Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Clear and Simple AWS Advanced Security 2022
Introduction
Getting Certified (6:07)
Disclaimer (1:30)
Demo: Create a Billing Alert (5:06)
IAM - Identity and Access Management
About this Section (0:45)
The Shared Responsibility Model (8:53)
Demo: Day 1 AWS Account Security (8:49)
Demo: Managing IAM Users and Groups (5:37)
Demo: IAM Managed, Customer Managed, and Inline Policies (5:26)
Demo: Working with AWS IAM Policies (16:50)
AWS Organizations Security (12:51)
AWS Organizations and the Root User (1:26)
Section Quiz
S3 Security
S3 Bucket Policies and IAM Introduction (0:58)
Demo: Controlling S3 Access with IAM and Bucket Policies - Part 1 (15:41)
Demo: S3 Bucket Policy Conflicts (10:07)
Demo: S3 Bucket Access Lists (18:50)
Demo: S3 Policy Conflicts in Action (9:31)
Demo: S3 Encryption in Transit (6:34)
S3 Cross-Region Replication Security (11:39)
Demo: Create an EC2 Instance with S3 Access (5:25)
Demo: S3 Pre-Signed URLs (5:40)
Demo: Glacier Vault Lock (5:01)
Exam Scenario: EC2 Instance with S3 Access (5:05)
Using a CloudFront OAI to Protect S3 (19:30)
Section Quiz
Identity Federations
AWS Security Token Service (STS) (7:16)
Demo: AWS Cross-Account Access (21:06)
Third Party Access to AWS with External IDs (2:28)
Introduction to AWS Cognito (2:47)
Demo: Configure AWS Cognito (10:00)
AWS Secrets Manager with RDS, EC2, and Lambda (4:01)
Systems Manager Demo (7:35)
Demo: Session Manager (6:16)
Demo: AWS Systems Manager Parameter Store (5:03)
Active Directory Federation (ADFS) with AWS (10:23)
Section Quiz
Monitoring, Logging, and Alerting
AWS CloudTrail for Security (8:27)
Demo: AWS CloudTrail Configuration (11:46)
Demo: Securing AWS CloudTrail Logs (11:42)
AWS CloudWatch for Security (7:22)
Demo: Create a CloudWatch Dashboard (7:22)
Demo: AWS CloudWatch Logs (3:18)
Demo: CloudWatch Events Configuration (5:05)
Creating CloudWatch Alarms for CloudTrail Events (14:22)
CloudWatch and CloudTrail FAQs (0:52)
AWS Config for Security (7:17)
Demo: Configuring Rules for AWS Config (17:17)
AWS Inspector (17:57)
AWS Trusted Advisor (5:25)
EC2 Instance Metadata (3:15)
Section Quiz
Key Management
Introduction to AWS Key Management Service (KMS) (12:49)
AWS KMS Example - Encrypting EBS Volumes with the CMK (6:36)
Demo: Monitoring for Disabled Keys with AWS CloudWatch (5:27)
Review: Create an EC2 Instance with S3 Access (4:10)
Demo: Using AWS KMS to Protect Objects in S3 (26:27)
Uploading External Keys into AWS KMS (10:20)
Demo: AWS EC2 Instances and Key Pairs (8:43)
Demo: Adding a New Key Pair to an AWS EC2 Instance (10:03)
Demo: Deleting Key Pairs from an EC2 Instance (10:31)
KMS Grants (1:59)
Section Quiz
VPC Security and Monitoring
Networking and the Security Specialty Exam (1:29)
AWS VPC Concepts Review (6:48)
Demo: Create an AWS VPC with Security in Mind (10:30)
Demo: Create an Internet Gateway for an AWS VPC (3:57)
Demo: Create Public and Private Subnets in an AWS VPC (7:15)
Demo: Create a Bastion Host to Access Private Instances (6:04)
NAT Gateways in an AWS VPC (3:41)
Demo: Create a NAT Gateway in the AWS Console (8:40)
Introduction to Security Groups as Stateful Firewalls (6:39)
Security Groups and Network ACLs (7:07)
Demo: Configure VPC Flow Logs to Monitor AWS VPC Traffic (14:38)
Section Quiz
Security Solutions
SSL and Elastic Load Balancers (9:50)
Demo: AWS Web Application Firewall (WAF) (19:41)
Introduction to AWS Shield (3:22)
Third-Party Web Application Firewalls (WAF) in the AWS Marketplace (3:59)
VPC Endpoints with S3 and DynamoDB (10:31)
VPC Endpoints and AWS KMS (1:15)
AWS Athena (3:15)
AWS Macie (3:20)
AWS GuardDuty (9:15)
AWS Artifact (3:33)
Demo: Session Manager (11:38)
Section Quiz
Security Incident Response
AWS DDoS Resiliency (16:25)
Incident Response - EC2 Compromise (8:19)
Incident Response - Access Keys Exposed (7:15)
Performing Penetration Tests on an AWS Account (4:14)
AWS Certificate Manager (13:10)
Section Quiz
Container Security
About this Section (0:33)
Introduction to Microservices (6:04)
Introduction to Containers (7:52)
Demo: AWS Elastic Container Service (ECS) (10:21)
ECS Security Best Practices (4:44)
Practice Tests
How to use the Practice Test (1:54)
Practice Test
AWS KMS Example - Encrypting EBS Volumes with the CMK
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock