PLU | AWS Cloud Security Best Practices (2019 EN)

Discussion in 'Information Technology' started by Kanka, Nov 30, 2019.

  1. Kanka

    Kanka Well-Known Member Loyal User

    Messages:
    16,037
    Likes Received:
    449
    Trophy Points:
    83
    [​IMG]

    Company: Pluralsight
    Author: Joseph Hunsaker
    Full Title: AWS Cloud Security Best Practices
    Year: 2019
    Language: English
    Genre: Educational: Cloud computing
    Skill Level: Intermediate
    Price: -
    -
    Files: MP4 (+ Subtitles .SRT, Slides .PDF)
    Time: 00:42:56
    Video: AVC, 1280 x 720 (1.778) at 30.000 fps, 200 kbps
    Audio: AAC at 96 Kbps, 2 channels, 48.0 KHz



    Security is job zero. Start out on the right foot with AWS Security Checklist. Learn the basics for securing your OS to live in EC2, understand why infrastructure segmentation is critical for security, and move your org to the cloud with the AWS CAF.

    Prevent a breach of security. Protect against data loss or misuse. Keep from ruining your company's reputation. Keep the hackers out! In this course, AWS Cloud Security Best Practices, you will gain the ability to secure your organization’s AWS cloud applications. First, you will learn the fundamentals in the AWS Security Checklist. Next, you will discover what is needed for an operating system to run securely in the cloud, and how to segment AWS infrastructure for maximum security. Finally, you will explore how the AWS Cloud Adoption Framework (CAF) can help your organization move the entire business to the cloud. When you're finished with this course, you will have the skills and knowledge of AWS Security needed to secure your organization’s applications in the cloud.


    Lessons:
    1. Course Overview
    01. Course Overview
    2. Examining the AWS Security Checklist
    02. Introduction
    03. Least Privilege
    04. Handle Keys with Care
    05. Encrypt "All the Things"
    06. Monitor Continuously
    07. Audit Regularly
    3. Securing Operating Systems and Applications
    08. Introduction
    09. Securing Custom AMIs
    10. Common AMI Maintenance
    11. Intervention
    12. Future
    4. Securing Your Infrastructure
    13. Introduction
    14. Network Segmentation and Security Zones
    15. Securing Periphery Systems: User Repositories, DNS, NTP
    5. Introducing the Cloud Adoption Framework
    16. Introduction
    17. Mind the "Gap"
    18. CAF Perspectives and Capabilities
    19. Summary


    -------------