We may earn an affiliate commission when you visit our partners.
Course image
Rudy Chetty and Hong Pham
Welcome to AWS Fundamentals: Addressing Security Risk! This course will give you an overview of security best practices when developing and managing applications on AWS. The course, created by AWS experts and delivered by AWS Solutions Architects, uses video...
Read more
Welcome to AWS Fundamentals: Addressing Security Risk! This course will give you an overview of security best practices when developing and managing applications on AWS. The course, created by AWS experts and delivered by AWS Solutions Architects, uses video lectures, hands-on exercise guides, demonstrations, and quizzes to dive deep on concepts about security on AWS. You will learn about the concept of “least privilege” and the AWS Shared Responsibility Model, as well as view demonstrations of Amazon GuardDuty, AWS Secrets Manager, and cross-account access. We encourage IT professionals and leaders who are interested in learning about best practices for securing an AWS environment and applications developed on AWS to enroll in this course. Before taking this course, we recommend you complete AWS Fundamentals: Going Cloud Native (https://www.coursera.org/learn/aws-fundamentals-going-cloud-native). Class forums will also allow you to ask questions and interact with AWS training instructors.
Enroll now

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Offers hands-on labs and interactive materials, helping learners apply their knowledge
Taught by Rudy Chetty and Hong Pham, recognized experts in AWS security
Presents the core concepts of AWS security, including 'least privilege' and the AWS Shared Responsibility Model
Focuses on best practices for securing AWS environments and AWS-based applications
Recommended for IT professionals and leaders seeking to enhance their AWS security knowledge
Designed for learners with prior experience in AWS Fundamentals, specifically AWS Fundamentals: Going Cloud Native

Save this course

Save AWS Fundamentals: Addressing Security Risk to your list so you can find it easily later:
Save

Reviews summary

Aws fundamentals: security risk mitigation

The consensus among the people who reviewed this online course is that the quality is middling. Many students had a hard time with the heavy use of puns and metaphors to teach the concepts. The instructors' accents were also noted as being very strong. The quizzes often included topics that had not been discussed during the recorded lectures. Students did appreciate the humor that the instructors brought to the coursework and found the content overall very informative.
Despite the complaints about the use of humor and accents, most of the students who reviewed this course agreed that the instructors were both knowledgeable and experienced with the subject matter.
"The material are good but there are too many concepts and services to learn."
"I learned very useful concepts and read great documentation that allowed me to increase my understanding of how a well-architected solution should be designed and deployed."
"Instructor Hong is awesome dude, Hong as well"
Most students felt that the course gave them a good overview of the different AWS services. Some of the students mentioned that the information provided was similar to information provided in other courses or documentation, but they appreciated the refresher.
"AWS Fundamentals: Addressing Security Risk is a comprehensive course which explains all the security aspects involved in managing AWS resources and provides good overview of how to secure AWS resources and the network connections."
"This course is a good comprehensive overview of the broad range of products that AWS offers."
"This course was helpful 😊 in fact I didn't know I could be that fastest learner."
The instructors in this course used some humor and fictional scenarios ('the bee') to help teach the materials. This was a hit with some of the students, who said that the instructors were 'very funny' and that the humor made the course more engaging.
"I learnt a lot of skills during this stage of the course."
"Pontos positivos: Conteúdo bem extenso."
"The course was informational and interesting."
Several students felt that the material in the course was too shallow. The content was described as 'high level' and 'more like a product showcase'. One student said that the course was 'essentially a presentation of the catalog of AWS services' and that there was not enough hands-on training or instruction on how to address security risks in the cloud.
"I found the course poorly structured and the presentation weak."
"It's a very high level course and more of an AWS product showcase."
The instructor with the stronger accent was the topic of many negative comments left by students reviewing this course. A few students said that they had to read the lecture transcripts instead of listening to the audio because of her accent.
"The English is indecipherable at times and notes are inaccurate."
"Hong's pronunciation and vocabulary was so wrong that it was very hard to understand."
"There was accent problem with one of the presenters."
Students reviewing this course were often frustrated with the course quizzes. Many of the questions on the tests were not covered in the recorded lectures, and the students felt that the questions were designed to test knowledge acquired outside of the classroom materials.
"I had a hard time keeping up with the lectures due to Hong's accent."
"This is just a broad overview of all the security services on AWS."
"The course is very good and informative."
There were certainly some negative remarks made about the instructors' heavy use of puns and jokes. The course mascot ('the bee') and some of the 'punny' topics were described as being 'distracting' and 'annoying' at times. One student said that the instructors spent more time on 'coming up with the bee-themed videos than on the course materials'.
"I felt the teachers did not have experience teaching and found much better explanations from other sources."
"The educators were very funny and I'm grateful to them, but I'm not satisfied at all with the content, the lack of visuals and Labs."

