There are currently no items in your shopping cart.

User Panel

Forgot your password?.

Udemy AWS Advanced Security: SecOps Automation for the cloud

Video Introducing this tutorial

Course Introduction :
Welcome to 'AWS Cloud Security: Proactive Way' Course

Detective Controls: Introduction :
AWS Config: What Is It?
AWS Config: How It Works?
AWS Config: Introduction to Config Rules
AWS Config: How to configure Config Rules
AWS Config: Identify Non Compliant Rules & Resources
AWS Config: Introduction to Advanced Querying
AWS Config: Advanced Querying In Action
AWS Config: Introduction to Multi Account Aggregators
Learn how to aggregate compliance status in AWS

Reactive Controls: Automatically Remediate Non Compliant Resources :
Introduction to Auto Remediation
Automatically Enforce S3 Bucket Versioning
Automatically Enforce S3 Bucket Encryption
Automatically Enforce 'No Public IPs for EC2 Instances' Policy
Automatically Enforce AMI ID Compliance for all EC2 Instances
Automatically Enforce compliance to AMI ID by Tags for all EC2 Instances
Compliance Best Practices & Tribal Knowledge - commonly used rules
How to setup custom compliance rules?
Monitor & Flag Unused IAM Roles using Config Custom Rules
Monitor & Flag Users With Excessive Privileges

Proactive Security Controls :
Automatically Remediate AWS Cloutrail Disabling: Monitor, Alert, ReEnable
Monitor & Automatically Revoke Unintended IAM Access
Automatically Remove Unused Security Groups
Proactively monitor & fix bad or overly permissive S3 Object ACLs
Proactively monitor and fix bad or overly permissive S3 Bucket Policies
Proactively monitor and respond to failed SSH logins to EC2 Instances
Automatically rotate EC2 SSH keys for ALL your instances reliably
Proactively Block S3 Public Access At Scale
Attribute Based Access Control: Proactively Restrict S3 Access based on UserTags
Attribute Based Access Control: Proactively Restrict Access To EC2 Based On Tags

Proactive Security Controls: Taking it to the next level :
Learn how to create fine grained permissions like a PRO
Use AWS Secrets Manager to secure database credentials and retrieve from lambda
Use an outbound VPC proxy for domain whitelisting and content filtering
Use AWS IAM Access Analyzer to Identify Unintended Resource Access
Automatically respond to DDoS Attacks with Web Application Firewall(WAF)
Detect EC2 Instance Credential Abuse
Automatically respond to EC2 Instance Credential Abuse - Part 01 of 02
Automatically respond to EC2 Instance Credential Abuse - Part 02 of 02

Next Steps: Assignment :
How will you respond to the following security scenarios?

Resources :
Table of Resources

Additional Reading:
Security Whitepapers