We may earn an affiliate commission when you visit our partners.
Craig Arcuri

This course details the services in AWS that can be used to secure applications and the resources on which the applications run. These services include AWS Secrets Manager, AWS WAF, and Amazon Inspector. Additionally, the course provides an overview of overall security in AWS, specifically the steps and techniques to secure accounts in AWS. The overall security posture is emphasized as essential rather than simply focusing on application security. The course concludes with a checklist that can be used to strengthen overall security. The course has five hands-on labs that focus on Secrets Manager, WAF, and Amazon Inspector — first individually, and then as a group for application security.

Enroll now

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Suitable for learners with intermediate experience in AWS or other cloud platforms who wish to enhance their cloud security skills
Led by Craig Arcuri, a seasoned instructor recognized for his expertise in AWS security
Provides a comprehensive study of AWS security services, covering essential aspects for securing applications and cloud resources
Teaches hands-on skills through five labs focused on practical application of AWS security services
May require prior knowledge of AWS fundamentals for optimal comprehension

Save this course

Save Securing Applications with AWS to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Securing Applications with AWS with these activities:
Compile Essential Course Materials
Retrieve required course materials including lecture notes, slides, textbook, and any supplementary resources to facilitate understanding from day one.
Show steps
  • Download all available lecture notes.
  • Save or print all lecture slides.
  • Obtain the required textbook and any supplementary reading materials.
  • Bookmark essential websites, online resources, and tools.
Review AWS Identity and Access Management (IAM)
Establish a foundational understanding of IAM to support learning about securing applications and resources.
Show steps
  • Read documentation on IAM
  • Create an IAM user and group
  • Set permissions for IAM users and groups
Compile a resource list for AWS Security
Organize and consolidate resources to enhance understanding and accessibility of AWS Security information.
Browse courses on AWS Security
Show steps
  • Gather documentation, tutorials, and blog posts on AWS Security
  • Organize resources into categories and subcategories
  • Create a document or spreadsheet for easy reference
Nine other activities
Expand to see all activities and additional details
Show all 12 activities
Practice AWS Security Configuration
Reinforce your understanding of AWS security concepts by actively configuring AWS resources and applying security measures.
Show steps
  • Set up a new AWS account specifically for practice purposes.
  • Create an S3 bucket and implement encryption, access control, and logging.
  • Configure a CloudFront distribution with SSL/TLS and caching policies.
  • Create a Lambda function and apply IAM roles and permissions.
  • Deploy the function to API Gateway and configure authorization and rate limiting.
Configure and test AWS Secrets Manager
Reinforce concepts and gain hands-on experience with Secrets Manager for securing secrets.
Browse courses on AWS Secrets Manager
Show steps
  • Create a secret in Secrets Manager
  • Retrieve a secret from Secrets Manager
  • Rotate a secret in Secrets Manager
Participate in peer sessions on application security
Engage with peers to exchange ideas, clarify concepts, and strengthen understanding of application security principles.
Browse courses on Application Security
Show steps
  • Identify peer discussion groups or forums
  • Join discussions and participate actively
  • Share knowledge and ask questions to enhance learning
Build a Web Application That Utilizes Secrets Manager, WAF, and Inspector
Apply the principles of security in AWS by implementing it in a real-world project.
Show steps
  • Design the architecture of the web application.
  • Implement the web application using the AWS SDK.
  • Deploy the web application to AWS.
  • Configure Secrets Manager, WAF, and Inspector for the web application.
  • Test the security of the web application.
Participate in a Peer Review Session on Secure AWS Account Configuration
Gain insights and improve understanding of secure AWS account configuration through peer feedback.
Show steps
  • Join a peer review session.
  • Present your own AWS account configuration for review.
  • Provide feedback on the AWS account configurations of other participants.
Secrets Manager Role Permission Analyzer Benchmark Scenarios
Develop hands-on familiarity with running benchmark scenarios for Secrets Manager Role Permission Analyzer.
Show steps
  • Run a benchmark scenario for the root account.
  • Run a benchmark scenario for an IAM user.
  • Run a benchmark scenario for an IAM role.
Create a Video Tutorial on WAF
Enhance understanding of WAF by creating a hands-on tutorial video.
Show steps
  • Write a script for the video tutorial.
  • Record the video tutorial.
  • Edit and publish the video tutorial.
Develop a security plan for a sample application
Apply course learnings to design and implement a comprehensive security plan for an application.
Browse courses on Application Security
Show steps
  • Identify application requirements and security goals
  • Design a security architecture using AWS services
  • Implement security measures in code and infrastructure
  • Test and evaluate the security plan
  • Document the security plan and findings
Volunteer at a local organization to implement AWS Security best practices
Gain practical experience and contribute to the community while applying AWS Security knowledge.
Browse courses on AWS Security
Show steps
  • Identify organizations looking for AWS Security volunteers
  • Reach out and offer your services
  • Assist in implementing security measures and best practices

