تبلیغات

آشنایی با AWS Cloud Security

دسته بندی ها: وب سرویس آمازون (AWS) ، آموزش های Pearson ، آموزش شبکه ، آموزش امنیت شبکه

بیش از 6.5 ساعت آموزش ویدئویی برای کمک به یادگیری مهارت های لازم برای اجرای امنیت در یک محیط Amazon Web Services (AWS) Cloud در این دوره گردآوری شده است. در این دوره با پلتفرم رایانش ابری آشنا می شوید. کمک به محافظت از محرمانه بودن، یکپارچگی و در دسترس بودن (CIA) سیستم ها و داده های شما از اهمیت زیادی برخوردار است. زیرساخت AWS  طراحی شده است تا به عنوان یکی از انعطاف پذیر ترین و محرمانه ترین محیط های رایانش ابری امروزی محسوب می شود. این دوره به بررسی قابلیت های استقرار سریع AWS، متدهای ایمن سازی سرویس های ابری می پردازد. علاوه بر این، پیاده سازی مناسب ترین کنترل های امنیتی برای توابع کاری در محیط AWS از طریق اعمال درجه های مختلف دسترسی محدود به محیط ها بر اساس حساسیت داده ها را توضیح می دهد. سپس، سرویس ها و بهترین شیوه های AWS در زمینه های امنیت و انطباق را آموزش می دهد و محافظت از داده، مدیریت دسترسی و هویت، لاگ کردن و نظارت بر تضمین ایمن بودن محیط AWS را شرح می دهد.

سرفصل:

  • معرفی دوره
  • اصول امنیت AWS
  • مدل مسئولیت امنیتی مشترک AWS
  • خدمات مطابقت AWS
  • درک کاربر و مجوزها
  • هویت و مدیریت دسترسی (IAM)
  • NACLs و گروه های امنیتی
  • کار با  Network ACLs
  • AWS WAF و AWS Shield
  • اعمال بهترین شیوه های محافظت از بدافزارها
  • خدمات رمزنگاری
  • مدیریت کلیدی
  • کار با AWS KMS
  • قابلیت دید و گزارش دهی
  • درک CIA
  • تهدیدات رایج به سرویس های AWS
  • درک AWS Cognito
  • و غیره
آیا این نوشته را دوست داشتید؟
AWS Cloud Security Publisher: Pearson IT Certification Author:Michael Shannon Duration:+6.5 h


