It is essential to ensure your cloud solution follows the best practices in governance, security operations, and acceptable risk. In this course, AWS Security Operations: Securing Core AWS Infrastructure Services, you'll learn how to define and deploy resources based on the defined level of acceptable risk and compliance requirements defined by your company and your needs. First, you'll start by looking at the management of access control and take a look at identity and access management controlling access to resources using IAM controls. Next, users, groups, and role-based policies are covered along with the different security tools that can be used for carrying out these tasks. Then, you'll take a look at securing your core infrastructure including EC2 instances, EBS volumes, and VPC creation and security options. Finally, you'll finish off the course by looking at the concept of edge locations specifically looking at elastic load-balancing both classic and application based route 53 DNS services, and the web application firewall and AWS shield services. By the end of this course, you'll have the knowledge to keep the core AWS infrastructure services in your environment secure.
Mark is a former electronic design technologist turned Microsoft and IBM SoftLayer cloud geek. Mark has created many instructor led, e-learning, and self-paced courses over the last 15 years from Active Directory to Group Policy and enjoys training and sharing information to help people understand technology. He is also an avid musician and composer.
Course Overview He there, Mark Wilkins checking in. Welcome to my class AWS Security Operations: Designing for Securing Core Infrastructure, and just between you and me, getting to that sweet spot is hard, and that's why this course has been developed, to help you understand the toolbox, the set of tools available at AWS to secure your workloads. Now I work a lot with Amazon Web Services with different customers that are hosting workloads in the cloud and I'm certificated in Amazon architecture and Amazon system operations, and I have a great deal of background in IBM software, Microsoft Azure. So I'm certifiable and dangerous. So in this course we're going to take a look at securing core infrastructure based against governance, risk and compliance and the regulations in the industry and align that to your company when you're moving to Amazon. What you have to look out for when considering your security design. So we'll start by defining just what identity and access management is, then we'll take a look at EC two instance security and the virtual private cloud. That is your software defined network within Amazon. And then we'll end each module with Amazon best practices, giving you the skills and ability to design your own infrastructure. I should mention this class is also the baseline for a new Amazon security certification starting in 2017. Sound good? Hope to see you in class.