Career center

Learners who complete Securing Applications with AWS will develop knowledge and skills that may be useful to these careers:
Cloud Architect
A Cloud Architect must have an understanding of the services in AWS that are used to secure applications and the resources on which the applications run. Being able to manage overall security in AWS is also essential, which is why the course, Securing Applications with AWS, is so valuable. It focuses on all of the skills mentioned, helping you build a foundation to succeed as a Cloud Architect.
Cloud Security Engineer
As a Cloud Security Engineer, you will need to be familiar with the services in AWS that can be used to secure applications and the resources on which the applications run. The course, Securing Applications with AWS, focuses on exactly that. It will help you succeed in this career, especially considering you must have a grasp on how to secure accounts in AWS. This course will help you build a foundation in that skillset.
Security Analyst
To succeed as a Security Analyst, you will need to have a strong foundation in the services in AWS that can be used to secure applications. Securing Applications with AWS is a course that can help you build this foundation. It will introduce you to the services in AWS that can be used to secure applications and the resources on which the applications run.
Information Technology Manager
Securing Applications with AWS is a valuable course for aspiring Information Technology Managers. This course dives into the services in AWS that can be used to secure applications and the resources on which the applications run. It also gives an overview of overall security in AWS, which is vital for Information Technology Managers who need to have a comprehensive understanding of IT security.
Cybersecurity Analyst
For those seeking a career as a Cybersecurity Analyst, the course, Securing Applications with AWS, will provide a strong foundation. As a Cybersecurity Analyst, you will need to have a working knowledge of the services in AWS that can be used to secure applications. This course covers these services in detail, along with providing an overview of overall security in AWS.
Enterprise Architect
As an Enterprise Architect, you will need to have a solid understanding of the services in AWS that can be used to secure applications and the resources on which the applications run. The course, Securing Applications with AWS, provides a thorough overview of these services and how to use them effectively. Taking this course will help you build a foundation in this critical area, increasing your chances of success.
Systems Engineer
A Systems Engineer will benefit from understanding the services in AWS that can be used to secure applications and the resources on which the applications run. The course, Securing Applications with AWS, is highly relevant to this role. It will help you develop the skills and knowledge required to keep applications secure, setting you up for success in this career path.
Cloud Security Architect
The course, Securing Applications with AWS, may be useful to those who want to become Cloud Security Architects. This course goes over the services in AWS that can be used to secure applications and the resources on which the applications run.
Software Developer
Securing Applications with AWS may be useful for those who would like to become Software Developers. This course helps build a foundation in using the services in AWS that can be used to secure applications and the resources on which the applications run.
Security Architect
Securing Applications with AWS is a course that may be useful for someone looking to become a Security Architect. Security Architects need to have an understanding of the services in AWS that can be used to secure applications and the resources on which the applications run. This course provides a solid foundation in these areas.
Web Developer
Web Developers will need to have an understanding of the services in AWS that can be used to secure applications and the resources on which the applications run. The course, Securing Applications with AWS, provides a solid foundation in these areas. It also provides an overview of overall security in AWS, which is essential for Web Developers who need to be aware of the security implications of their work.
Information Security Analyst
As an Information Security Analyst, you will need to have a working knowledge of the services in AWS that can be used to secure applications. Securing Applications with AWS is a course that can help you build a foundation in this area. It focuses on securing the resources on which applications run and explores how to secure accounts in AWS. It is a great option to help you get your start in this career.
DevOps Engineer
To be a successful DevOps Engineer, you will need to have a working knowledge of the services in AWS that can be used to secure applications. Securing Applications with AWS is a course that can help you build a foundation in this area. It focuses on securing the resources on which applications run and explores how to secure accounts in AWS. It is a great option to help you get your start in this career.
Network Security Engineer
The course, Securing Applications with AWS, may be useful to those aiming to become Network Security Engineers. This course covers the services in AWS that can be used to secure applications and the resources on which the applications run.
Software Engineer
The course, Securing Applications with AWS, may help you in a role as a Software Engineer. Software Engineers look to create and maintain applications, business solutions, and other software. Having a course-based understanding of the services in AWS that can be used to secure applications and the resources on which the applications run is useful to a Software Engineer.

Reading list

We've selected six books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Securing Applications with AWS.
Provides a comprehensive overview of AWS security, including topics such as security architecture, identity and access management, data protection, and incident response. This book useful reference for anyone working with AWS.
Provides a hands-on approach to security engineering. This book useful reference for anyone who is looking for practical advice on how to implement security controls.
Focuses on application security best practices and techniques, providing valuable insights for developers who want to build secure applications.
Provides a comprehensive overview of all aspects of security engineering. It includes coverage of the planning, design, implementation, and evaluation of security systems. While this book is not specific to AWS security, it good reference for anyone working in the field.
This is an overview of security analysis techniques for developers, network engineers, and system administrators by a team of security experts. This good reference to have on hand for general security tasks or for those responsible for researching and selecting security tools
Helpful prep guide for anyone planning to take the AWS Certified Solutions Architect exam. The Solutions Architect certification globally recognized certification for cloud architects.

Share

Help others find this course page by sharing it with your friends and followers:
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser