We may earn an affiliate commission when you visit our partners.
Course image
Whizlabs Instructor

AWS: Infrastructure Security Course is the second course of Exam Prep SCS-C02: AWS Certified Security – Specialty Specialization. This course assists learners to design security controls for edge services such as AWS WAF and AWS Shield. This course is basically divided into two modules and each module is further segmented by Lessons and Video Lectures. This course facilitates learners with approximately 3:00-3:30 Hours of Video lectures that provide both Theory and Hands-On knowledge. Also, Graded and Ungraded Quizzes are provided with every module in order to test the ability of learners.

Read more

AWS: Infrastructure Security Course is the second course of Exam Prep SCS-C02: AWS Certified Security – Specialty Specialization. This course assists learners to design security controls for edge services such as AWS WAF and AWS Shield. This course is basically divided into two modules and each module is further segmented by Lessons and Video Lectures. This course facilitates learners with approximately 3:00-3:30 Hours of Video lectures that provide both Theory and Hands-On knowledge. Also, Graded and Ungraded Quizzes are provided with every module in order to test the ability of learners.

Module 1: Network Security Controls: VPC Components

Module 2: Network Security Controls: VPC Peering and Endpoints

Module 3: Security Controls for Edge Services in AWS

Two years of experience in configuring VPC infrastructure. Candidates being certified with AWS Solutions Architect Associate can prepare for this course and appear for the Security specialty exam. By the end of this course, a learner will be able to:

- Implement VPC security mechanisms in AWS.

- Determine solutions to produce desired network behavior in AWS.

- Explore AWS services to scan vulnerabilities in compute workloads.

Enroll now

What's inside

Syllabus

Network Security Controls: VPC Components
Welcome to Week 1 of the AWS: Infrastructure Security Course. This week, we’ll explore techniques network security controls in AWS. We will also learn VPC security mechanisms such as Security Groups and Network Access Control Lists and explore Bastion Hosts.
Read more
Network Security Controls: VPC Peering and Endpoints
Welcome to Week 2 of the AWS: Infrastructure Security Course. This week, we’ll VPC connectivity concepts like NAT Gateways, VPC Peering and VPC Endpoints. We'll also explore AWS services to scan vulnerabilities and it smanagement.
Security Controls for Edge Services in AWS
Welcome to Week 3 of the AWS: Infrastructure Security Course. This week, we’ll explore the methods to secure Edge AWS services. We will implement security layers by combining security services such as CloudFront with AWS WAF and load balancers.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Develops critical skills for passing the AWS: Infrastructure Security course for professionals looking to validate their expertise in cloud computing security
Provides a solid foundation in network security controls, VPC components, and security controls for edge services in AWS
Well-structured with modules and lessons, offering a blend of theory and hands-on knowledge
Taught by Whizlabs Instructor, recognized for their expertise in AWS certification training
May require additional resources for in-depth knowledge and practical application

Save this course

Save AWS: Infrastructure Security to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in AWS: Infrastructure Security with these activities:
Review network security fundamentals
Reviewing network security fundamentals will provide a strong foundation for understanding the concepts covered in this course.
Browse courses on Networking
Show steps
  • Revisit the OSI model and its layers.
  • Review common network security threats and vulnerabilities.
  • Understand the role of firewalls and intrusion detection systems.
Review basic networking concepts
Refreshing basic networking concepts will provide a strong foundation before diving into the course materials
Show steps
Review the AWS Documentation
Reviewing the official AWS documentation will provide a solid foundation for understanding the concepts and services covered in the course.
Browse courses on AWS
Show steps
  • Identify the relevant sections of the AWS documentation.
  • Read and comprehend the documentation thoroughly.
  • Take notes to consolidate your understanding.
11 other activities
Expand to see all activities and additional details
Show all 14 activities
Compile a Resource Guide
Creating a resource guide will help you organize and keep track of relevant materials for future reference.
Browse courses on Resources
Show steps
  • Gather resources from the course materials, online documentation, and other sources.
  • Categorize and organize the resources based on topics.
  • Document and share the resource guide with peers.
Explore Additional AWS Tutorials
Following guided tutorials will complement the course materials and provide further reinforcement.
Browse courses on AWS
Show steps
  • Identify relevant tutorials on the AWS website or other platforms.
  • Go through the tutorials at your own pace.
  • Apply what you learn to your own projects or scenarios.
Join a Study Group
Studying and collaborating with peers will enhance understanding and provide diverse perspectives.
Browse courses on AWS
Show steps
  • Find peers who are also taking the course.
  • Organize regular study sessions.
  • Discuss course materials, share ideas, and solve problems together.
AWS VPC Deep Dive
Reinforce your understanding of VPC components and their role inAWS networking.
Show steps
  • Watch tutorial on AWS VPC fundamentals
  • Explore AWS documentation on VPC components
  • Configure a VPC in your AWS account
Configure security groups and network access control lists
Hands-on practice with configuring security groups and network access control lists will reinforce the concepts and improve understanding.
Browse courses on Security Groups
Show steps
  • Create a new VPC and subnet.
  • Configure security groups to allow specific traffic.
  • Implement network access control lists to restrict access to specific resources.
  • Test the configurations using tools like nmap or curl.
Configure VPC Security Mechanisms
Hands-on practice with configuring VPC security mechanisms will reinforce the concepts and help you develop proficiency.
Browse courses on VPC
Show steps
  • Set up a test environment with an AWS account.
  • Create a VPC and configure security groups and network access control lists.
  • Test and validate the security mechanisms.
Join a study group for AWS security
Joining a study group will provide opportunities to discuss concepts, share knowledge, and learn from peers.
Browse courses on AWS Security
Show steps
  • Identify potential study groups or online forums related to AWS security.
  • Join a group that aligns with your learning goals and schedule.
  • Actively participate in discussions and share your insights.
  • Collaborate on projects or assignments related to AWS security.
Explore AWS services for scanning vulnerabilities
By following guided tutorials on AWS services for scanning vulnerabilities, you can gain practical experience and enhance your understanding of these tools.
Browse courses on Vulnerability Scanning
Show steps
  • Identify the different AWS services available for vulnerability scanning.
  • Follow step-by-step tutorials to configure and use these services.
  • Scan your AWS resources for vulnerabilities.
  • Analyze the scan results and take appropriate remediation actions.
Contribute to an Open Source AWS Project
Contributing to open source projects will provide practical experience and expose you to real-world scenarios.
Browse courses on AWS
Show steps
  • Identify an AWS-related open source project that aligns with your interests.
  • Contact the project maintainers and express your interest to contribute.
  • Follow the project's guidelines and contribute code or documentation.
Build a Secure Application in AWS
Developing a real-world application in AWS will provide a practical experience and test your ability to apply the concepts learned in the course.
Browse courses on AWS
Show steps
  • Design the application's architecture and security requirements.
  • Select and configure relevant AWS services.
  • Implement security measures and test the application.
Create a diagram of a secure network architecture
Creating a diagram of a secure network architecture will help you visualize and understand the key components and their relationships.
Browse courses on Network Architecture
Show steps
  • Identify the different components of a network architecture.
  • Research and incorporate best practices for network security.
  • Use a diagramming tool to create a visual representation of your design.
  • Review and refine your diagram to ensure it meets security requirements.

Career center

Learners who complete AWS: Infrastructure Security will develop knowledge and skills that may be useful to these careers:
Security Architect
Security Architects are responsible for designing and implementing security solutions for organizations. This course provides a foundation in security architecture concepts and technologies, such as secure network design, identity and access management, and cloud security. By completing this course, you will gain the skills and knowledge necessary to design and implement secure solutions for organizations.
Chief Information Security Officer (CISO)
Chief Information Security Officers (CISOs) are responsible for overseeing the security of an organization's information systems. This course provides a foundation in CISO concepts and technologies, such as risk management, security governance, and compliance. By completing this course, you will gain the skills and knowledge necessary to oversee the security of an organization's information systems.
Incident Responder
Incident Responders are responsible for responding to security incidents and breaches. This course provides a foundation in incident response concepts and technologies, such as incident investigation, containment, and recovery. By completing this course, you will gain the skills and knowledge necessary to respond to security incidents and breaches.
Security Operations Manager
Security Operations Managers are responsible for managing and overseeing security operations teams. This course provides a foundation in security operations management concepts and technologies, such as incident response, threat intelligence, and security monitoring. By completing this course, you will gain the skills and knowledge necessary to manage and oversee security operations teams.
Vulnerability Analyst
Vulnerability Analysts are responsible for identifying and analyzing vulnerabilities in software and hardware. This course provides a foundation in vulnerability analysis concepts and technologies, such as static analysis, dynamic analysis, and fuzzing. By completing this course, you will gain the skills and knowledge necessary to identify and analyze vulnerabilities in software and hardware.
Security Analyst
Security Analysts are responsible for identifying, analyzing, and responding to security threats. This course provides a foundation in security analysis concepts and technologies, such as intrusion detection, malware analysis, and risk assessment. By completing this course, you will gain the skills and knowledge necessary to identify and respond to security threats.
Penetration Tester
Penetration Testers are responsible for identifying vulnerabilities in computer systems and networks. This course provides a foundation in penetration testing concepts and technologies, such as vulnerability assessment, exploitation, and reporting. By completing this course, you will gain the skills and knowledge necessary to identify vulnerabilities in computer systems and networks.
Security Automation Engineer
Security Automation Engineers are responsible for automating security tasks and processes. This course provides a foundation in security automation concepts and technologies, such as scripting, orchestration, and machine learning. By completing this course, you will gain the skills and knowledge necessary to automate security tasks and processes.
Security Consultant
Security Consultants are responsible for providing security advice and guidance to organizations. This course provides a foundation in security consulting concepts and technologies, such as risk assessment, security audits, and penetration testing. By completing this course, you will gain the skills and knowledge necessary to provide security advice and guidance to organizations.
Cloud Security Engineer
Cloud Security Engineers are responsible for securing cloud computing environments. This course provides a foundation in cloud security concepts and technologies, such as identity and access management, data protection, and network security. By completing this course, you will gain the skills and knowledge necessary to secure cloud environments.
Data Protection Officer (DPO)
Data Protection Officers (DPOs) are responsible for ensuring that organizations comply with data protection laws and regulations. This course provides a foundation in data protection concepts and technologies, such as data privacy, data security, and data breach response. By completing this course, you will gain the skills and knowledge necessary to ensure that organizations comply with data protection laws and regulations.
Threat Intelligence Analyst
Threat Intelligence Analysts are responsible for collecting, analyzing, and disseminating information about threats to organizations. This course provides a foundation in threat intelligence concepts and technologies, such as threat hunting, malware analysis, and risk assessment. By completing this course, you will gain the skills and knowledge necessary to collect, analyze, and disseminate information about threats to organizations.
Network Security Architect
Network Security Architects are responsible for designing, implementing, and maintaining security controls for computer networks. This course provides a foundation in network security concepts and technologies, such as firewalls, intrusion detection systems, and virtual private networks. By completing this course, you will gain the skills and knowledge necessary to design and implement secure networks.
Network Administrator
Network Administrators are responsible for managing and maintaining computer networks. This course provides a foundation in network administration concepts and technologies, such as network protocols, routing, and switching. By completing this course, you will gain the skills and knowledge necessary to manage and maintain secure networks.
Systems Engineer
Systems Engineers are responsible for designing, implementing, and maintaining computer systems. This course provides a foundation in systems engineering concepts and technologies, such as network design, server administration, and storage management. By completing this course, you will gain the skills and knowledge necessary to design and implement secure systems.

Reading list

We've selected six books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in AWS: Infrastructure Security.
This classic textbook great choice for building a solid foundation in computer security fundamentals. While it may not cover AWS-specific aspects, it provides a thorough understanding of core concepts like cryptography, authentication, and network security.
Provides a comprehensive guide to security controls in AWS. It covers a wide range of topics, including network security controls, VPC peering and endpoints, and security controls for edge services in AWS.
Provides a practical guide to implementing security in AWS. It covers a wide range of topics, including identity and access management, data protection, and threat detection.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to AWS: Infrastructure Security.
AWS: Resilient Solutions and Security Controls
Most relevant
AWS: Network Management and Operations
Most relevant
AWS: Network Security, Compliance and Governance
Most relevant
AWS Certified Advanced Networking - Specialty (ANS-C01)
Most relevant
AWS: Task Automation and Network Integration
Most relevant
AWS: Identity and Access Management
Most relevant
AWS: Data Protection and Security Governance
Most relevant
AWS: Networking
Most relevant
AWS: Security in Data Analytics
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser