001 - Course Overview - Course Overview
002 - Course Introduction - Getting Started
003 - Understanding AWS Security Best Practices - Introduction
004 - Understanding AWS Security Best Practices - Understanding the Shared Responsibility Model
005 - Understanding AWS Security Best Practices - Enabling Security with IAM Users and Groups
006 - Understanding AWS Security Best Practices - Using IAM Roles for EC2 Instances
007 - Understanding AWS Security Best Practices - Following the Principle of Least Privilege with IAM Policies
008 - Understanding AWS Security Best Practices - Enabling Multifactor Authentication
009 - Understanding AWS Security Best Practices - Implementing an IAM Password Policy
010 - Understanding AWS Security Best Practices - Securing Access to EC2 Instances
011 - Understanding AWS Security Best Practices - Auditing Security with AWS Trusted Advisor
012 - Understanding AWS Security Best Practices - Module Summary
013 - Implementing Delegation and Federation - Introduction
014 - Implementing Delegation and Federation - Taking a Closer Look at IAM Roles
015 - Implementing Delegation and Federation - Delegating Access to Resources in Another AWS Account
016 - Implementing Delegation and Federation - AWS STS API Actions You Need to Know
017 - Implementing Delegation and Federation - Corporate Identity Federation Use Cases
018 - Implementing Delegation and Federation - Creating an AWS Managed Active Directory (AD) Service
019 - Implementing Delegation and Federation - Launching an EC2 Instance into Managed AD
020 - Implementing Delegation and Federation - Setting up Federated Access to the AWS Console
021 - Implementing Delegation and Federation - Web Identity Federation and Amazon Cognito Identity
022 - Implementing Delegation and Federation - Module Summary
023 - Protecting Data In-flight and at Rest - Introduction
024 - Protecting Data In-flight and at Rest - Protecting Data in Amazon S3
025 - Protecting Data In-flight and at Rest - Working with Amazon EBS Volume Encryption
026 - Protecting Data In-flight and at Rest - Using Encryption with Amazon RDS
027 - Protecting Data In-flight and at Rest - Protecting Data in Transit Over Public Links
028 - Protecting Data In-flight and at Rest - Module Summary
029 - Enabling IT Governance with AWS Services - Introduction
030 - Enabling IT Governance with AWS Services - Understanding IT Governance
031 - Enabling IT Governance with AWS Services - Asset Management and Cost Control
032 - Enabling IT Governance with AWS Services - Physical and Logical Access Control
033 - Enabling IT Governance with AWS Services - Securing IT Resources
034 - Enabling IT Governance with AWS Services - Log Management and Performance Monitoring
035 - Enabling IT Governance with AWS Services - Data Protection and Disaster Recovery
036 - Enabling IT Governance with AWS Services - Module Summary