Learn how to use CloudWatch for monitoring, CloudTrail for auditing, Config for resource compliance, and Trusted Advisor for warnings. Explore how to protect against DDOS attacks with the WAF and use the API Gateway for creating and hosting APIs.
Many applications at AWS are over-hosted. In this course, Securing Applications on AWS, you will gain knowledge about how to protect over-hosted applications at AWS using a variety of powerful management tools provided by Amazon.
First, you will look at the Web Application Firewall (WAF) and see how to protect against unwanted access from incoming public traffic, you will explore the API Gateway and how you can create and host APIs at AWS, and you will dive into Amazon Cognito which allows you to create user and identity pools that allow internal and external authentication and single sign-on access.
Next, you will look at the operation of CloudWatch and its use of metrics which allow you to manage all of your AWS resources, as well as CloudTrail which helps to monitor all activity in your AWS account.
Finally, you will see how to use TrustedAdvisor to alert you to account issues, and AWS Config to set rules for managing your infrastructure resources.
When you are done with this course, you will know how to monitor, audit, protect, and take many other actions towards protecting your applications hosted on AWS.
Mark is a former electronic design technologist turned Microsoft and IBM SoftLayer cloud geek. Mark has created many instructor led, e-learning, and self-paced courses over the last 15 years from Active Directory to Group Policy and enjoys training and sharing information to help people understand technology. He is also an avid musician and composer.
Course Overview Hi. Mark Wilkins checking in. I want to tell you a little bit about this class, Securing Applications on AWS. If your company is supporting applications hosted at AWS, then, of course, security is a top priority; however, application security in the cloud is a little more complicated. First of all, you have to be able to securely authenticate to your application. Next, you'll need to track who's doing what in your AWS account. And having a little help provided along the way by automation means you don't have to do as many manual tasks. That probably sounds pretty good as well. We will talk about authentication with Cognito. We will look at how we log what's going on in your AWS account with CloudTrail and how we can create alarms and alerts with the monitoring service, CloudWatch. And we'll also take a look at Trusted Advisor, which can give us advice on what we should do and what we aren't doing. For further protecting your incoming traffic against DDoS attacks, we can use the web application firewall. Finally, if you're a developer and you're developing applications at AWS, you probably want to know what the API Gateway is and how it can help you with creating hosted mobile applications. Please join me for Securing Applications on AWS, and we will learn how to use these managed services to help secure your applications running at AWS. I hope to see you in class.