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in AWS Fundamentals: Addressing Security Risk with these activities:
Create a knowledge base
Organize your notes, assignments, and other resources into a comprehensive knowledge base for easy reference and future review.
Show steps
  • Gather all course materials, including notes, assignments, and lecture recordings.
  • Create a system for organizing and categorizing the materials.
  • Use a note-taking app, spreadsheet, or other tool to store and manage your knowledge base.
  • Review and update your knowledge base regularly.
Brush up on AWS Services
Review the fundamentals of AWS services to strengthen your understanding and prepare for the course.
Browse courses on AWS Services
Show steps
  • Visit the AWS documentation website and explore the different services offered.
  • Create a free AWS account and experiment with some of the basic services.
  • Read articles and tutorials on AWS services to gain a deeper understanding.
Review key concepts
Review fundamental concepts of AWS and cloud security to refresh your knowledge and prepare for the course.
Show steps
  • Read the course syllabus and review the course description.
  • Search for online resources and articles on AWS fundamentals and security.
  • Complete any pre-course assessments or quizzes.
Ten other activities
Expand to see all activities and additional details
Show all 13 activities
AWS Tutorial Series
Follow AWS Tutorial Series to learn more about the course topics.
Show steps
  • Choose a tutorial that is relevant to the course material.
  • Follow the instructions in the tutorial.
  • Complete the tutorial and submit your results.
Complete the AWS Cloud Security Fundamentals Tutorial
This tutorial provides a comprehensive overview of AWS security best practices and will help you enhance your knowledge.
Browse courses on AWS Security
Show steps
  • Register for the AWS Cloud Security Fundamentals tutorial.
  • Follow the instructions and complete all the modules.
  • Apply the concepts you learn to your own AWS environment or projects.
AWS Labs
Practice working with AWS by completing AWS Labs.
Show steps
  • Choose a lab that is relevant to the course material.
  • Follow the instructions in the lab.
  • Complete the lab and submit your results.
Complete AWS tutorials
Follow guided tutorials provided by AWS or third-party resources to delve deeper into security best practices and specific AWS services.
Show steps
  • Identify relevant tutorials from AWS documentation or online courses.
  • Set up the necessary AWS environment and tools.
  • Follow the tutorial instructions and complete the exercises.
  • Review the tutorial content and make notes.
Mentor junior security professionals
Share your knowledge and experience by mentoring junior security professionals, reinforcing your understanding and contributing to the growth of the community.
Browse courses on Mentoring
Show steps
  • Connect with junior security professionals through online forums or mentorship programs.
  • Provide guidance and support on security concepts and best practices.
  • Share your insights and experiences to help them navigate the industry.
  • Provide constructive feedback and encouragement.
Take AWS Security Quizzes
Challenge yourself with AWS security quizzes to test your understanding and identify areas for improvement.
Browse courses on AWS Certification
Show steps
  • Find practice quizzes online or on the AWS website.
  • Take the quizzes and review your results.
  • Identify areas where you need to strengthen your knowledge.
AWS Blog Post
Write an AWS Blog Post to share your knowledge and understanding of the course material.
Show steps
  • Choose a topic that is relevant to the course material.
  • Research your topic.
  • Write your blog post.
  • Publish your blog post.
Practice security scenarios
Engage in hands-on practice by simulating security scenarios and performing vulnerability assessments to reinforce your understanding.
Show steps
  • Set up a testing environment with vulnerable systems.
  • Design and execute security scenarios based on real-world threats.
  • Analyze the results and identify potential weaknesses.
  • Implement mitigation strategies and track the effectiveness.
Develop a security plan
Create a comprehensive security plan that outlines your understanding of security principles, risk management, and implementation strategies for an AWS environment.
Browse courses on Security Architecture
Show steps
  • Conduct a risk assessment and identify potential threats.
  • Define security objectives and controls based on industry best practices and AWS recommendations.
  • Design a security architecture and deployment strategy.
  • Document the security plan and share it for review.
Contribute to open-source security projects
Engage with the wider security community by contributing to open-source security projects to gain practical experience and enhance your knowledge.
Browse courses on Cloud Security Tools
Show steps
  • Identify open-source security projects that align with your interests.
  • Review the project documentation and identify areas where you can contribute.
  • Make code contributions, report issues, or participate in discussions.
  • Seek feedback from the project maintainers and collaborate with other contributors.

