Autoplay
Autocomplete
Previous Lesson
Complete and Continue
AWS Security Operations - Securing Core AWS Infrastructure Services
01.COURSE OVERVIEW
01.Course Overview (1:39)
02.MANAGING ACCESS CONTROL
01.Securing Core Infrastructure Services (3:56)
02.Identity and Access Management (5:03)
03.Defining Security Controls (5:03)
04.Controlling Root Account Security (6:02)
05.Managing Multiple Accounts (8:47)
06.IAM Users and Security Controls (4:17)
07.Defining IAM Policy for the User (6:15)
08.Controlling Access to Resources (4:36)
09.Access Keys and Passwords (4:46)
10.Security Tools (4:43)
11.IAM Groups (1:32)
12.IAM Policies - The Basics (7:35)
13.IAM Policy Types (9:21)
14.Delegation and Federation (6:57)
15.Best Practices for Planning Access Control (5:07)
03.SECURING CORE INFRASTRUCTURE
01.Securing Core Infrastructure (3:29)
02.Securing EC2 Infrastructure (8:39)
03.Amazon Machine Instances (4:41)
04.AMI Storage Choices and Key Pairs (2:36)
05.EC2 Security Options (5:14)
06.Interfaces and Addresses (7:08)
07.Network Interfaces and Addresses (4:03)
08.Dedicated Instances and Hosts (6:56)
09.Securing EBS Volumes (3:50)
10.EBS Volume and Snapshot Security (7:35)
11.VPC Architecture (8:26)
12.VPC Setup Options (3:32)
13.VPC Security - Part A (7:44)
14.VPC Security and Connectivity - Part B (7:38)
15.VPC Security Considerations (5:47)
16.Best Practices (7:37)
04.SECURING ACCESS TO EDGE LOCATIONS
01.Securing Access to Edge Locations (2:49)
02.Elastic Load Balancing (3:08)
03._Classic_ Load Balancer (5:32)
04.Elastic Load Balancer Operation (4:46)
05.Classic ELB Security Features (2:08)
06.Application Load Balancer (7:34)
07.Elastic Load Balancer Setup (6:54)
08.Route 53 (6:44)
09.AWS Web Application Firewall (5:04)
10.Configuring the Web Application Firewall (3:41)
11.Best Practices for Securing Access (5:49)
Teach online with
15.Best Practices for Planning Access Control
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock