AWS Advanced Security: SecOps Automation for the cloud

Course

Online

£ 12 + VAT

Description

  • Type

    Course

  • Methodology

    Online

  • Start date

    Different dates available

Learn now how to protect your data, and manage your infrastructure in a secure way. There are many useful and powerful features that a customer can use to protect themselves against security incidents & data breaches.Your course instructor[s] are AWS consultants with 16+ years of experience in Cloud & Security.
You will learn about how AWS Security services can be combined to deliver cloud security. All the examples demonstrated are from real-world customer use-cases and are being used in production. The automation templates & scripts provided can be modified by any user to get themselves familiar with these services and deploy in their customer environmentsAt the end of this course, you will be able to confidently able to answer the following questions,How to simplify compliance auditing, security analysis, change management, and operational troubleshooting
How to assess, audit, and automate the remediation of non compliant resources configurations.
Write custom compliance rules to meet organisational needs
How to automatically respond to security incidents. 
How to effectively respond to and mitigate the potential impact of security incidents
You will learn advanced techniques to prepare and respond to security events.
What are different security services offered by AWS?
How to use the AWS security services to comply to a frameworks(for example NIST)?The lectures range from simple security features to really complex event driven systems to keep your AWS accounts in compliance based on a set of rules. All the scripts and commands are on our GitHub repository. You can fork them and try it in your own accounts & laptops.

Facilities

Location

Start date

Online

Start date

Different dates availableEnrolment now open

About this course

Advanced Data Protection in AWS
AWS Advanced Security use-cases
Respond to security incidents with ease
Proactively defend against security threats
AWS Compliance Controls using Automation
Security Best Practices

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

This centre's achievements

2021

All courses are up to date

The average rating is higher than 3.7

More than 50 reviews in the last 12 months

This centre has featured on Emagister for 4 years

Subjects

  • Public
  • Works
  • Compliance
  • Access
  • Accounts
  • Access Control

Course programme

Detective Controls: Introduction 9 lectures 23:11 AWS Config: What Is It? AWS Config: How It Works? AWS Config: Introduction to Config Rules AWS Config: How to configure Config Rules AWS Config: Identify Non Compliant Rules & Resources AWS Config: Introduction to Advanced Querying AWS Config: Advanced Querying In Action AWS Config: Introduction to Multi Account Aggregators Learn how to aggregate compliance status in AWS Detective Controls: Introduction 9 lectures 23:11 AWS Config: What Is It? AWS Config: How It Works? AWS Config: Introduction to Config Rules AWS Config: How to configure Config Rules AWS Config: Identify Non Compliant Rules & Resources AWS Config: Introduction to Advanced Querying AWS Config: Advanced Querying In Action AWS Config: Introduction to Multi Account Aggregators Learn how to aggregate compliance status in AWS AWS Config: What Is It? AWS Config: What Is It? AWS Config: What Is It? AWS Config: What Is It? AWS Config: How It Works? AWS Config: How It Works? AWS Config: How It Works? AWS Config: How It Works? AWS Config: Introduction to Config Rules AWS Config: Introduction to Config Rules AWS Config: Introduction to Config Rules AWS Config: Introduction to Config Rules AWS Config: How to configure Config Rules AWS Config: How to configure Config Rules AWS Config: How to configure Config Rules AWS Config: How to configure Config Rules AWS Config: Identify Non Compliant Rules & Resources AWS Config: Identify Non Compliant Rules & Resources AWS Config: Identify Non Compliant Rules & Resources AWS Config: Identify Non Compliant Rules & Resources AWS Config: Introduction to Advanced Querying AWS Config: Introduction to Advanced Querying AWS Config: Introduction to Advanced Querying AWS Config: Introduction to Advanced Querying AWS Config: Advanced Querying In Action AWS Config: Advanced Querying In Action AWS Config: Advanced Querying In Action AWS Config: Advanced Querying In Action AWS Config: Introduction to Multi Account Aggregators AWS Config: Introduction to Multi Account Aggregators AWS Config: Introduction to Multi Account Aggregators AWS Config: Introduction to Multi Account Aggregators Learn how to aggregate compliance status in AWS Learn how to aggregate compliance status in AWS Learn how to aggregate compliance status in AWS Learn how to aggregate compliance status in AWS Reactive Controls: Automatically Remediate Non Compliant Resources 10 lectures 01:08:33 Introduction to Auto Remediation Automatically Enforce S3 Bucket Versioning Automatically Enforce S3 Bucket Encryption Automatically Enforce 'No Public IPs for EC2 Instances' Policy Automatically Enforce 'No Public IPs for EC2 Instances' Policy Automatically Enforce AMI ID Compliance for all EC2 Instances Automatically Enforce AMI ID Compliance for all EC2 Instances Automatically Enforce compliance to AMI ID by Tags for all EC2 Instances Automatically Enforce compliance to AMI ID by Tags for all EC2 Instances AWS Config: Tribal Knowledge - Common Rules & Best Practices AWS Config: Tribal Knowledge - Common Rules & Best Practices AWS Config: Introduction to Custom Rules AWS Config: Introduction to Custom Rules Monitor & Flag Unused IAM Roles using Config Custom Rules Monitor & Flag Unused IAM Roles using Config Custom Rules Monitor & Flag Users With Excessive Privileges Monitor & Flag Users With Excessive Privileges Reactive Controls: Automatically Remediate Non Compliant Resources Config Custom Rules Monitor & Flag Unused IAM Roles using Config Custom Rules Monitor & Flag Unused IAM Roles using Config Custom Rules Monitor & Flag Unused IAM Roles using Config Custom Rules Monitor & Flag Users With Excessive Privileges Monitor & Flag Users With Excessive Privileges Monitor & Flag Users With Excessive Privileges Monitor & Flag Users With Excessive Privileges Monitor & Flag Users With Excessive Privileges Monitor & Flag Users With Excessive Privileges Monitor & Flag Users With Excessive Privileges Monitor & Flag Users With Excessive Privileges Monitor & Flag Users With Excessive Privileges Monitor & Flag Users With Excessive Privileges Proactive Security Controls 10 lectures 01:51:52 Automatically Remediate AWS Cloutrail Disabling: Monitor, Alert, ReEnable Automatically Remediate AWS Cloutrail Disabling: Monitor, Alert, ReEnable Monitor & Automatically Revoke Unintended IAM Access Monitor & Automatically Revoke Unintended IAM Access Automatically Remove Unused Security Groups Automatically Remove Unused Security Groups Proactively monitor & fix bad or overly permissive S3 Object ACLs Proactively monitor & fix bad or overly permissive S3 Object ACLs Proactively monitor and fix bad or overly permissive S3 Bucket Policies Proactively monitor and fix bad or overly permissive S3 Bucket Policies Proactively monitor and respond to failed SSH logins to EC2 Instances Proactively monitor and respond to failed SSH logins to EC2 Instances Automatically rotate EC2 SSH keys for ALL your instances reliably Automatically rotate EC2 SSH keys for ALL your instances reliably Proactively Block S3 Public Access At Scale Proactively Block S3 Public Access At Scale Attribute Based Access Control: Proactively Restrict S3 Access based on UserTags Attribute Based Access Control: Proactively Restrict S3 Access based on UserTags Attribute Based Access Control: Proactively Restrict Access To EC2 Based On Tags Attribute Based Access Control: Proactively Restrict Access To EC2 Based On Tags Proactive Security Controls 10 lectures 01:51:52 Automatically Remediate AWS Cloutrail Disabling: Monitor, Alert, ReEnable Automatically Remediate AWS Cloutrail Disabling: Monitor, Alert, ReEnable Monitor & Automatically Revoke Unintended IAM Access Monitor & Automatically Revoke Unintended IAM Access Automatically Remove Unused Security Groups Automatically Remove Unused Security Groups Proactively monitor & fix bad or overly permissive S3 Object ACLs Proactively monitor & fix bad or overly permissive S3 Object ACLs Proactively monitor and fix bad or overly permissive S3 Bucket Policies Proactively monitor and fix bad or overly permissive S3 Bucket Policies Proactively monitor and respond to failed SSH logins to EC2 Instances Proactively monitor and respond to failed SSH logins to EC2 Instances Automatically rotate EC2 SSH keys for ALL your instances reliably Automatically rotate EC2 SSH keys for ALL your instances reliably Proactively Block S3 Public Access At Scale Proactively Block S3 Public Access At Scale Attribute Based Access Control: Proactively Restrict S3 Access based on UserTags Attribute Based Access Control: Proactively Restrict S3 Access based on UserTags Attribute Based Access Control: Proactively Restrict Access To EC2 Based On Tags Attribute Based Access Control: Proactively Restrict Access To EC2 Based On Tags Automatically Remediate AWS Cloutrail Disabling: Monitor, Alert, ReEnable Automatically Remediate AWS Cloutrail Disabling: Monitor, Alert, ReEnable Automatically Remediate AWS Cloutrail Disabling: Monitor, Alert, ReEnable Automatically Remediate AWS Cloutrail Disabling: Monitor, Alert, ReEnable Automatically Remediate AWS Cloutrail Disabling: Monitor, Alert, ReEnable Automatically Remediate AWS Cloutrail Disabling: Monitor, Alert, ReEnable Automatically Remediate AWS Cloutrail Disabling: Monitor, Alert, ReEnable Automatically Remediate AWS Cloutrail Disabling: Monitor, Alert, ReEnable Automatically Remediate AWS Cloutrail Disabling: Monitor, Alert, ReEnable Automatically Remediate AWS Cloutrail Disabling: Monitor, Alert, ReEnable Monitor & Automatically Revoke Unintended IAM Access Monitor & Automatically Revoke Unintended IAM Access Monitor & Automatically Revoke Unintended IAM Access Monitor & Automatically Revoke Unintended IAM Access Monitor & Automatically Revoke Unintended IAM Access Monitor & Automatically Revoke Unintended IAM Access Monitor & Automatically Revoke Unintended IAM Access Monitor & Automatically Revoke Unintended IAM Access Monitor & Automatically Revoke Unintended IAM Access Monitor & Automatically Revoke Unintended IAM Access Automatically Remove Unused Security Groups Automatically Remove Unused Security Groups Automatically Remove Unused Security Groups Automatically Remove Unused Security Groups Automatically Remove Unused Security Groups Automatically Remove Unused Security...

Additional information

Knowledge of AWS Cloud Desire to learn and be curious about security

AWS Advanced Security: SecOps Automation for the cloud

£ 12 + VAT