Career center

Learners who complete AWS Fundamentals: Addressing Security Risk will develop knowledge and skills that may be useful to these careers:
Cloud Security Architect
A Cloud Security Architect designs, builds, deploys, and manages security controls in a cloud computing environment. This individual ensures the confidentiality, integrity, and availability of data and applications in the cloud. The AWS Fundamentals: Addressing Security Risk course can be helpful in providing a foundation in cloud security best practices and the AWS Shared Responsibility Model. It can also help individuals understand how to use AWS services to implement security controls and protect data and applications in the cloud.
Information Security Analyst
An Information Security Analyst plans, implements, and monitors information security measures to protect an organization's data and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. The course provides foundational knowledge in AWS security best practices and may be useful in preparing for the AWS Certified Security - Specialty certification.
Security Engineer
A Security Engineer designs, implements, and maintains security systems to protect an organization's data and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. This AWS course may be useful for gaining knowledge in implementing security controls and protecting data and applications in the cloud.
IT Security Manager
An IT Security Manager develops, implements, and manages an organization's information security program. This includes developing and implementing security policies, procedures, and standards; conducting security risk assessments; and overseeing the implementation of security controls. The course may be useful in gaining knowledge in AWS security best practices and the AWS Shared Responsibility Model.
Security Consultant
A Security Consultant provides consulting services to organizations on how to improve their security posture. This includes assessing an organization's security risks, developing and implementing security plans, and conducting security audits. The course can be helpful in building a foundation in cloud security best practices and the AWS Shared Responsibility Model.
Risk Manager
A Risk Manager identifies, assesses, and manages risks to an organization. This includes identifying and assessing risks to an organization's data and information systems, and developing and implementing risk mitigation strategies. The course may be useful in gaining knowledge in AWS security best practices and the AWS Shared Responsibility Model.
Auditor
An Auditor examines and evaluates an organization's financial and operational records to ensure compliance with laws, regulations, and internal policies. This may include auditing an organization's information security controls and practices. The course can be useful in gaining knowledge in AWS security best practices and the AWS Shared Responsibility Model.
Compliance Manager
A Compliance Manager ensures that an organization complies with laws, regulations, and internal policies. This includes developing and implementing compliance programs, conducting compliance audits, and reporting on compliance status. The course may be useful in gaining knowledge in AWS security best practices and the AWS Shared Responsibility Model.
Data Privacy Officer
A Data Privacy Officer develops and implements an organization's data privacy program. This includes developing and implementing data privacy policies, procedures, and standards; conducting data privacy risk assessments; and overseeing the implementation of data privacy controls. The course may be useful in gaining knowledge in AWS security best practices and the AWS Shared Responsibility Model.
Privacy Engineer
A Privacy Engineer designs, implements, and maintains privacy controls to protect an organization's data and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. The course can be useful in gaining knowledge in AWS security best practices and the AWS Shared Responsibility Model.
System Administrator
A System Administrator manages and maintains computer systems and networks. This includes installing and configuring software, monitoring system performance, and troubleshooting problems. The course may be useful in gaining knowledge in AWS security best practices and the AWS Shared Responsibility Model.
Database Administrator
A Database Administrator manages and maintains databases. This includes creating and modifying databases, managing user access, and backing up and restoring databases. The course may be useful in gaining knowledge in AWS security best practices and the AWS Shared Responsibility Model.
Network Administrator
A Network Administrator manages and maintains computer networks. This includes designing and implementing network topologies, configuring network devices, and monitoring network performance. The course may be useful in gaining knowledge in AWS security best practices and the AWS Shared Responsibility Model.
Security Analyst
A Security Analyst monitors and analyzes security data to detect and respond to security incidents. This includes reviewing security logs, investigating security alerts, and developing and implementing security incident response plans. The course can be helpful in building a foundation in cloud security best practices and the AWS Shared Responsibility Model.
Software Developer
A Software Developer designs, develops, and maintains software applications. This includes writing code, testing software, and debugging software. The course may be useful in gaining knowledge in AWS security best practices and the AWS Shared Responsibility Model.

Reading list

We've selected six books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in AWS Fundamentals: Addressing Security Risk.
Provides a comprehensive overview of cloud security, including topics such as cloud security architecture, cloud security assessment, and cloud security operations.
Provides a comprehensive overview of security engineering principles and practices. It covers topics such as threat modeling, risk assessment, and security controls.
Provides a hands-on approach to security engineering. It covers topics such as threat modeling, risk assessment, and security controls.
Provides a practical guide to securing cloud computing environments. It covers topics such as cloud security architecture, security controls, and incident response.
Provides insights into the psychology of security and how to protect against social engineering attacks. It covers topics such as phishing, pretexting, and baiting.
Provides a practical approach to cloud computing. It covers topics such as cloud computing architecture, cloud computing assessment, and cloud computing operations.

Share

Help others find this course page by sharing it with your friends and followers:
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser