Learn now how to protect your data, and manage your infrastructure in a secure way. There are many useful and powerful features that a customer can use to protect themselves against security incidents & data breaches.Your course instructor[s] are AWS consultants with 16+ years of experience in Cloud & Security.
You will learn about how AWS Security services can be combined to deliver cloud security. All the examples demonstrated are from real-world customer use-cases and are being used in production. The automation templates & scripts provided can be modified by any user to get themselves familiar with these services and deploy in their customer environmentsAt the end of this course, you will be able to confidently able to answer the following questions,How to simplify compliance auditing, security analysis, change management, and operational troubleshooting
How to assess, audit, and automate the remediation of non compliant resources configurations.
Write custom compliance rules to meet organisational needs
How to automatically respond to security incidents.
How to effectively respond to and mitigate the potential impact of security incidents
You will learn advanced techniques to prepare and respond to security events.
What are different security services offered by AWS?
How to use the AWS security services to comply to a frameworks(for example NIST)?The lectures range from simple security features to really complex event driven systems to keep your AWS accounts in compliance based on a set of rules. All the scripts and commands are on our GitHub repository. You can fork them and try it in your own accounts & laptops.
Facilities
Location
Start date
Online
Start date
Different dates availableEnrolment now open
About this course
Advanced Data Protection in AWS
AWS Advanced Security use-cases
Respond to security incidents with ease
Proactively defend against security threats
AWS Compliance Controls using Automation
Security Best Practices
Questions & Answers
Add your question
Our advisors and other users will be able to reply to you
We are verifying your question adjusts to our publishing rules. According to your answers, we noticed you might not be elegible to enroll into this course, possibly because of: qualification requirements, location or others. It is important you consult this with the Centre.
Thank you!
We are reviewing your question. We will publish it shortly.
Or do you prefer the center to contact you?
Reviews
Have you taken this course? Share your opinion
This centre's achievements
2021
All courses are up to date
The average rating is higher than 3.7
More than 50 reviews in the last 12 months
This centre has featured on Emagister for 4 years
Subjects
Public
Works
Compliance
Access
Accounts
Access Control
Course programme
Detective Controls: Introduction
9 lectures23:11AWS Config: What Is It?AWS Config: How It Works?AWS Config: Introduction to Config RulesAWS Config: How to configure Config RulesAWS Config: Identify Non Compliant Rules & ResourcesAWS Config: Introduction to Advanced QueryingAWS Config: Advanced Querying In ActionAWS Config: Introduction to Multi Account AggregatorsLearn how to aggregate compliance status in AWS
Detective Controls: Introduction
9 lectures23:11AWS Config: What Is It?AWS Config: How It Works?AWS Config: Introduction to Config RulesAWS Config: How to configure Config RulesAWS Config: Identify Non Compliant Rules & ResourcesAWS Config: Introduction to Advanced QueryingAWS Config: Advanced Querying In ActionAWS Config: Introduction to Multi Account AggregatorsLearn how to aggregate compliance status in AWSAWS Config: What Is It?AWS Config: What Is It?AWS Config: What Is It?AWS Config: What Is It?AWS Config: How It Works?AWS Config: How It Works?AWS Config: How It Works?AWS Config: How It Works?AWS Config: Introduction to Config RulesAWS Config: Introduction to Config RulesAWS Config: Introduction to Config RulesAWS Config: Introduction to Config RulesAWS Config: How to configure Config RulesAWS Config: How to configure Config RulesAWS Config: How to configure Config RulesAWS Config: How to configure Config RulesAWS Config: Identify Non Compliant Rules & ResourcesAWS Config: Identify Non Compliant Rules & ResourcesAWS Config: Identify Non Compliant Rules & ResourcesAWS Config: Identify Non Compliant Rules & ResourcesAWS Config: Introduction to Advanced QueryingAWS Config: Introduction to Advanced QueryingAWS Config: Introduction to Advanced QueryingAWS Config: Introduction to Advanced QueryingAWS Config: Advanced Querying In ActionAWS Config: Advanced Querying In ActionAWS Config: Advanced Querying In ActionAWS Config: Advanced Querying In ActionAWS Config: Introduction to Multi Account AggregatorsAWS Config: Introduction to Multi Account AggregatorsAWS Config: Introduction to Multi Account AggregatorsAWS Config: Introduction to Multi Account AggregatorsLearn how to aggregate compliance status in AWSLearn how to aggregate compliance status in AWSLearn how to aggregate compliance status in AWSLearn how to aggregate compliance status in AWS
Reactive Controls: Automatically Remediate Non Compliant Resources
