وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Complete Guide to AWS Security and Compliance Management

سرفصل های دوره

Understanding—and successfully implementing—security concepts is essential to using AWS as your enterprise solution. In this course, instructor Sharif Nijim couples pragmatic advice with practical examples that educate IT pros on how to create a secure infrastructure within Amazon Web Services. Explore the shared responsibility model of security, which splits duties between your company and AWS. Deep dive into key identity and access management concepts, including users, groups, roles, and policies. Find out how to create a secure infrastructure within AWS. Plus, complete several hands-on challenges that enable you to work independently and develop solutions on topics including IAM roles, KMS, S3, and data breaches.


01 - Introduction
  • 01 - AWS security overview
  • 02 - What you should know

  • 02 - 1. AWS Security Foundations
  • 01 - Understanding shared responsibility
  • 02 - Understanding the AWS security landscape
  • 03 - Understanding separation of duties
  • 04 - Implementing separation of duties
  • 05 - Understanding CloudTrail
  • 06 - Enabling CloudTrail
  • 07 - Understanding CloudWatch
  • 08 - Understanding CloudWatch alarms
  • 09 - Configuring Simple Notification Service
  • 10 - Using a CloudWatch alarm
  • 11 - Installing the command line interface (CLI) for Mac
  • 12 - The command line interface (CLI) for Windows

  • 03 - 2. IAM Concepts in AWS
  • 01 - Understanding Identity and Access Management
  • 02 - Understanding IAM policies
  • 03 - Configure IAM policies
  • 04 - Understanding IAM groups
  • 05 - Configure IAM groups
  • 06 - Configuring a password policy
  • 07 - Configure IAM users Web console
  • 08 - Configure IAM users CLI
  • 09 - IAM challenge
  • 10 - IAM challenge solution
  • 11 - Configuring IAM roles
  • 12 - Configuring IAM roles
  • 13 - Validating an IAM role
  • 14 - Extending CloudWatch
  • 15 - Install CloudWatch agent
  • 16 - Challenge IAM roles
  • 17 - Solution IAM roles
  • 18 - Understanding Security Token Service
  • 19 - Creating a temporary access role
  • 20 - Creating a temporary access policy
  • 21 - Validating temporary access
  • 22 - Challenge Super admin
  • 23 - Solution Super admin
  • 24 - Illustrating access restrictions
  • 25 - Exploring IAM policy simulator
  • 26 - Understanding Cognito
  • 27 - Creating a Cognito user pool
  • 28 - Creating a Cognito identity pool
  • 29 - Understanding Verified Permissions
  • 30 - Understanding federated access
  • 31 - Enabling federated access
  • 32 - Validating federated access
  • 33 - Securing financial access
  • 34 - Enabling financial access

  • 04 - 3. Multi-Account Access
  • 01 - Understanding Organizations
  • 02 - Understanding Control Tower
  • 03 - Understanding IAM Identity Center
  • 04 - Exploring IAM Identity Center
  • 05 - Validating IAM Identity Center
  • 06 - Understanding Resource Access Manager
  • 07 - Exploring Resource Access Manager

  • 05 - 4. Detection and Response
  • 01 - Understanding AWS Config
  • 02 - Enabling AWS Config
  • 03 - Exploring AWS Config results
  • 04 - Exploring conformance packs
  • 05 - Understanding AWS GuardDuty
  • 06 - Exploring AWS GuardDuty
  • 07 - Understand IAM Access Analyzer
  • 08 - Exploring IAM Access Analyzer results
  • 09 - Understanding Amazon Detective
  • 10 - Exploring Amazon Detective
  • 11 - Understanding Amazon Inspector
  • 12 - Exploring Amazon Inspector
  • 13 - Resolving an Inspector finding
  • 14 - Understanding Amazon Security Lake
  • 15 - Understanding IoT Device Defender
  • 16 - Understanding AWS Elastic Disaster Recovery
  • 17 - Configuring Elastic Disaster Recovery
  • 18 - Configuring a source server
  • 19 - Exploring AWS Elastic Disaster Recovery
  • 20 - Removing a source server

  • 06 - 5. Network and Application Protection
  • 01 - Understand Web Application Firewall
  • 02 - Exploring Web Application Firewall
  • 03 - Configuring Web Application Firewall
  • 04 - Validating Web Application Firewall
  • 05 - Understand AWS Shield
  • 06 - Understanding AWS Firewall Manager
  • 07 - Understanding AWS Network Firewall
  • 08 - Understand AWS Verified Access
  • 09 - Understanding DNS Firewall
  • 10 - Configuring DNS Firewall

  • 07 - 6. Data Protection and Operations
  • 01 - Understanding Amazon Macie
  • 02 - Configuring a Macie job
  • 03 - Exploring Macie results
  • 04 - Understanding Key Management Service
  • 05 - Creating a KMS key
  • 06 - Creating a multi-region KMS key
  • 07 - Using a KMS in S3
  • 08 - Using KMS and an IAM role
  • 09 - Automating KMS key rotation
  • 10 - Deleting a KMS key
  • 11 - Enabling EBS default encryption
  • 12 - Understanding Secrets Manager
  • 13 - Using Secrets Manager
  • 14 - Enabling autorotation with Secrets Manager
  • 15 - Creating a multi-region secret
  • 16 - Deleting a Secrets Manager secret
  • 17 - Understanding AWS CloudHSM
  • 18 - Understanding Systems Manager
  • 19 - Implementing Systems Manager
  • 20 - Resolving compliance with Systems Manager
  • 21 - Creating Resource Groups
  • 22 - Patching with Systems Manager
  • 23 - Understanding Incident Manager
  • 24 - Using Parameter Store
  • 25 - Understand Certificate Manager
  • 26 - Creating a private certificate authority
  • 27 - Creating a private certificate
  • 28 - Using a private certificate
  • 29 - Understanding Payment Cryptography
  • 30 - Challenge KMS
  • 31 - Solution KMS

  • 08 - 7. S3 Access Management
  • 01 - Exploring S3 management options
  • 02 - Accessing S3 privately
  • 03 - Configuring private S3 access
  • 04 - Managing S3 with IAM
  • 05 - Restricting S3 access with IAM
  • 06 - Validating custom IAM S3 policy
  • 07 - Leveraging S3 IAM policies in EC2
  • 08 - Creating an S3 bucket policy
  • 09 - Illustrating S3 bucket policies with CLI
  • 10 - Understanding S3 access control lists
  • 11 - Understanding public access in S3
  • 12 - S3 public access best practices
  • 13 - Exploring pre-signed URLs
  • 14 - Understanding S3 Access Grants
  • 15 - Understanding S3 Access Points
  • 16 - Exploring S3 Access Points
  • 17 - Understanding data protection schemes
  • 18 - S3 security and compliance best practices
  • 19 - Challenge S3 replication challenge
  • 20 - Solution S3 replication challenge
  • 21 - Challenge S3 lifecycle challenge
  • 22 - Solution S3 lifecycle challenge

  • 09 - 8. Security Audits in AWS
  • 01 - Understanding AWS Security Hub
  • 02 - Using AWS Security Hub
  • 03 - Rotating access keys
  • 04 - Understand AWS Artifact
  • 05 - Understanding Trusted Advisor
  • 06 - Exploring Trusted Advisor
  • 07 - Understanding Audit Manager
  • 08 - Exploring Audit Manager
  • 09 - Prepare for a security audit

  • 10 - Conclusion
  • 01 - Next steps
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 42053
    حجم: 1450 مگابایت
    مدت زمان: 712 دقیقه
    تاریخ انتشار: 21 آذر 1403
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید