π Folder Tree
- π Introduction to AWS Security
- π CHAPTER 01 Introduction
- π 01-01 Course Introduction
- π CHAPTER 02 Security in AWS 101
- π 02-01 Security in AWS 101 Overview
- π 02-02 AWS and Security
- π 02-03 Defining a Threat Model
- π 02-04 Discovering Threats and Recommendations
- π 02-05 Security in AWS 101 Review
- π CHAPTER 03 Managing Identities and Permissions
- π 03-01 Managing Identities and Permissions Overview
- π 03-02 Understanding Permissions in AWS
- π 03-03 HANDS-ON LAB Creating Users and Groups with Custom Policies in IAM
- π 03-04 Sharing Resources Securely
- π 03-05 Understanding Secure Access
- π 03-06 Exploring Directory Service and Cognito Part 1
- π 03-07 Exploring Directory Service and Cognito Part 2
- π 03-09 Managing Identities and Permissions Review
- π CHAPTER 04 Securing Network Resources
- π 04-01 Securing Network Resources Overview
- π 04-02 Protecting Network Resources
- π 04-03 Controlling Traffic at Each Layer Part 1
- π 04-04 Controlling Traffic at Each Layer Part 2
- π 04-05 HANDS-ON LAB Creating and Configuring a WAF
- π 04-06 Inspecting Security at Each Layer
- π 04-07 HANDS-ON LAB Optimizing Network Resources to Maintain a Secure Instance
- π 04-08 Securing Network Resources Review
- π CHAPTER 05 Securing Compute Resources
- π 05-01 Securing Compute Resources Overview
- π 05-02 Managing and Assessing Vulnerabilities
- π 05-03 Protecting Compute Resources Part 1
- π 05-04 HANDS-ON LAB Create and Secure an EC2 Instance
- π 05-05 Protecting Compute Resources Part 2
- π 05-06 Securing Compute Resources Review
- π CHAPTER 06 Securing Data
- π 06-01 Securing Data Overview
- π 06-02 Classifying Data
- π 06-03 Encrypting Data at Rest
- π 06-04 HANDS-ON LAB Configure At Rest Encryption for EFS
- π 06-05 Securing Data in Transit
- π 06-06 Securing S3
- π 06-07 HANDS-ON LAB Advanced S3 Security Configuration
- π 06-08 Securing Data Review
- π CHAPTER 07 Monitoring and Detecting in AWS
- π 07-01 Monitoring and Detecting in AWS Overview
- π 07-02 Utilizing Services to Detect Issues
- π 07-03 HANDS-ON LAB Detecting Security Issues Using GuardDuty
- π 07-04 Visualizing Security Across AWS
- π 07-05 Auditing Regularly with AWS
- π 07-06 Monitoring and Detecting in AWS Review
- π CHAPTER 08 Planning for the Expected and Unexpected
- π 08-01 Planning for the Expected and Unexpected Overview
- π 08-02 Staying Vigilant
- π 08-03 Using Incident Response Plans
- π 08-04 Preparation Is Everything!
- π 08-05 Planning for the Expected and Unexpected Review
- π CHAPTER 09 Conclusion
- π 09-01 Course Summary
- π 09-02 WhatΓ’β¬β’s Next