Cloud Security on AWS
- Offered byCoursera
Cloud Security on AWS at Coursera Overview
Duration | 3 hours |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Official Website | Explore Free Course |
Credential | Certificate |
Cloud Security on AWS at Coursera Highlights
- Earn a certificate from Edureka
- Add to your LinkedIn profile
Cloud Security on AWS at Coursera Course details
- What you'll learn
- Learn AWS cloud security essentials: challenges, AWS services, advanced techniques, network security, encryption, breach response, compliance.
- Welcome to the Cloud Security on AWS course, where you'll embark on a journey to acquire practical expertise in building a robust understanding of cloud security fundamentals, AWS security services, advanced threat detection, secure network design, data protection, encryption techniques, and incident response planning while ensuring compliance with AWS standards and governance best practices. Throughout this short course, you'll explore the Amazon Security Services and delve into various features and functionalities. By the end of this course, you will be able to:
- By the end of this course, you'll be able to:
- - Evaluate and implement effective strategies and countermeasures to detect and counteract security threats.
- - Apply secure methods for managing identities, permissions, and access controls within AWS.
- - Explore the fundamental concepts of AWS security, including services, features, and pillars.
- Design and deploy secure network architectures to safeguard data transmission and protect applications.
- - Acquire knowledge about AWS compliance standards and best practices for governance to ensure adherence to regulatory requirements.
- - Design plans to identify, assess, and respond promptly to security incidents, ensuring a swift and efficient response.
- - Apply encryption, key management, and secure storage solutions to protect sensitive data effectively.
- This course is tailored for IT professionals, cloud security architects, developers, DevOps engineers, cybersecurity specialists, compliance and governance professionals, security analysts, and incident responders. A good understanding of fundamental cloud computing concepts and basic knowledge of AWS services is necessary.
- Secure Your Cloud Journey: Dive into AWS Cloud Security, Where Innovation Meets Safety!
Cloud Security on AWS at Coursera Curriculum
Getting Started with AWS Cloud Security
Course Introductory Video
Applying the AWS Shared Responsibility Model
Getting Started with AWS Cloud Essentials
Explore the AWS Security Services, Foundations and its's Pillars
Managing AWS Risk and Compliance program
Securely Manage AWS Identity and Access Management (IAM)
Centrally Manage AWS IAM Identity Center (successor to SSO)
Implement Secure Identity Management and User Authentication to Amazon Cognito
Access Control on Amazon Verified Permissions
Centralized User and Device Management for AWS Directory Service
Automate Security Checks, Centralize Alerts with AWS Security Hub
Protect AWS accounts with threat detection using Amazon GuardDuty
Continual vulnerability management at scale with Amazon Inspector
Observe and Monitor Resources and Applications on AWS with Amazon CloudWatch
Centralized Firewall Rule Management with AWS Firewall Manager
Deploy VPC Network Firewall Security using AWS Network Firewall
Protect Web Applications from Exploits with AWS Web Application Firewall (WAF)
Filter and control outbound DNS traffic for your VPCs with Amazon Route 53 Resolver DNS Firewall
Discover and Protect your Sensitive Data at Scale with Amazon Macie
Create and Control Keys to Encrypt using AWS Key Management Service (AWS KMS)
Centrally Manage Secrets using AWS Secrets Manager
Analyze and visualize security data to investigate potential security issues with Amazon Detective
Scalable, cost-effective application recovery to AWS using AWS Elastic Disaster Recovery
No cost, Self-service Portal for On-demand Access to AWS Compliance Reports with AWS Artifact
Course Overview
How to Use Discussion Forums
Simply and Securely Share your AWS Resources with AWS Resource Access Manager
Centrally Manage the Enviroment with AWS Organizations
Assess, Audit, and Evaluate Resource Configurations using AWS Config
Track user activity and API usage with AWS CloudTrail
Managed DDoS Protection through AWS Shield
Secure Access to Corporate Applications without a VPN using AWS Verified Access
Manage HSMs on AWS with AWS CloudHSM
Provision SSL/TLS certificates using AWS Certificate Manager
Simplifying AWS Usage Auditing for Risk & Compliance with AWS Audit Manager
Course Synopsis
Knowledge Check: Securely Manage Identity and Access Management
Knowledge Check: Network and Application Protection
End Course Knowledge Check
How is the Shared Responsibility Model in AWS security impacting customers and the vulnerability of data?
Are AWS Resources Isolated Based on Least Privilege Principles?
How do you Monitor and Respond to Security Incidents in Real-Time using AWS Security Tools and Services?
Is there a process for regularly reviewing and updating security groups and NACL rules?
Have you identified all the applications, services, and processes that need access to the stored secrets?
How can AWS Detective be Utilized in the Industrial Sector to Analyze and Visualize Security Data, Aiding in the Investigation of Potential Security Issues?