Autoplay
Autocomplete
Previous Lesson
Complete and Continue
AWS Cloud Security Best Practices Fundamentals
0. COURSE OVERVIEW
0. Introduction (1:32)
1. Least Privilege (4:47)
2. Handle Keys with Care (3:23)
3. Encrypt -All the Things- (1:43)
1. EXAMINING THE AWS SECURITY CHECKLIST
0. Introduction (1:32)
1. Least Privilege (4:47)
3. Encrypt -All the Things- (1:43)
4. Monitor Continuously (1:44)
5. Audit Regularly (0:54)
2. SECURING OPERATING SYSTEMS AND APPLICATIONS
0. Introduction (2:28)
1. Least Privilege (4:47)
2. Common AMI Maintenance (1:49)
3. Intervention (2:20)
4. Future (0:59)
3. SECURING YOUR INFRASTRUCTURE
0. Introduction (3:32)
1. Network Segmentation and Security Zones (3:19)
2. Securing Periphery Systems- User Repositories_ DNS_ NTP (2:53)
4. INTRODUCING THE CLOUD ADOPTION FRAMEWORK
0. Introduction (2:18)
1. Mind the -Gap- (0:43)
2. CAF Perspectives and Capabilities (2:45)
3. Summary (0:42)
Teach online with
2. Securing Periphery Systems- User Repositories_ DNS_ NTP
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock