HOME > IT & Software > AWS Advanced Security- SecOps Automation for the cloud

AWS Advanced Security- SecOps Automation for the cloud

SynopsisAWS Advanced Security: SecOps Automation for the cloud, avail...
AWS Advanced Security- SecOps Automation for the cloud  No.1

AWS Advanced Security: SecOps Automation for the cloud, available at $64.99, has an average rating of 4.42, with 40 lectures, based on 633 reviews, and has 5521 subscribers.

You will learn about AWS Advanced Security use-cases Advanced Data Protection in AWS Respond to security incidents with ease AWS Compliance Controls using Automation Security Best Practices Proactively defend against security threats This course is ideal for individuals who are Users who wants to gain deep security insights related to AWS or Users who want to learn about Security Best Practices or Users who wants to know how to respond to security incidents automatically or Users who wants to learn automation It is particularly useful for Users who wants to gain deep security insights related to AWS or Users who want to learn about Security Best Practices or Users who wants to know how to respond to security incidents automatically or Users who wants to learn automation.

Enroll now: AWS Advanced Security: SecOps Automation for the cloud

Summary

Title: AWS Advanced Security: SecOps Automation for the cloud

Price: $64.99

Average Rating: 4.42

Number of Lectures: 40

Number of Published Lectures: 40

Number of Curriculum Items: 41

Number of Published Curriculum Objects: 41

Original Price: $24.99

Quality Status: approved

Status: Live

What You Will Learn

  • AWS Advanced Security use-cases
  • Advanced Data Protection in AWS
  • Respond to security incidents with ease
  • AWS Compliance Controls using Automation
  • Security Best Practices
  • Proactively defend against security threats
  • Who Should Attend

  • Users who wants to gain deep security insights related to AWS
  • Users who want to learn about Security Best Practices
  • Users who wants to know how to respond to security incidents automatically
  • Users who wants to learn automation
  • Target Audiences

  • Users who wants to gain deep security insights related to AWS
  • Users who want to learn about Security Best Practices
  • Users who wants to know how to respond to security incidents automatically
  • Users who wants to learn automation
  • Learn now how to protect your data, and manage your infrastructure in a secure way. There are many useful and powerful features that a customer can use to protect themselves against security incidents & data breaches.

    Your course instructor[s] are AWS Experts with 16+ years of experience in Cloud & Security.

    You will learn about how AWS Security services can be combined to deliver cloud security. All the examples demonstrated are from real-world customer use-cases and are being used in production. The automation templates & scripts provided can be modified by any user to get themselves familiar with these services and deploy in their customer environments

    At the end of this course, you will be able to confidently able to answer the following questions,

  • How to simplify compliance auditing, security analysis, change management, and operational troubleshooting

  • How to assess, audit, and automate the remediation of non compliant resources configurations.

  • Write custom compliance rules to meet organisational needs

  • How to automatically respond to security incidents. 

  • How to effectively respond to and mitigate the potential impact of security incidents

  • You will learn advanced techniques to prepare and respond to security events.

  • What are different security services offered by AWS?

  • How to use the AWS security services to comply to a frameworks(for example NIST)?

  • The lectures range from simple security features to really complex event driven systems to keep your AWS accounts in compliance based on a set of rules. All the scripts and commands are on our GitHub repository. You can fork them and try it in your own accounts & laptops.

    Course Curriculum

    Chapter 1: Course Introduction

    Lecture 1: Welcome to AWS Cloud Security: Proactive Way Course

    Chapter 2: Detective Controls: Introduction

    Lecture 1: AWS Config: What Is It?

    Lecture 2: AWS Config: How It Works?

    Lecture 3: AWS Config: Introduction to Config Rules

    Lecture 4: AWS Config: How to configure Config Rules

    Lecture 5: AWS Config: Identify Non Compliant Rules & Resources

    Lecture 6: AWS Config: Introduction to Advanced Querying

    Lecture 7: AWS Config: Advanced Querying In Action

    Lecture 8: AWS Config: Introduction to Multi Account Aggregators

    Lecture 9: Learn how to aggregate compliance status in AWS

    Chapter 3: Reactive Controls: Automatically Remediate Non Compliant Resources

    Lecture 1: Introduction to Auto Remediation

    Lecture 2: Automatically Enforce S3 Bucket Versioning

    Lecture 3: Automatically Enforce S3 Bucket Encryption

    Lecture 4: Automatically Enforce No Public IPs for EC2 Instances Policy

    Lecture 5: Automatically Enforce AMI ID Compliance for all EC2 Instances

    Lecture 6: Automatically Enforce compliance to AMI ID by Tags for all EC2 Instances

    Lecture 7: Compliance Best Practices & Tribal Knowledge – commonly used rules

    Lecture 8: How to setup custom compliance rules?

    Lecture 9: Monitor & Flag Unused IAM Roles using Config Custom Rules

    Lecture 10: Monitor & Flag Users With Excessive Privileges

    Chapter 4: Proactive Security Controls

    Lecture 1: Automatically Remediate AWS Cloutrail Disabling: Monitor, Alert, ReEnable

    Lecture 2: Monitor & Automatically Revoke Unintended IAM Access

    Lecture 3: Automatically Remove Unused Security Groups

    Lecture 4: Proactively monitor & fix bad or overly permissive S3 Object ACLs

    Lecture 5: Proactively monitor and fix bad or overly permissive S3 Bucket Policies

    Lecture 6: Proactively monitor and respond to failed SSH logins to EC2 Instances

    Lecture 7: Automatically rotate EC2 SSH keys for ALL your instances reliably

    Lecture 8: Proactively Block S3 Public Access At Scale

    Lecture 9: Attribute Based Access Control: Proactively Restrict S3 Access based on UserTags

    Lecture 10: Attribute Based Access Control: Proactively Restrict Access To EC2 Based On Tags

    Chapter 5: Proactive Security Controls: Taking it to the next level

    Lecture 1: Learn how to create fine grained permissions like a PRO

    Lecture 2: Use AWS Secrets Manager to secure database credentials and retrieve from lambda

    Lecture 3: Use an outbound VPC proxy for domain whitelisting and content filtering

    Lecture 4: Use AWS IAM Access Analyzer to Identify Unintended Resource Access

    Lecture 5: Automatically respond to DDoS Attacks with Web Application Firewall(WAF)

    Lecture 6: Detect EC2 Instance Credential Abuse

    Lecture 7: Automatically respond to EC2 Instance Credential Abuse – Part 01 of 02

    Lecture 8: Automatically respond to EC2 Instance Credential Abuse – Part 02 of 02

    Chapter 6: Next Steps: Assignment

    Chapter 7: Resources

    Lecture 1: Table of Resources

    Chapter 8: Additional Reading

    Lecture 1: Security Whitepapers

    Instructors

  • AWS Advanced Security- SecOps Automation for the cloud  No.2
    . Kumar .
    Cloud Architect | Alexa Developer | Github Contributor
  • Rating Distribution

  • 1 stars: 7 votes
  • 2 stars: 10 votes
  • 3 stars: 64 votes
  • 4 stars: 232 votes
  • 5 stars: 320 votes
  • Frequently Asked Questions

    How long do I have access to the course materials?

    You can view and review the lecture materials indefinitely, like an on-demand channel.

    Can I take my courses with me wherever I go?

    Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!