Learn to design secure AWS architectures through identity, network, data, and application protection strategies. This course prepares you to meet AWS security best practices and exam objectives while building real-world skills in encryption, access control, threat detection, and incident response.
Overview
Syllabus
- Design Secure Access to AWS Resources
- Learn how to securely manage and control access to AWS resources using IAM users, groups, roles, policies, MFA, service control policies, and monitoring tools.
- Design Secure Workload Architectures
- Learn to design secure AWS architectures using VPCs, security groups, firewalls, endpoints, WAF, threat detection, and secure identity management for robust cloud workloads.
- Determine Appropriate Data Security Controls
- Understand and apply appropriate AWS data security controls, including encryption, key management, IAM, policies, sensitive data discovery, and secure backup for comprehensive protection.
- Integrate Security Best Practices Across Architecture
- Explore how to embed security at every layer of cloud architecture, using AWS Well-Architected Framework principles to protect data, infrastructure, and operations.
- Local Area Times: Securing the Cloud
- Apply IAM, VPC, and VPN security best practices to harden a newspaper’s AWS web app while maintaining functionality and secure remote admin access.
Taught by
Mike Hammond