Home / Course catalog / AWS Security Operations - Securing Core AWS Infras...

AWS Security Operations - Securing Core AWS Infrastructure Services


Content
  • 01.Course Overview
  • 02.Managing Access Control
  • 01.Securing Core Infrastructure Services.mp4
  • 02.Identity and Access Management.mp4
  • 03.Defining Security Controls.mp4
  • 04.Controlling Root Account Security.mp4
  • 05.Managing Multiple Accounts.mp4
  • 06.IAM Users and Security Controls.mp4
  • 07.Defining IAM Policy for the User.mp4
  • 08.Controlling Access to Resources.mp4
  • 09.Access Keys and Passwords.mp4
  • 10.Security Tools.mp4
  • 11.IAM Groups.mp4
  • 12.IAM Policies - The Basics.mp4
  • 13.IAM Policy Types.mp4
  • 14.Delegation and Federation.mp4
  • 15.Best Practices for Planning Access Control.mp4
  • 03.Securing Core Infrastructure
  • 01.Securing Core Infrastructure.mp4
  • 02.Securing EC2 Infrastructure.mp4
  • 03.Amazon Machine Instances.mp4 sample
  • 04.AMI Storage Choices and Key Pairs.mp4
  • 05.EC2 Security Options.mp4
  • 06.Interfaces and Addresses.mp4
  • 07.Network Interfaces and Addresses.mp4
  • 08.Dedicated Instances and Hosts.mp4
  • 09.Securing EBS Volumes.mp4
  • 10.EBS Volume and Snapshot Security.mp4
  • 11.VPC Architecture.mp4
  • 12.VPC Setup Options.mp4
  • 13.VPC Security - Part A.mp4
  • 14.VPC Security and Connectivity - Part B.mp4
  • 15.VPC Security Considerations.mp4
  • 16.Best Practices.mp4
  • 04.Securing Access to Edge Locations
  • 01.Securing Access to Edge Locations.mp4
  • 02.Elastic Load Balancing.mp4
  • 03._Classic_ Load Balancer.mp4
  • 04.Elastic Load Balancer Operation.mp4
  • 05.Classic ELB Security Features.mp4
  • 06.Application Load Balancer.mp4
  • 07.Elastic Load Balancer Setup.mp4
  • 08.Route 53.mp4
  • 09.AWS Web Application Firewall.mp4
  • 10.Configuring the Web Application Firewall.mp4
  • 11.Best Practices for Securing Access.mp4
Completion rules
  • All units must be completed