More than 6.5 hours of video instruction to help you learn the skills necessary to implement security in an Amazon Web Services (AWS) Cloud environment.
AWS Cloud Security LiveLessons explores Amazon Web Services (AWS), which offers a scalable cloud computing platform designed for high availability and reliability, providing the tools that allow you to run a wide range of applications. Helping to protect the confidentiality, integrity, and availability (CIA) of your systems and data is of the utmost importance. The AWS infrastructure has been architected to be one of the most flexible and secure cloud computing environments available today. It is designed to provide an extremely scalable, highly reliable platform that allows customers to deploy applications and data quickly and securely.
This course first covers the basics and rapid deployment capabilities of AWS to build a knowledge foundation for individuals who are brand new to cloud computing and AWS. You will explore the methods that AWS uses to secure their cloud services. You will learn how you, as an AWS customer, can have the most secure cloud solution possible for a wide variety of implementation scenarios. This course delves into the flexibility and agility needed to implement the most applicable security controls for your business functions in the AWS environment through deploying varying degrees of restrictive access to environments based on data sensitivity.
Through onscreen demos and detailed instruction, seasoned presenter Michael J. Shannon takes you through the key facets of AWS best practices and services in the areas of shared security and compliance; identity and access management; infrastructure security; data protection; and logging and monitoring to ensure that your AWS environment remains secure.
Topics include:
AWS Security Fundamentals
AWS Shared Security Responsibility Model
AWS Compliance Services
Understanding Users and Credentials
Identity and Access Management (IAM)
NACLs and Security Groups
AWS WAF and AWS Shield
Cryptographic Services
Key Management
Visibility and Reporting
Table of Contents
Introduction
AWS Cloud Security: Introduction 00:01:55
Module 1: Amazon Web Services Foundations
Module introduction 00:00:27
Lesson 1: AWS Security Fundamentals
Learning objectives 00:00:24
1.1 Understanding the CIA Triad 00:08:42
1.2 Examining Types and Categories of Controls 00:07:32
1.3 Reviewing Core AWS Services 00:11:56
1.4 Surveying Common Threats to AWS Services 00:10:19
Lesson 2: AWS Shared Security Responsibility Model
Learning objectives 00:00:32
2.1 Understanding the Shared Security Responsibility Model 00:04:41
2.2 Establishing AWS Responsibilities: Security of the Cloud 00:05:45
2.3 Establishing Customer Responsibilities: Security in the Cloud 00:04:23
2.4 Surveying Strategies When Planning for Security 00:07:39
Lesson 3: AWS Compliance Services
Learning objectives 00:00:24
3.1 Understanding AWS Premium Support Services 00:06:50
3.2 Understanding Risk and Compliance 00:05:00
3.3 Case Study: HIPAA Security and Compliance (and GDPR) 00:05:20
Module 2: Identity and Access Management
Module introduction 00:00:24
Lesson 4: Understanding Users and Credentials
Learning objectives 00:00:24
4.1 Examining the Account Root User 00:03:45
4.2 Exploring User Accounts and Credentials 00:05:08
4.3 Exploring Password Policies 00:03:57
4.4 Deploying Identity and Access Management Best Practices 00:05:35
Lesson 5: Identity and Access Management (IAM)
Learning objectives 00:00:33
5.1 Understanding IAM 00:06:47
5.2 Exploring IAM Users and Groups 00:10:06
5.3 Exploring IAM Roles 00:08:48
5.4 Exploring IAM Managed Policies 00:05:39
5.5 Exploring IAM Custom Policies 00:05:38
5.6 Exploring IAM Federated Services 00:03:33
5.7 Understanding AWS Security Token Service (STS) 00:09:25
5.8 Understanding AWS Cognito 00:05:21
Module 3: Infrastructure Security
Module introduction 00:00:28
Lesson 6: NACLs and Security Groups
Learning objectives 00:00:37
6.1 Understanding Security Zoning and Network Segmentation 00:10:49
6.2 Deploying Best Practices for Network Security in the Cloud 00:10:00
6.3 Comparing Security Groups to Network ACLs 00:05:31
6.4 Working with Network ACLs 00:10:43
6.5 Surveying Recommended NACL Scenarios 00:04:36
6.6 Understanding Security Groups 00:04:47
6.7 Working with Security Groups 00:09:19
6.8 Understanding Security Groups for Windows Instances 00:05:49
Lesson 7: AWS WAF and AWS Shield
Learning objectives 00:00:38
7.1 Understanding Web Application Firewall (WAF) 00:13:19
7.2 Working with WAF 00:09:38
7.3 Exploring DDoS Protection and Response 00:09:36
7.4 Exploring AWS WAF Advanced API 00:08:17
7.5 Understanding AWS Shield 00:11:16
7.6 Working with AWS Shield 00:03:44
7.7 Deploying Malware Protection Best Practices 00:04:59
7.8 Surveying Layered Defense in the Cloud 00:07:28
Module 4: Data Protection
Module introduction 00:00:21
Lesson 8: Cryptographic Services
Learning objectives 00:00:24
8.1 Understanding Cryptography Basics 00:13:21
8.2 Understanding IPsec Fundamentals 00:10:30
8.3 Examining IPsec in AWS 00:10:13
8.4 Exploring AWS Certificate Manager 00:09:14
Lesson 9: Key Management
Learning objectives 00:00:31
9.1 Understanding AWS Key Management Services (KMS) 00:12:14
9.2 Working with AWS KMS 00:07:40
9.3 Protecting EC2 Key Pairs 00:02:41
9.4 Using Encrypted EBS Volumes 00:06:10
9.5 Examining Server Side Encryption (SSE) in S3 00:08:28
9.6 Exploring AWS CloudHSM Security 00:05:57
Module 5: Logging and Monitoring
Module introduction 00:00:17
Lesson 10: Visibility and Reporting
Learning objectives 00:00:34
10.1 Understanding Security Reporting and Logging in AWS 00:05:38
10.2 Activating FlowLogs and Region-based CloudTrail 00:08:40
10.3 Understanding AWS Auditing 00:03:42
10.4 Exploring Pre-Audit Tasks 00:02:53
10.5 Surveying Additional Security Services 00:06:33
Summary
AWS Cloud Security: Summary 00:01:14

پیشنهاد فرادرس