We may earn an affiliate commission when you visit our partners.
Pluralsight logo

Securing AWS Infrastructure

Mark Wilkins

This course will teach you how to secure your hosted AWS infrastructure. You will learn about securing your EC2 instances and how to create additional threat protection layers using managed AWS services to manage and secure your applications.

Read more

This course will teach you how to secure your hosted AWS infrastructure. You will learn about securing your EC2 instances and how to create additional threat protection layers using managed AWS services to manage and secure your applications.

Securing AWS infrastructure is an ongoing task, with many moving parts.

In this course, Securing AWS Infrastructure, you’ll find the best methods of securing your hosted applications at AWS.

First, you'll learn the best subnet and IP address types to host your applications, and how to plan out VPC security using route tables, security groups, and Network ACLs.

Next, you’ll discover the roles that redundancy and availability play in application security, looking at load balancing and autoscaling and how they help your applications to remain available.

Finally, you’ll explore the intrusion detection and prevention available at AWS for all customers, specifically how to create threat protection layers with Web Application Firewall, AWS Shield, Shield Advanced, and the AWS Firewall manager. You’ll also see how to protect public-facing resources using CloudFront.

You'll also go through the use of GuardDuty and Amazon Inspector. This course’s content is a mix of lecture and hands-on demos.

When you’re finished with this course, you will understand how to properly secure your infrastructure components at AWS.

Enroll now

What's inside

Syllabus

Course Overview
Securing EC2 Resources
Planning for Intrusion, Threats, and DDoS Attacks
Maintaining EC2 Instance Security with Amazon Inspector
Read more
Monitoring Threat Detection with Amazon GuardDuty

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Fits for learners in DevOps
Develops skills in managing and securing AWS applications at an intermediate level
Taught by Mark Wilkins, who has proven experience in DevOps
Examines industry-standard methods for protecting applications at AWS
Hands-on demos with labs and interactive materials
Prerequisites: Working knowledge of AWS

Save this course

Save Securing AWS Infrastructure to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Securing AWS Infrastructure. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Securing AWS Infrastructure will develop knowledge and skills that may be useful to these careers:
Cloud Engineer
Cloud Engineers design, implement, and manage cloud-based systems. This course will teach you how to secure your hosted AWS infrastructure, which is a critical skill for Cloud Engineers. You will learn about securing your EC2 instances and how to create additional threat protection layers using managed AWS services to manage and secure your applications.
Cloud Security Architect
Cloud Security Architects design and implement security controls for cloud-based systems. This course will teach you how to secure your hosted AWS infrastructure, which is a critical skill for Cloud Security Architects. You will learn about securing your EC2 instances and how to create additional threat protection layers using managed AWS services to manage and secure your applications.
DevOps Engineer
DevOps Engineers work to bridge the gap between development and operations teams. This course will teach you how to secure your hosted AWS infrastructure, which is a critical skill for DevOps Engineers. You will learn about securing your EC2 instances and how to create additional threat protection layers using managed AWS services to manage and secure your applications.
Security Analyst
Security Analysts investigate and respond to security incidents. This course will teach you how to secure your hosted AWS infrastructure, which is a critical skill for Security Analysts. You will learn about securing your EC2 instances and how to create additional threat protection layers using managed AWS services to manage and secure your applications.
Network Security Engineer
Network Security Engineers design, implement, and manage network security systems. This course will teach you how to secure your hosted AWS infrastructure, which will help you to build a foundation in network security. You will learn about securing your EC2 instances and how to create additional threat protection layers using managed AWS services to manage and secure your applications.
Information Security Analyst
Information Security Analysts design, implement, and manage information security systems. This course will teach you how to secure your hosted AWS infrastructure, which is a critical skill for Information Security Analysts. You will learn about securing your EC2 instances and how to create additional threat protection layers using managed AWS services to manage and secure your applications.
Security Consultant
Security Consultants help organizations to improve their security posture. This course will teach you how to secure your hosted AWS infrastructure, which will help you to build a foundation in security consulting. You will learn about securing your EC2 instances and how to create additional threat protection layers using managed AWS services to manage and secure your applications.
Systems Administrator
Systems Administrators manage and maintain computer systems. In particular, this course will teach you how to secure your hosted AWS infrastructure. You will learn about securing your EC2 instances and how to create additional threat protection layers using managed AWS services to manage and secure your applications.
IT Auditor
IT Auditors assess the security of IT systems and make recommendations for improvements. This course will teach you how to secure your hosted AWS infrastructure, which may help you to build a foundation in IT auditing. You will learn about securing your EC2 instances and how to create additional threat protection layers using managed AWS services to manage and secure your applications.
Cloud Solution Architect
Cloud Solution Architects design and implement cloud-based solutions. In particular, this course will teach you how to secure your hosted AWS infrastructure. You will learn about securing your EC2 instances and how to create additional threat protection layers using managed AWS services to manage and secure your applications.
Database Administrator
Database Administrators manage and maintain databases. In particular, this course will teach you how to secure your hosted AWS infrastructure. You will learn about securing your EC2 instances and how to create additional threat protection layers using managed AWS services to manage and secure your applications.
Network Administrator
Network Administrators manage and maintain computer networks. In particular, this course will teach you how to secure your hosted AWS infrastructure. You will learn about securing your EC2 instances and how to create additional threat protection layers using managed AWS services to manage and secure your applications.
Software Developer
Software Developers design, develop, and test software applications. In particular, this course will teach you how to secure your hosted AWS infrastructure. You will learn about securing your EC2 instances and how to create additional threat protection layers using managed AWS services to manage and secure your applications.
Systems Engineer
Systems Engineers design, implement, and maintain computer systems. In particular, this course will teach you how to secure your hosted AWS infrastructure. You will learn about securing your EC2 instances and how to create additional threat protection layers using managed AWS services to manage and secure your applications.
Software Engineer
Software Engineers design, develop, and test software applications. In particular, this course will teach you how to secure your hosted AWS infrastructure. You will learn about securing your EC2 instances and how to create additional threat protection layers using managed AWS services to manage and secure your applications.

Reading list

We've selected 12 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Securing AWS Infrastructure.
Provides a structured approach to threat modeling. This book is an excellent resource for learning how to identify and mitigate security threats in cloud environments.
Collection of ready-made AWS security recipes. It will be helpful for beginning AWS users looking to implement security best practices. This books contains some hands-on content.
Provides a comprehensive overview of threat modeling, a process for identifying and mitigating security risks.
Provides a good overview of web application security. This book useful resource for those who want to learn more about securing web applications in the cloud.
Provides a comprehensive overview of system security and reliability, covering topics such as system architecture, security testing, and incident response.
Provides a comprehensive overview of cloud computing, covering topics such as cloud architectures, cloud services, and cloud security.
Useful resource for understanding social engineering and other non-technical attacks. This book provides a unique perspective on the human element of security and is helpful in developing a well-rounded understanding of security.
Provides a comprehensive overview of software security testing, covering topics such as security testing techniques, security testing tools, and security testing best practices.
Provides a comprehensive overview of network security, covering topics such as network security protocols, network security devices, and network security best practices.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Securing AWS Infrastructure.
Integrating AWS Networks with Application Services
Most relevant
Securing Windows Server 2016 Virtualization
Most relevant
LFCS Additional Networking Topics
Most relevant
Developer Security Champion: Encrypted Communications
Most relevant
Securing Applications on AWS
Most relevant
Securing Data Analytics Pipelines on AWS
Most relevant
Securing AWS Networks
Most relevant
vSphere 8: Implementing vSphere Security Best Practices
Most relevant
Authentication and Authorization in Spring Boot 3 Using...
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser