AWS Security Operations: Designing for Acceptable Risk and Compliance
Pluralsight
Course Summary
This course demonstrates how to utilize AWS security services and features to stay safe and compliant while operating in the AWS Cloud using recommended security best practices.
-
+
Course Description
Many companies are moving their applications and infrastructure services to AWS. Designing with a security mindset when considering all aspects of your AWS deployment is essential to ensure your cloud solution follows the best practices in governance, security operations, and acceptable risk. In this course, AWS Security Operations: Designing for Acceptable Risk and Compliance, you'll learn the most up-to-date knowledge of designing your AWS solutions utilizing security best practices. First, you will learn how to define and deploy resources based on the defined level of acceptable risk and compliance requirements for your company. Next, you will also learn what security tools are available and what role each tool plays in managing security at AWS. Finally, you will learn suggested best practices on planning your security and compliance model for your AWS deployment. When you're finished with this course, you'll have the skills and knowledge needed to define how compliance and security is designed and implemented when operating workloads in the AWS cloud.
-
+
Course Syllabus
Course Overview- 1m 23s
—Course Overview 1m 23sCloud Security Baseline- 1h 8m
—Cloud Security Baseline 5m 46s
—The C.I.A. Triad 5m 47s
—The IAS Octave 3m 53s
—AWS Security Goals 5m 22s
—Defining Security Requirements 11m 19s
—Compliance Standards and Definitions 7m 26s
—Access Control 5m 18s
—Data Security 5m 19s
—Network Security 4m 47s
—The Shared Security Model 5m 22s
—Shared Security Responsibilities 6m 17s
—AWS Security by Design 1m 57sThe AWS Security Model- 1h 10mAWS Governance and Compliance Frameworks- 52m 26s