AWS Advanced Security SecOps Automation for the cloud

100% Hands-On | Learn to secure applications on AWS. Defend against threats DDoS Intrusions Vulnerabilities
AWS Advanced Security SecOps Automation for the cloud
File Size :
2.16 GB
Total length :
4h 46m



. Kumar .


Last update




AWS Advanced Security SecOps Automation for the cloud

What you’ll learn

AWS Advanced Security use-cases
Advanced Data Protection in AWS
Respond to security incidents with ease
AWS Compliance Controls using Automation
Security Best Practices
Proactively defend against security threats

AWS Advanced Security SecOps Automation for the cloud


Good Knowledge of AWS Cloud
Desire to learn and be curious about security


Learn now how to protect your data, and manage your infrastructure in a secure way. There are many useful and powerful features that a customer can use to protect themselves against security incidents & data breaches.Your course instructor[s] are AWS Experts with 16+ years of experience in Cloud & Security.You will learn about how AWS Security services can be combined to deliver cloud security. All the examples demonstrated are from real-world customer use-cases and are being used in production. The automation templates & scripts provided can be modified by any user to get themselves familiar with these services and deploy in their customer environmentsAt the end of this course, you will be able to confidently able to answer the following questions,How to simplify compliance auditing, security analysis, change management, and operational troubleshootingHow to assess, audit, and automate the remediation of non compliant resources configurations. Write custom compliance rules to meet organisational needsHow to automatically respond to security incidents.  How to effectively respond to and mitigate the potential impact of security incidentsYou will learn advanced techniques to prepare and respond to security events.What are different security services offered by AWS?How to use the AWS security services to comply to a frameworks(for example NIST)?The lectures range from simple security features to really complex event driven systems to keep your AWS accounts in compliance based on a set of rules. All the scripts and commands are on our GitHub repository. You can fork them and try it in your own accounts & laptops.


Section 1: Course Introduction

Lecture 1 Welcome to ‘AWS Cloud Security: Proactive Way’ Course

Section 2: Detective Controls: Introduction

Lecture 2 AWS Config: What Is It?

Lecture 3 AWS Config: How It Works?

Lecture 4 AWS Config: Introduction to Config Rules

Lecture 5 AWS Config: How to configure Config Rules

Lecture 6 AWS Config: Identify Non Compliant Rules & Resources

Lecture 7 AWS Config: Introduction to Advanced Querying

Lecture 8 AWS Config: Advanced Querying In Action

Lecture 9 AWS Config: Introduction to Multi Account Aggregators

Lecture 10 Learn how to aggregate compliance status in AWS

Section 3: Reactive Controls: Automatically Remediate Non Compliant Resources

Lecture 11 Introduction to Auto Remediation

Lecture 12 Automatically Enforce S3 Bucket Versioning

Lecture 13 Automatically Enforce S3 Bucket Encryption

Lecture 14 Automatically Enforce ‘No Public IPs for EC2 Instances’ Policy

Lecture 15 Automatically Enforce AMI ID Compliance for all EC2 Instances

Lecture 16 Automatically Enforce compliance to AMI ID by Tags for all EC2 Instances

Lecture 17 Compliance Best Practices & Tribal Knowledge – commonly used rules

Lecture 18 How to setup custom compliance rules?

Lecture 19 Monitor & Flag Unused IAM Roles using Config Custom Rules

Lecture 20 Monitor & Flag Users With Excessive Privileges

Section 4: Proactive Security Controls

Lecture 21 Automatically Remediate AWS Cloutrail Disabling: Monitor, Alert, ReEnable

Lecture 22 Monitor & Automatically Revoke Unintended IAM Access

Lecture 23 Automatically Remove Unused Security Groups

Lecture 24 Proactively monitor & fix bad or overly permissive S3 Object ACLs

Lecture 25 Proactively monitor and fix bad or overly permissive S3 Bucket Policies

Lecture 26 Proactively monitor and respond to failed SSH logins to EC2 Instances

Lecture 27 Automatically rotate EC2 SSH keys for ALL your instances reliably

Lecture 28 Proactively Block S3 Public Access At Scale

Lecture 29 Attribute Based Access Control: Proactively Restrict S3 Access based on UserTags

Lecture 30 Attribute Based Access Control: Proactively Restrict Access To EC2 Based On Tags

Section 5: Proactive Security Controls: Taking it to the next level

Lecture 31 Learn how to create fine grained permissions like a PRO

Lecture 32 Use AWS Secrets Manager to secure database credentials and retrieve from lambda

Lecture 33 Use an outbound VPC proxy for domain whitelisting and content filtering

Lecture 34 Use AWS IAM Access Analyzer to Identify Unintended Resource Access

Lecture 35 Automatically respond to DDoS Attacks with Web Application Firewall(WAF)

Lecture 36 Detect EC2 Instance Credential Abuse

Lecture 37 Automatically respond to EC2 Instance Credential Abuse – Part 01 of 02

Lecture 38 Automatically respond to EC2 Instance Credential Abuse – Part 02 of 02

Section 6: Next Steps: Assignment

Section 7: Resources

Lecture 39 Table of Resources

Section 8: Additional Reading

Lecture 40 Security Whitepapers

Users who wants to gain deep security insights related to AWS,Users who want to learn about Security Best Practices,Users who wants to know how to respond to security incidents automatically,Users who wants to learn automation

Course Information:

Udemy | English | 4h 46m | 2.16 GB
Created by: . Kumar .

You Can See More Courses in the IT & Software >> Greetings from

New Courses

Scroll to Top