AWS Security 

Module 01: Overview of Security in AWS

Lesson 01: Understanding the AWS Shared Responsibility Model

Lesson 02: Essential AWS Account Security Practices

Lesson 03: Overview of AWS Security Services


Module 02: Managing Identity and Access in AWS (IAM)

Lesson 01: IAM Fundamentals and Authentication

Lesson 02: IAM Policies and Authorization

Lesson 03: AWS Organizations

Lesson 04: Single Sign-On (SSO) Strategies


Module 03: AWS Virtual Private Cloud (VPC)

Lesson 01: VPC Peering Concepts and Implementations

Lesson 02: Utilizing VPC Flow Logs for Network Visibility

Lesson 03: Establishing VPN Connections in VPCs


Module 04: Data Security Best Practices in AWS

Lesson 01: Understanding Encryption Fundamentals

Lesson 02: Managing Keys with AWS Key Management Service (KMS)

Lesson 03: Leveraging Amazon Macie for Data Discovery and Protection


Module 05: Securing EC2 Instances in AWS

Lesson 01: EC2 Instance Security Essentials

Lesson 02: Using Amazon Inspector for Security Assessments

Lesson 03: Defending Against DDoS Attacks with AWS Shield


Module 06: Edge Security Solutions in AWS

Lesson 01: Implementing Security with AWS Web Application Firewall (WAF)

Lesson 02: Identity Management with Amazon Cognito

Lesson 03: Threat Detection with AWS GuardDuty

Lesson 04: Centralized Security Monitoring with AWS Security Hub


Module 07: Monitoring and Performance Management in AWS

Lesson 01: Utilizing AWS CloudWatch for Monitoring

Lesson 02: Monitoring Amazon EC2 Instances for Performance Insights


Module 08: Logging and Auditing in AWS

Lesson 01: Managing Logs with AWS CloudWatch Logs

Lesson 02: Tracking API Activity with AWS CloudTrail

Lesson 03: Understanding Compliance with AWS Artifact

Lesson 04: Configuration Management with AWS Config

Lesson 05: Proactive Recommendations with AWS Trusted Advisor