AWS Security
Module 01: Overview of Security in AWS
Lesson 01: Understanding the AWS Shared Responsibility Model
Lesson 02: Essential AWS Account Security Practices
Lesson 03: Overview of AWS Security Services
Module 02: Managing Identity and Access in AWS (IAM)
Lesson 01: IAM Fundamentals and Authentication
Lesson 02: IAM Policies and Authorization
Lesson 03: AWS Organizations
Lesson 04: Single Sign-On (SSO) Strategies
Module 03: AWS Virtual Private Cloud (VPC)
Lesson 01: VPC Peering Concepts and Implementations
Lesson 02: Utilizing VPC Flow Logs for Network Visibility
Lesson 03: Establishing VPN Connections in VPCs
Module 04: Data Security Best Practices in AWS
Lesson 01: Understanding Encryption Fundamentals
Lesson 02: Managing Keys with AWS Key Management Service (KMS)
Lesson 03: Leveraging Amazon Macie for Data Discovery and Protection
Module 05: Securing EC2 Instances in AWS
Lesson 01: EC2 Instance Security Essentials
Lesson 02: Using Amazon Inspector for Security Assessments
Lesson 03: Defending Against DDoS Attacks with AWS Shield
Module 06: Edge Security Solutions in AWS
Lesson 01: Implementing Security with AWS Web Application Firewall (WAF)
Lesson 02: Identity Management with Amazon Cognito
Lesson 03: Threat Detection with AWS GuardDuty
Lesson 04: Centralized Security Monitoring with AWS Security Hub
Module 07: Monitoring and Performance Management in AWS
Lesson 01: Utilizing AWS CloudWatch for Monitoring
Lesson 02: Monitoring Amazon EC2 Instances for Performance Insights
Module 08: Logging and Auditing in AWS
Lesson 01: Managing Logs with AWS CloudWatch Logs
Lesson 02: Tracking API Activity with AWS CloudTrail
Lesson 03: Understanding Compliance with AWS Artifact
Lesson 04: Configuration Management with AWS Config
Lesson 05: Proactive Recommendations with AWS Trusted Advisor