AWS Advanced Security SecOps Automation for the cloud
What you’ll learn
AWS Advanced Security use-cases
Advanced Data Protection in AWS
Respond to security incidents with ease
AWS Compliance Controls using Automation
Security Best Practices
Proactively defend against security threats
Requirements
Good Knowledge of AWS Cloud
Desire to learn and be curious about security
Description
Learn now how to protect your data, and manage your infrastructure in a secure way. There are many useful and powerful features that a customer can use to protect themselves against security incidents & data breaches.Your course instructor[s] are AWS Experts with 16+ years of experience in Cloud & Security.You will learn about how AWS Security services can be combined to deliver cloud security. All the examples demonstrated are from real-world customer use-cases and are being used in production. The automation templates & scripts provided can be modified by any user to get themselves familiar with these services and deploy in their customer environmentsAt the end of this course, you will be able to confidently able to answer the following questions,How to simplify compliance auditing, security analysis, change management, and operational troubleshootingHow to assess, audit, and automate the remediation of non compliant resources configurations. Write custom compliance rules to meet organisational needsHow to automatically respond to security incidents. How to effectively respond to and mitigate the potential impact of security incidentsYou will learn advanced techniques to prepare and respond to security events.What are different security services offered by AWS?How to use the AWS security services to comply to a frameworks(for example NIST)?The lectures range from simple security features to really complex event driven systems to keep your AWS accounts in compliance based on a set of rules. All the scripts and commands are on our GitHub repository. You can fork them and try it in your own accounts & laptops.
Overview
Section 1: Course Introduction
Lecture 1 Welcome to ‘AWS Cloud Security: Proactive Way’ Course
Section 2: Detective Controls: Introduction
Lecture 2 AWS Config: What Is It?
Lecture 3 AWS Config: How It Works?
Lecture 4 AWS Config: Introduction to Config Rules
Lecture 5 AWS Config: How to configure Config Rules
Lecture 6 AWS Config: Identify Non Compliant Rules & Resources
Lecture 7 AWS Config: Introduction to Advanced Querying
Lecture 8 AWS Config: Advanced Querying In Action
Lecture 9 AWS Config: Introduction to Multi Account Aggregators
Lecture 10 Learn how to aggregate compliance status in AWS
Section 3: Reactive Controls: Automatically Remediate Non Compliant Resources
Lecture 11 Introduction to Auto Remediation
Lecture 12 Automatically Enforce S3 Bucket Versioning
Lecture 13 Automatically Enforce S3 Bucket Encryption
Lecture 14 Automatically Enforce ‘No Public IPs for EC2 Instances’ Policy
Lecture 15 Automatically Enforce AMI ID Compliance for all EC2 Instances
Lecture 16 Automatically Enforce compliance to AMI ID by Tags for all EC2 Instances
Lecture 17 Compliance Best Practices & Tribal Knowledge – commonly used rules
Lecture 18 How to setup custom compliance rules?
Lecture 19 Monitor & Flag Unused IAM Roles using Config Custom Rules
Lecture 20 Monitor & Flag Users With Excessive Privileges
Section 4: Proactive Security Controls
Lecture 21 Automatically Remediate AWS Cloutrail Disabling: Monitor, Alert, ReEnable
Lecture 22 Monitor & Automatically Revoke Unintended IAM Access
Lecture 23 Automatically Remove Unused Security Groups
Lecture 24 Proactively monitor & fix bad or overly permissive S3 Object ACLs
Lecture 25 Proactively monitor and fix bad or overly permissive S3 Bucket Policies
Lecture 26 Proactively monitor and respond to failed SSH logins to EC2 Instances
Lecture 27 Automatically rotate EC2 SSH keys for ALL your instances reliably
Lecture 28 Proactively Block S3 Public Access At Scale
Lecture 29 Attribute Based Access Control: Proactively Restrict S3 Access based on UserTags
Lecture 30 Attribute Based Access Control: Proactively Restrict Access To EC2 Based On Tags
Section 5: Proactive Security Controls: Taking it to the next level
Lecture 31 Learn how to create fine grained permissions like a PRO
Lecture 32 Use AWS Secrets Manager to secure database credentials and retrieve from lambda
Lecture 33 Use an outbound VPC proxy for domain whitelisting and content filtering
Lecture 34 Use AWS IAM Access Analyzer to Identify Unintended Resource Access
Lecture 35 Automatically respond to DDoS Attacks with Web Application Firewall(WAF)
Lecture 36 Detect EC2 Instance Credential Abuse
Lecture 37 Automatically respond to EC2 Instance Credential Abuse – Part 01 of 02
Lecture 38 Automatically respond to EC2 Instance Credential Abuse – Part 02 of 02
Section 6: Next Steps: Assignment
Section 7: Resources
Lecture 39 Table of Resources
Section 8: Additional Reading
Lecture 40 Security Whitepapers
Users who wants to gain deep security insights related to AWS,Users who want to learn about Security Best Practices,Users who wants to know how to respond to security incidents automatically,Users who wants to learn automation
Course Information:
Udemy | English | 4h 46m | 2.16 GB
Created by: . Kumar .
You Can See More Courses in the IT & Software >> Greetings from CourseDown.com