AWS Advanced Security: SecOps Automation for the cloud
3.2 (33 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
1,316 students enrolled

AWS Advanced Security: SecOps Automation for the cloud

100% Hands-On | Learn to secure applications on AWS. Defend against threats DDoS Intrusions Vulnerabilities
4.3 (33 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
1,316 students enrolled
Created by . Kumar .
Last updated 2/2020
English
Current price: $14.99 Original price: $24.99 Discount: 40% off
3 days left at this price!
30-Day Money-Back Guarantee
This course includes
  • 5 hours on-demand video
  • 2 articles
  • 6 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Assignments
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • AWS Advanced Security use-cases
  • Advanced Data Protection in AWS
  • Respond to security incidents with ease
  • AWS Compliance Controls using Automation
  • Security Best Practices
  • Proactively defend against security threats
Requirements
  • Good Knowledge of AWS Cloud
  • Desire to learn and be curious about security
Description

Learn now how to protect your data, and manage your infrastructure in a secure way. There are many useful and powerful features that a customer can use to protect themselves against security incidents & data breaches.

Your course instructor[s] are AWS Experts with 16+ years of experience in Cloud & Security.

You will learn about how AWS Security services can be combined to deliver cloud security. All the examples demonstrated are from real-world customer use-cases and are being used in production. The automation templates & scripts provided can be modified by any user to get themselves familiar with these services and deploy in their customer environments

At the end of this course, you will be able to confidently able to answer the following questions,

  • How to simplify compliance auditing, security analysis, change management, and operational troubleshooting

  • How to assess, audit, and automate the remediation of non compliant resources configurations.

  • Write custom compliance rules to meet organisational needs

  • How to automatically respond to security incidents. 

  • How to effectively respond to and mitigate the potential impact of security incidents

  • You will learn advanced techniques to prepare and respond to security events.

  • What are different security services offered by AWS?

  • How to use the AWS security services to comply to a frameworks(for example NIST)?

The lectures range from simple security features to really complex event driven systems to keep your AWS accounts in compliance based on a set of rules. All the scripts and commands are on our GitHub repository. You can fork them and try it in your own accounts & laptops.

Who this course is for:
  • Users who wants to gain deep security insights related to AWS
  • Users who want to learn about Security Best Practices
  • Users who wants to know how to respond to security incidents automatically
  • Users who wants to learn automation
Course content
Expand all 40 lectures 04:46:21
+ Detective Controls: Introduction
9 lectures 23:08
AWS Config: How It Works?
01:42
AWS Config: Introduction to Config Rules
02:11
AWS Config: How to configure Config Rules
04:33
AWS Config: Introduction to Advanced Querying
01:18
AWS Config: Advanced Querying In Action
03:16
AWS Config: Introduction to Multi Account Aggregators
02:13
Learn how to aggregate compliance status in AWS
04:06
+ Reactive Controls: Automatically Remediate Non Compliant Resources
10 lectures 01:08:29
Introduction to Auto Remediation
02:39
Automatically Enforce S3 Bucket Versioning
07:23
Automatically Enforce 'No Public IPs for EC2 Instances' Policy
05:26
Automatically Enforce AMI ID Compliance for all EC2 Instances
06:40
Automatically Enforce compliance to AMI ID by Tags for all EC2 Instances
07:00
Compliance Best Practices & Tribal Knowledge - commonly used rules
07:11
How to setup custom compliance rules?
02:48
Monitor & Flag Unused IAM Roles using Config Custom Rules
12:25
Monitor & Flag Users With Excessive Privileges
10:07
+ Proactive Security Controls
10 lectures 01:51:49
Automatically Remediate AWS Cloutrail Disabling: Monitor, Alert, ReEnable
08:04
Monitor & Automatically Revoke Unintended IAM Access
11:17
Automatically Remove Unused Security Groups
06:37
Proactively monitor & fix bad or overly permissive S3 Object ACLs
11:11
Proactively monitor and fix bad or overly permissive S3 Bucket Policies
16:59
Proactively monitor and respond to failed SSH logins to EC2 Instances
14:45
Automatically rotate EC2 SSH keys for ALL your instances reliably
06:07
Proactively Block S3 Public Access At Scale
05:31
Attribute Based Access Control: Proactively Restrict S3 Access based on UserTags
15:41
Attribute Based Access Control: Proactively Restrict Access To EC2 Based On Tags
15:37
+ Proactive Security Controls: Taking it to the next level
8 lectures 01:17:43
Learn how to create fine grained permissions like a PRO
07:46
Use AWS Secrets Manager to secure database credentials and retrieve from lambda
11:59
Use an outbound VPC proxy for domain whitelisting and content filtering
14:45
Use AWS IAM Access Analyzer to Identify Unintended Resource Access
07:43
Automatically respond to DDoS Attacks with Web Application Firewall(WAF)
09:06
Detect EC2 Instance Credential Abuse
05:08
Automatically respond to EC2 Instance Credential Abuse - Part 01 of 02
10:00
Automatically respond to EC2 Instance Credential Abuse - Part 02 of 02
11:16
+ Next Steps: Assignment
0 lectures 00:00
In a time where cyber-attacks are on the rise in magnitude and frequency, being prepared during a security incident is paramount. As a security consultant, this assignment will serve as a start point for security and forensic readiness in the AWS cloud. Good Luck.
How will you respond to the following security scenarios?
5 questions
+ Resources
1 lecture 00:03
Table of Resources
00:03
+ Additional Reading
1 lecture 00:16

Expand your knowledge of the cloud with technical content authored by community experts, including technical whitepapers, technical guides, reference material, and reference architecture diagrams.

Security Whitepapers
00:16