AWS Developer Associate 2021: Security Controls

Amazon Web Services    |    Intermediate
  • 14 videos | 1h 54m 35s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 50 users Rating 4.4 of 50 users (50)
Ensuring the security of your operating systems and applications is a necessary preventative measure. If you're responsible for maintaining AWS applications, you need to know the methods and tools involved in securing them. Use this course to become familiar with the security controls available in AWS to protect its services. Learn how security policies and user permissions manage access to resources. See what's meant by a host-based intrusion detection system (HIDS) and a host-based intrusion prevention system (HIPS). And find out how to achieve application security using hardened baselines. Moving on, study methods for monitoring and endpoint security. Then examine how AWS Firewall Manager, Amazon API Gateway, Amazon GuardDuty, Amazon Detective, AWS Audit Manager, and AWS Backup work. This course helps prepare learners for the AWS Certified Developer - Associate 2021 certification exam. Upon completion, you'll know what AWS security controls you should use.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Identify cloud security policies including password, lockout, blacklisting, and whitelisting and summarize how they're used to enforce security
    Describe how cloud user permissions and roles are used to manage access to resources
    Define host-based intrusion detection systems (hids) and host-based intrusion prevention systems (hips)
    Outline how to achieve application security using hardened baselines
    Outline methods for monitoring file integrity, logs, and events
    Describe how features such as encryption can be applied to api endpoints, applications, the os, and storage and file systems to increase security
  • Describe the features, components, capabilities, and requirements applicable when working with aws firewall manager
    Describe what amazon api gateway is used for and considerations involved when using it
    Outline how amazon guardduty provides continuous security monitoring, with reference to terminology and concepts pertaining to this service
    Summarize how amazon detective can be used to analyze, investigate, and identify the root cause of security findings or suspicious activities and detail some usage considerations and prerequisites
    Describe what aws audit manager can be used for, how it works, and how you would set it up
    Describe the features of aws backup, name the services that work with it, and detail considerations for its use
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 52s
  • 14m 39s
    Upon completion of this video, you will be able to identify cloud security policies including password, lockout, blacklisting, and whitelisting and summarize how they are used to enforce security. FREE ACCESS
  • Locked
    3.  Cloud User Permissions
    12m 24s
    During this video, you will learn how to describe how cloud user permissions and roles are used to manage access to resources. FREE ACCESS
  • Locked
    4.  Host-based IDS and Host-based IPS
    6m 53s
    Find out how to define host-based intrusion detection systems (HIDS) and host-based intrusion prevention systems (HIPS). FREE ACCESS
  • Locked
    5.  Hardened Baselines for App Security
    8m 30s
    Learn how to outline how to achieve application security using hardened baselines. FREE ACCESS
  • Locked
    6.  File Integrity and Event Monitoring
    7m 44s
    In this video, you will learn how to outline methods for monitoring file integrity, logs, and events. FREE ACCESS
  • Locked
    7.  Endpoint Security Best Practices
    13m 18s
    During this video, you will learn how to describe how features such as encryption can be applied to API endpoints, applications, the OS, and storage and file systems to increase security. FREE ACCESS
  • Locked
    8.  AWS Firewall Manager Capabilities and Requirements
    7m 34s
    In this video, discover the features, components, capabilities, and requirements applicable when working with AWS Firewall Manager. FREE ACCESS
  • Locked
    9.  Considerations When Using Amazon API Gateway
    7m 11s
    Discover how to describe what Amazon API Gateway is used for and considerations involved when using it. FREE ACCESS
  • Locked
    10.  Amazon GuardDuty Terminology and Concepts
    10m 8s
    In this video, you will outline how Amazon GuardDuty provides continuous security monitoring, with reference to terminology and concepts pertaining to this service. FREE ACCESS
  • Locked
    11.  Amazon Detective Functionality and Usage
    6m 50s
    After completing this video, you will be able to summarize how Amazon Detective can be used to analyze, investigate, and identify the root cause of security findings or suspicious activities, as well as detail some usage considerations and prerequisites. FREE ACCESS
  • Locked
    12.  How AWS Audit Manager Works
    8m 20s
    In this video, find out how to describe what AWS Audit Manager can be used for, how it works, and how to set it up. FREE ACCESS
  • Locked
    13.  AWS Backup Features and Usage Considerations
    8m 20s
    Upon completion of this video, you will be able to describe the features of AWS Backup, name the services that work with it, and detail considerations for its use. FREE ACCESS
  • Locked
    14.  Course Summary
    52s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 14 users Rating 4.6 of 14 users (14)
Rating 4.6 of 10 users Rating 4.6 of 10 users (10)
Rating 4.6 of 66 users Rating 4.6 of 66 users (66)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 75 users Rating 4.5 of 75 users (75)
Rating 4.5 of 59 users Rating 4.5 of 59 users (59)
Rating 4.8 of 16 users Rating 4.8 of 16 users (16)