Design and implement for AWS Security and compliance-Design requirements for alignment with security and compliance objectives
Welcome to the Course
()
Course Outline
Overview of Design and implement for AWS Security and compliance
Evaluate design requirements for alignment with security and compliance objectives Part 1
()
Evaluate design requirements for alignment with security and compliance objectives Part 2
()
Evaluate design requirements for alignment with security and compliance objectives Part 3
()
Design and implement for AWS Security and compliance-Manage, optimize and troubleshoot AWS Network
Security Groups, NACL, and Webserver - Part 1
()
Security Groups, NACL, and Webserver - Part 2
()
Security Groups, NACL, and Webserver - Part 3
()
Evaluate monitoring strategies in support of security and compliance objectives - Part 1
()
Evaluate monitoring strategies in support of security and compliance objectives - Part 2
()
VPC Flow Logs - Part 1
()
VPC Flow Logs - Part 2
()
Manage, optimize and troubleshoot AWS Network-Manage and Optimize CloudTrail and CloudWatch Alarms
Overview of Manage, optimize and troubleshoot AWS Network
CloudTrail - Part 1
()
CloudTrail - Part 2
()
CloudWatch Alarm - Part 1
()
CloudWatch Alarm - Part 2
()
CloudWatch Custom Metrics - Part 1
()
CloudWatch Custom Metrics - Part 2
()
Manage, optimize and troubleshoot AWS Network-Compare, Contrast and Troubleshoot Functional Capabilities of Security Groups, Network ACLs, and IAM policies
Contrast and Compare Functional Capabilities of Security Groups, Network ACLs, and IAM policies - Part 1
()
Contrast and Compare Functional Capabilities of Security Groups, Network ACLs, and IAM policies - Part 2
()
Utilize encryption technologies to secure network communications
()
Outline the components of the solution (encryption, key management, audit controls etc.)-Part 1
()
Outline the components of the solution (encryption, key management, audit controls etc.) Part 2
()
Given a scenario, troubleshoot and resolve a network issue- Part 1
()
Given a scenario, troubleshoot and resolve a network issue -Part 2
()
Assess appropriate use of security groups and Network ACLs -Part 1
()
Assess appropriate use of security groups and Network ACLs -Part 2
()
Key Takeaways of the Course
Course Conclusion
()