AWS: Getting Started with Cloud Security
About this Course
Data security is on the forefront of everyone’s mind these days, with data breaches, denial of service attacks, ransomware and malware being common news stories. In this course two of Amazon Web Services’ Solutions Architects will provide you with a foundational understanding of cloud security, compliance and the AWS shared responsibility model. They will then discuss more technical content by looking at various security controls such as identity and access management services, directory services, network isolation and connectivity options, auditing, monitoring, encryption and managing secrets. This course will cover a number of AWS services, such as Amazon VPC, Amazon CloudWatch, AWS CloudTrail, Amazon GuardDuty, AWS Security Hub, Amazon S3, Amazon EBS, Amazon EC2, and AWS Secrets Manager, among others. Several demonstrations are provided throughout the course to provide a practical example of the concepts that have been discussed. Class discussions will provide an opportunity for you to interact with fellow students as well as AWS training staff.Created by: Amazon Web Services
Level: Introductory
Related Online Courses
Housing and Cities is a design-oriented architecture course that focuses on key moments of European urban housing history. It looks into ordinary or replicated housing types of different social... more
Commencer à utiliser un logiciel est toujours délicat, on ne sait jamais par où commencer. Dans ce cours nous allons nous concentrer sur la maîtrise d’Octave et MATLAB, de façon à pouvoir par la ... more
For over 25 years, SOLIDWORKS has been the trusted industry standard in mechanical design and engineering. Intuitive 3D modeling and product development solutions from SOLIDWORKS help you... more
New to the cloud and not sure where to begin? This introductory course, taught by cloud experts from The Linux Foundation, will help you grasp the basics of cloud computing and comprehend the... more
Information security refers to securing data and information systems from unauthorized access, unauthorized use, misuse, destruction, or alteration. The goal of information security is to protect... more