This course demonstrates how to utilize Amazon Web Services (AWS) managed security services and features to stay safe and compliant while operating in the AWS Cloud, following recommended security best practices.
Designing with a security mindset when considering all aspects of your AWS deployment is essential to ensure your cloud solution follows the best practices in governance, security operations, and acceptable risk. In this course, AWS Security Operations: Securing Managed Services, you'll learn how to use the built-in security tools at AWS to gather the most up-to-date knowledge managing your AWS solutions, utilizing security best practices. First, you'll discover how to monitor, analyze, and fix security issues based on the defined level of acceptable risk and compliance requirements for your company. Next, you'll explore what security tools are available and what role each tool plays in managing security at AWS. Finally, you'll delve into suggested best practices for planning your security and compliance model for your AWS deployment. When you're finished with this course, you'll have the skills and knowledge needed to define how compliance and security is designed and implemented when operating workloads in the AWS cloud.
Mark is a former electronic design technologist turned Microsoft and IBM SoftLayer cloud geek. Mark has created many instructor led, e-learning, and self-paced courses over the last 15 years from Active Directory to Group Policy and enjoys training and sharing information to help people understand technology. He is also an avid musician and composer.
Course Overview [Autogenerated] Wilkins checking in. Welcome to my class on AWS security operations, where we're looking at AWS managed services now. I spend quite a bit of my time are protecting Amazon Web solutions with customers that are wanting to move to the cloud, and they're concerned about security and having to deal with compliance standards on tram and then looking at it in cloud. So there's a bit of fear about working in the cloud, even though they've signed up for it and there's no turning back. So hopefully, if you're looking at this class, you're probably worried about security, loss of control and what I like to call a high level of customer paranoia because we don't get to know everything that goes on below the hood or in the basement of Amazon. So we have to trust. And since we're in the cloud running services, we have to know when things go bad in the area of security. So we have to monitor everything 24 7, maybe 25 7 And once we monitor, we get a lot of detail, and then maybe we want to automate our solution. So if you have questions on monitoring what security tools are available on what those tools can tell you. Then you're in the right place. If you're having trouble with your auditor managing compliance and eight of us, and you want to know how you can monitor pretty well, everything in the Amazon cloud, then you're really in the right place. All you need is coffee, lots of coffee or beverage of choice. Now this class is one in a series of four classes looking at the security aspects of Amazon and their AWS cloud environment. So I hope you'll join me and have some fun looking at security and compliance and who keeps logging into the Web server at three o'clock in the morning, really?