We may earn an affiliate commission when you visit our partners.
Course image
Pluralsight logo

Architecting for Security on AWS

Ben Piper
AWS security architects need to understand how to build security into every AWS deployment at every level. In this course, Architecting for Security on AWS, you’ll learn how to secure your data and your AWS services and resources at multiple levels using a...
Read more
AWS security architects need to understand how to build security into every AWS deployment at every level. In this course, Architecting for Security on AWS, you’ll learn how to secure your data and your AWS services and resources at multiple levels using a defense-in-depth approach. First, you'll learn how to protect your AWS credentials using identity and access management. Next, you'll see how to capture and analyze logs using CloudTrail, CloudWatch, and Athena. Finally, you'll learn how to implement network and instance security, encrypt data at rest and in-transit, and set up data backup, replication, and recovery. After finishing this course, you'll be ready to granularly control access to your AWS resources.
Enroll now

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Suitable for AWS security architects who seek to gain foundational knowledge in securing AWS deployments
Covers essential security concepts and best practices for building a secure AWS infrastructure
Taught by industry experts with extensive experience in AWS security, Ben Piper
Emphasizes a defense-in-depth approach to security, providing a comprehensive view of AWS security best practices

Save this course

Save Architecting for Security on AWS to your list so you can find it easily later:
Save

Career center

Learners who complete Architecting for Security on AWS will develop knowledge and skills that may be useful to these careers:
Security Engineer
Security Engineers design and implement security measures to protect their organization's computer networks and systems from unauthorized access, use, disclosure, disruption, modification, or destruction. This course helps build foundational knowledge needed for securing AWS infrastructure.
Cloud Security Architect
Cloud Security Architects design, implement, and manage security controls for cloud computing environments. This course may be useful for building a foundation in securing cloud applications and infrastructure.
Network Security Engineer
Network Security Engineers design, implement, and manage network security systems to protect an organization's network from unauthorized access, use, disclosure, disruption, modification, or destruction. This course provides the knowledge and skills needed to protect AWS network resources like EC2 instances, VPCs, and subnets.
Security Analyst
Security Analysts monitor, analyze, and investigate security events to identify and mitigate threats to an organization's information systems and assets. This course may be useful for developing the knowledge needed to analyze AWS security logs and events in CloudTrail, CloudWatch, and Athena.
Data Protection Officer
Data Protection Officers are responsible for managing the security and privacy of an organization's data and for complying with data protection laws and regulations. This course may help build a foundation for understanding how to protect data on AWS using encryption and data backup and recovery.
Compliance Auditor
Compliance Auditors evaluate an organization's compliance with laws, regulations, and standards. This course may be useful for gaining the knowledge needed to audit AWS security configurations and ensure compliance with security best practices.
Risk Manager
Risk Managers identify, assess, and mitigate risks to an organization's assets and operations. This course may be useful for understanding how to identify and mitigate security risks in AWS environments.
Cloud Architect
Cloud Architects design and implement cloud computing solutions. This course may be useful for gaining the knowledge needed to build secure and compliant AWS architectures.
DevSecOps Engineer
DevSecOps Engineers integrate security practices into the software development lifecycle. This course may be useful for gaining the knowledge needed to implement security controls in AWS during the development and deployment process.
IT Security Manager
IT Security Managers oversee the implementation and enforcement of security policies and procedures for an organization's IT systems. This course may be useful for building a foundation in AWS security best practices and management.
Software Engineer
Software Engineers design, develop, and maintain software applications. This course may be useful for gaining the knowledge needed to implement security features and controls in software applications deployed on AWS.
Systems Administrator
Systems Administrators manage and maintain computer systems and networks. This course may be useful for gaining the knowledge needed to manage and secure AWS infrastructure, including EC2 instances, VPCs, and subnets.
IT Auditor
IT Auditors evaluate the effectiveness of an organization's IT controls and security measures. This course may be useful for gaining the knowledge needed to audit AWS security configurations and ensure compliance with security standards.
Database Administrator
Database Administrators manage and maintain databases. This course may be useful for gaining the knowledge needed to secure AWS databases, such as RDS and DynamoDB.
Network Engineer
Network Engineers design, implement, and maintain computer networks. This course may be useful for gaining the knowledge needed to secure AWS network infrastructure, including VPCs, subnets, and security groups.

Reading list

We've selected 11 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Architecting for Security on AWS.
A commonly used textbook covering the principles and practices of computer security, suitable for both undergraduate and graduate-level courses.
A comprehensive textbook covering the principles and practices of computer security, suitable for both undergraduate and graduate-level courses.
A comprehensive overview of cloud security and privacy, covering best practices, architectures, and compliance requirements. Provides a strong foundation for understanding security concepts in the cloud.
A comprehensive guide to building secure and reliable systems, covering topics such as threat modeling, security architecture, and best practices for software development.
A comprehensive guide to cloud security, covering topics such as cloud security architecture, security controls, and compliance.
A comprehensive guide to secure coding practices, covering topics such as input validation, error handling, and cryptography.
A comprehensive guide to network security monitoring, covering topics such as incident detection, response, and threat hunting.
A practical guide to implementing security controls and best practices in AWS, with step-by-step instructions and real-world examples.
A comprehensive guide to designing and building data-intensive applications, covering topics such as data modeling, data management, and security.
A comprehensive guide to ethical hacking and penetration testing techniques, providing a practical understanding of how to identify and exploit vulnerabilities.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Similar courses are unavailable at this time. Please try again later.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser