, the os, and storage and file systems to increase security
  • Outline the features, components, capabilities, and requirements applicable when working with aws firewall manager
    Outline what amazon api gateway is used for and considerations when using it
    Identify how amazon guardduty provides continuous security monitoring, with reference to terminology and concepts pertaining to this service
    Outline how amazon detective can be used to analyze, investigate, and identify the root cause of security findings or suspicious activities and identify some usage considerations and prerequisites
    Outline what aws audit manager can be used for, how it works, and how you would set it up
    Identify the features of aws backup, services that work with it, and considerations for its use
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 17s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 9m 8s
    After completing this video, you will be able to identify cloud security policies, including password, lockout, blacklisting, and whitelisting, and outline how they are used to enforce security . FREE ACCESS
  • Locked
    3.  Cloud User Permissions
    9m 5s
    During this video, you will learn how to recognize how cloud user permissions and roles are used to manage access to resources. FREE ACCESS
  • Locked
    4.  HIDS and HIPS
    7m 9s
    Upon completion of this video, you will be able to outline the use of host-based intrusion detection systems (HIDS) and host-based intrusion prevention systems (HIPS). FREE ACCESS
  • Locked
    5.  Hardened Baselines for App Security
    6m 40s
    In this video, you will learn how to identify how to achieve application security using hardened baselines. FREE ACCESS
  • Locked
    6.  File Integrity and Event Monitoring
    7m 2s
    Upon completion of this video, you will be able to recognize methods for monitoring file integrity, logs, and events. FREE ACCESS
  • Locked
    7.  Endpoint Security Best Practices
    6m 43s
    After completing this video, you will be able to recognize how features such as encryption can be applied to API endpoints, applications, the OS, and storage and file systems to increase security. FREE ACCESS
  • Locked
    8.  AWS Firewall Manager
    7m 41s
    Upon completion of this video, you will be able to outline the features, components, capabilities, and requirements applicable when working with AWS Firewall Manager. FREE ACCESS
  • Locked
    9.  Amazon API Gateway
    5m 56s
    After completing this video, you will be able to outline what Amazon API Gateway is used for and considerations when using it. FREE ACCESS
  • Locked
    10.  Amazon GuardDuty
    6m 11s
    After completing this video, you will be able to identify how Amazon GuardDuty provides continuous security monitoring, with reference to terminology and concepts pertaining to this service. FREE ACCESS
  • Locked
    11.  Amazon Detective
    5m 45s
    Upon completion of this video, you will be able to outline how Amazon Detective can be used to analyze, investigate, and identify the root cause of security findings or suspicious activities and identify some usage considerations and prerequisites. FREE ACCESS
  • Locked
    12.  AWS Audit Manager
    5m 52s
    After completing this video, you will be able to outline what AWS Audit Manager can be used for, how it works, and how you would set it up. FREE ACCESS
  • Locked
    13.  AWS Backup Usage
    6m 49s
    Upon completion of this video, you will be able to identify the features of AWS Backup, services that work with it, and considerations for its use. FREE ACCESS
  • Locked
    14.  Course Summary
    58s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.5 of 48 users Rating 4.5 of 48 users (48)
Rating 4.7 of 55 users Rating 4.7 of 55 users (55)
Rating 4.6 of 10 users Rating 4.6 of 10 users (10)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.8 of 16 users Rating 4.8 of 16 users (16)
Rating 4.7 of 26 users Rating 4.7 of 26 users (26)
Rating 4.5 of 116 users Rating 4.5 of 116 users (116)