10 lectures01:08:33Introduction to Auto RemediationAutomatically Enforce S3 Bucket VersioningAutomatically Enforce S3 Bucket EncryptionAutomatically Enforce 'No Public IPs for EC2 Instances' PolicyAutomatically Enforce 'No Public IPs for EC2 Instances' PolicyAutomatically Enforce AMI ID Compliance for all EC2 InstancesAutomatically Enforce AMI ID Compliance for all EC2 InstancesAutomatically Enforce compliance to AMI ID by Tags for all EC2 InstancesAutomatically Enforce compliance to AMI ID by Tags for all EC2 InstancesAWS Config: Tribal Knowledge - Common Rules & Best PracticesAWS Config: Tribal Knowledge - Common Rules & Best PracticesAWS Config: Introduction to Custom RulesAWS Config: Introduction to Custom RulesMonitor & Flag Unused IAM Roles using Config Custom RulesMonitor & Flag Unused IAM Roles using Config Custom RulesMonitor & Flag Users With Excessive PrivilegesMonitor & Flag Users With Excessive Privileges
Reactive Controls: Automatically Remediate Non Compliant Resources Config Custom RulesMonitor & Flag Unused IAM Roles using Config Custom RulesMonitor & Flag Unused IAM Roles using Config Custom RulesMonitor & Flag Unused IAM Roles using Config Custom RulesMonitor & Flag Users With Excessive PrivilegesMonitor & Flag Users With Excessive PrivilegesMonitor & Flag Users With Excessive PrivilegesMonitor & Flag Users With Excessive PrivilegesMonitor & Flag Users With Excessive PrivilegesMonitor & Flag Users With Excessive PrivilegesMonitor & Flag Users With Excessive PrivilegesMonitor & Flag Users With Excessive PrivilegesMonitor & Flag Users With Excessive PrivilegesMonitor & Flag Users With Excessive Privileges
Proactive Security Controls
10 lectures01:51:52Automatically Remediate AWS Cloutrail Disabling: Monitor, Alert, ReEnableAutomatically Remediate AWS Cloutrail Disabling: Monitor, Alert, ReEnableMonitor & Automatically Revoke Unintended IAM AccessMonitor & Automatically Revoke Unintended IAM AccessAutomatically Remove Unused Security GroupsAutomatically Remove Unused Security GroupsProactively monitor & fix bad or overly permissive S3 Object ACLsProactively monitor & fix bad or overly permissive S3 Object ACLsProactively monitor and fix bad or overly permissive S3 Bucket PoliciesProactively monitor and fix bad or overly permissive S3 Bucket PoliciesProactively monitor and respond to failed SSH logins to EC2 InstancesProactively monitor and respond to failed SSH logins to EC2 InstancesAutomatically rotate EC2 SSH keys for ALL your instances reliablyAutomatically rotate EC2 SSH keys for ALL your instances reliablyProactively Block S3 Public Access At ScaleProactively Block S3 Public Access At ScaleAttribute Based Access Control: Proactively Restrict S3 Access based on UserTagsAttribute Based Access Control: Proactively Restrict S3 Access based on UserTagsAttribute Based Access Control: Proactively Restrict Access To EC2 Based On TagsAttribute Based Access Control: Proactively Restrict Access To EC2 Based On Tags
Proactive Security Controls
10 lectures01:51:52Automatically Remediate AWS Cloutrail Disabling: Monitor, Alert, ReEnableAutomatically Remediate AWS Cloutrail Disabling: Monitor, Alert, ReEnableMonitor & Automatically Revoke Unintended IAM AccessMonitor & Automatically Revoke Unintended IAM AccessAutomatically Remove Unused Security GroupsAutomatically Remove Unused Security GroupsProactively monitor & fix bad or overly permissive S3 Object ACLsProactively monitor & fix bad or overly permissive S3 Object ACLsProactively monitor and fix bad or overly permissive S3 Bucket PoliciesProactively monitor and fix bad or overly permissive S3 Bucket PoliciesProactively monitor and respond to failed SSH logins to EC2 InstancesProactively monitor and respond to failed SSH logins to EC2 InstancesAutomatically rotate EC2 SSH keys for ALL your instances reliablyAutomatically rotate EC2 SSH keys for ALL your instances reliablyProactively Block S3 Public Access At ScaleProactively Block S3 Public Access At ScaleAttribute Based Access Control: Proactively Restrict S3 Access based on UserTagsAttribute Based Access Control: Proactively Restrict S3 Access based on UserTagsAttribute Based Access Control: Proactively Restrict Access To EC2 Based On TagsAttribute Based Access Control: Proactively Restrict Access To EC2 Based On TagsAutomatically Remediate AWS Cloutrail Disabling: Monitor, Alert, ReEnableAutomatically Remediate AWS Cloutrail Disabling: Monitor, Alert, ReEnableAutomatically Remediate AWS Cloutrail Disabling: Monitor, Alert, ReEnableAutomatically Remediate AWS Cloutrail Disabling: Monitor, Alert, ReEnableAutomatically Remediate AWS Cloutrail Disabling: Monitor, Alert, ReEnableAutomatically Remediate AWS Cloutrail Disabling: Monitor, Alert, ReEnableAutomatically Remediate AWS Cloutrail Disabling: Monitor, Alert, ReEnableAutomatically Remediate AWS Cloutrail Disabling: Monitor, Alert, ReEnableAutomatically Remediate AWS Cloutrail Disabling: Monitor, Alert, ReEnableAutomatically Remediate AWS Cloutrail Disabling: Monitor, Alert, ReEnableMonitor & Automatically Revoke Unintended IAM AccessMonitor & Automatically Revoke Unintended IAM AccessMonitor & Automatically Revoke Unintended IAM AccessMonitor & Automatically Revoke Unintended IAM AccessMonitor & Automatically Revoke Unintended IAM AccessMonitor & Automatically Revoke Unintended IAM AccessMonitor & Automatically Revoke Unintended IAM AccessMonitor & Automatically Revoke Unintended IAM AccessMonitor & Automatically Revoke Unintended IAM AccessMonitor & Automatically Revoke Unintended IAM AccessAutomatically Remove Unused Security GroupsAutomatically Remove Unused Security GroupsAutomatically Remove Unused Security GroupsAutomatically Remove Unused Security GroupsAutomatically Remove Unused Security GroupsAutomatically Remove Unused Security...
Additional information
Knowledge of AWS Cloud
Desire to learn and be curious about security