Back to Course

Introduction to AWS Security

0% Complete
0/0 Steps
  1. Introduction

    About the course and authors
  2. AWS cloud architecture
  3. Security concerns with our architecture
  4. Regions and Availability Zones (AZs)
  5. Shared responsibility in the cloud
  6. [Cheat Sheet] AWS Security Services
  7. [LAB] Create a billing alert to avoid surprise bills
  8. Infrastructure Security
    VPC networks
  9. Default VPCs
  10. [DEMO] Creating VPCs and Subnets
  11. How many VPCs should you use?
  12. [DEMO] Subnet, Route Table, and Gateway Configurations
  13. [LAB] [Challenge] Create a VPC with public and private subnets
  14. [DEMO] Security Groups (SGs)
  15. Security Groups Best Practices
  16. [DEMO] Network Access Control Lists (NACLs)
  17. [Cheat Sheet] SGs vs. NACLs
  18. [LAB] [Challenge] Configure security groups and NACLs to specific requirements
  19. Elastic Load Balancers
  20. [DEMO] AWS WAF
  21. [LAB] [Challenge] Deploy AWS WAF ACL for Application Load Balancer
  22. [DEMO] AWS Network Firewall - Part 1
  23. [DEMO] AWS Network Firewall - Part 2
  24. AWS Shield for DDoS Protection
  25. AWS Firewall Manager
  26. Identity and Access Management (IAM)
    Key Concepts of IAM in AWS
  27. [DEMO] Getting started with IAM in AWS
  28. [DEMO] Creating our first admin user
  29. Assigning permissions with policies
  30. [Cheat Sheet] Anatomy of an AWS IAM Policy
  31. [DEMO] Using Identity Center AWS SSO
  32. IAM Roles
  33. [DEMO] Creating a role for EC2 instances to access S3 buckets
  34. End-User Management with Amazon Cognito
  35. Data Protection
    Data protection in the cloud
  36. EBS Data Protection and Encryption
  37. Amazon RDS Data Protection and Encryption
  38. Key Management with AWS KMS
  39. [DEMO] Creating a Symmetric Encryption KMS Key
  40. Amazon S3 Bucket Protection
    Understanding Bucket Ownership
  41. Managing Access to Buckets
  42. [Cheat Sheet] S3 Bucket Policies vs. ACLs vs. IAM Policies
  43. [LAB] [Challenge] Create an IAM role for secure access to S3 based on a scenario
  44. Using Signed URLs
  45. Encrypting S3 Data
  46. [DEMO] Enable S3 Object Versioning
  47. [Cheat Sheet] Amazon S3 Protection Summary
  48. Logging, Monitoring, and Incident Response
    AWS Log Types and Auditing Options
  49. [DEMO] Enable S3 Server Access Logs
  50. AWS CloudTrail
  51. Amazon CloudWatch
  52. [DEMO] CloudTrail Security Automation with CloudWatch Logs and SNS
  53. [DEMO] Amazon VPC Flow Logs
  54. Proper Logging and Monitoring
  55. Amazon GuardDuty
  56. [LAB] [DEMO] Enable Threat Detection with GuardDuty
  57. [DEMO] Amazon EventBridge
  58. AWS Config
  59. AWS Systems Manager
  60. [DEMO] AWS Config Automated Remediation with SSM
  61. Amazon Detective
  62. [LAB] [DEMO] Amazon Inspector
  63. [DEMO] Amazon Macie
  64. [DEMO] AWS Security Hub
  65. [DEMO] Must-have AWS monitoring and alerting with SSK
  66. Multi-Account Security
    [DEMO] AWS Organizations
  67. [DEMO] AWS SCPs and Management Policies
  68. AWS Control Tower
  69. Wrap-up and Key Takeaways
    What now?
Lesson 6 of 69
In Progress

[Cheat Sheet] AWS Security Services

Christophe October 30, 2023

As you begin this course, here’s a cheat sheet that gives a high-level overview of AWS’ security-focused services and how they fit into each security category. We will cover most of these services in this course, so feel free to download this as a reference point!

AWS Security Services Cheat Sheet


Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.