This course was created with the
course builder. Create your online course today.
Start now
Create your course
with
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
AWS Cloud Security Best Practices Fundamentals
0. COURSE OVERVIEW
0. Introduction (1:32)
1. Least Privilege (4:47)
2. Handle Keys with Care (3:23)
3. Encrypt -All the Things- (1:43)
1. EXAMINING THE AWS SECURITY CHECKLIST
0. Introduction (1:32)
1. Least Privilege (4:47)
3. Encrypt -All the Things- (1:43)
4. Monitor Continuously (1:44)
5. Audit Regularly (0:54)
2. SECURING OPERATING SYSTEMS AND APPLICATIONS
0. Introduction (2:28)
1. Least Privilege (4:47)
2. Common AMI Maintenance (1:49)
3. Intervention (2:20)
4. Future (0:59)
3. SECURING YOUR INFRASTRUCTURE
0. Introduction (3:32)
1. Network Segmentation and Security Zones (3:19)
2. Securing Periphery Systems- User Repositories_ DNS_ NTP (2:53)
4. INTRODUCING THE CLOUD ADOPTION FRAMEWORK
0. Introduction (2:18)
1. Mind the -Gap- (0:43)
2. CAF Perspectives and Capabilities (2:45)
3. Summary (0:42)
0. Introduction
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock