Introduction
AWS security overview
()
What you should know
()
1. AWS Security Foundations
Understanding shared responsibility
()
Understanding the AWS security landscape
()
Understanding separation of duties
()
Implementing separation of duties
()
Understanding CloudTrail
()
Enabling CloudTrail
()
Understanding CloudWatch
()
Understanding CloudWatch alarms
()
Configuring Simple Notification Service
()
Using a CloudWatch alarm
()
Installing the command line interface (CLI) for Mac
()
The command line interface (CLI) for Windows
()
2. IAM Concepts in AWS
Understanding Identity and Access Management
()
Understanding IAM policies
()
Configure IAM policies
()
Understanding IAM groups
()
Configure IAM groups
()
Configuring a password policy
()
Configure IAM users: Web console
()
Configure IAM users: CLI
()
IAM challenge
()
IAM challenge solution
()
Configuring IAM roles
()
Configuring IAM roles
()
Validating an IAM role
()
Extending CloudWatch
()
Install CloudWatch agent
()
Challenge: IAM roles
()
Solution: IAM roles
()
Understanding Security Token Service
()
Creating a temporary access role
()
Creating a temporary access policy
()
Validating temporary access
()
Challenge: Super admin
()
Solution: Super admin
()
Illustrating access restrictions
()
Exploring IAM policy simulator
()
Understanding Cognito
()
Creating a Cognito user pool
()
Creating a Cognito identity pool
()
Understanding Verified Permissions
()
Understanding federated access
()
Enabling federated access
()
Validating federated access
()
Securing financial access
()
Enabling financial access
()
3. Multi-Account Access
Understanding Organizations
()
Understanding Control Tower
()
Understanding IAM Identity Center
()
Exploring IAM Identity Center
()
Validating IAM Identity Center
()
Understanding Resource Access Manager
()
Exploring Resource Access Manager
()
4. Detection and Response
Understanding AWS Config
()
Enabling AWS Config
()
Exploring AWS Config results
()
Exploring conformance packs
()
Understanding AWS GuardDuty
()
Exploring AWS GuardDuty
()
Understand IAM Access Analyzer
()
Exploring IAM Access Analyzer results
()
Understanding Amazon Detective
()
Exploring Amazon Detective
()
Understanding Amazon Inspector
()
Exploring Amazon Inspector
()
Resolving an Inspector finding
()
Understanding Amazon Security Lake
()
Understanding IoT Device Defender
()
Understanding AWS Elastic Disaster Recovery
()
Configuring Elastic Disaster Recovery
()
Configuring a source server
()
Exploring AWS Elastic Disaster Recovery
()
Removing a source server
()
5. Network and Application Protection
Understand Web Application Firewall
()
Exploring Web Application Firewall
()
Configuring Web Application Firewall
()
Validating Web Application Firewall
()
Understand AWS Shield
()
Understanding AWS Firewall Manager
()
Understanding AWS Network Firewall
()
Understand AWS Verified Access
()
Understanding DNS Firewall
()
Configuring DNS Firewall
()
6. Data Protection and Operations
Understanding Amazon Macie
()
Configuring a Macie job
()
Exploring Macie results
()
Understanding Key Management Service
()
Creating a KMS key
()
Creating a multi-region KMS key
()
Using a KMS in S3
()
Using KMS and an IAM role
()
Automating KMS key rotation
()
Deleting a KMS key
()
Enabling EBS default encryption
()
Understanding Secrets Manager
()
Using Secrets Manager
()
Enabling autorotation with Secrets Manager
()
Creating a multi-region secret
()
Deleting a Secrets Manager secret
()
Understanding AWS CloudHSM
()
Understanding Systems Manager
()
Implementing Systems Manager
()
Resolving compliance with Systems Manager
()
Creating Resource Groups
()
Patching with Systems Manager
()
Understanding Incident Manager
()
Using Parameter Store
()
Understand Certificate Manager
()
Creating a private certificate authority
()
Creating a private certificate
()
Using a private certificate
()
Understanding Payment Cryptography
()
Challenge: KMS
()
Solution: KMS
()
7. S3 Access Management
Exploring S3 management options
()
Accessing S3 privately
()
Configuring private S3 access
()
Managing S3 with IAM
()
Restricting S3 access with IAM
()
Validating custom IAM S3 policy
()
Leveraging S3 IAM policies in EC2
()
Creating an S3 bucket policy
()
Illustrating S3 bucket policies with CLI
()
Understanding S3 access control lists
()
Understanding public access in S3
()
S3 public access best practices
()
Exploring pre-signed URLs
()
Understanding S3 Access Grants
()
Understanding S3 Access Points
()
Exploring S3 Access Points
()
Understanding data protection schemes
()
S3 security and compliance best practices
()
Challenge: S3 replication challenge
()
Solution: S3 replication challenge
()
Challenge: S3 lifecycle challenge
()
Solution: S3 lifecycle challenge
()
8. Security Audits in AWS
Understanding AWS Security Hub
()
Using AWS Security Hub
()
Rotating access keys
()
Understand AWS Artifact
()
Understanding Trusted Advisor
()
Exploring Trusted Advisor
()
Understanding Audit Manager
()
Exploring Audit Manager
()
Prepare for a security audit
()