From the course: AWS for Architects: Advanced Security

Welcome - Amazon Web Services (AWS) Tutorial

From the course: AWS for Architects: Advanced Security

Start my 1-month free trial

Welcome

- [Instructor] Have you ever found information in an S3 bucket that wasn't supposed to be there? Like a secret key from your Amazon account? Well, you're not alone. Hi, I'm Lynn Langit, and in this course we're gonna take a look into AWS advanced security techniques. We're going to start by reviewing core security tasks, such as properly using the IM user root account, setting up user accounts, policies, groups, and roles. We're then gonna look at billing and tagging. Next, we're going to examine different methods of implementing strong authentication using AWS services. And these include services such as cognito for federated authentication, as well as directory services such as simple AD and full-hosted Microsoft active directory. Following that we're gonna take a look at how to secure infrastructure. We're gonna look at BPC objects, including subnets and other types of objects in the BCP world. Then we're gonna take a look at implementing data protection. In this section we're going to understand how KMS and other encryption services work. And we'll work with some of the newer data identification services such as Amazon Macie. We'll round out the course by reviewing entire application architectures for security requirements and the application of security services. We have lots to cover so let's get started.

Contents