Securing Amazon Ec2 Instances
Published 11/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 374.54 MB | Duration: 1h 0m
Using security groups, VPCs, IAM roles, and basic server security best practices to protect your AWS resources
What you'll learn
Address the threat categories facing EC2 instances and the possible consequences of an attack
Apply the range of security tools AWS provides to help us protect our instances
Configure instance security groups, IAM roles, and VPC design to provide optimal protection
Integrate general server security best-practices and the AWS Shared Responsibility Model with your infrastructure design
Requirements
Besides basic familiarity with using EC2 instances, no prerequisite knowledge is needed for this course.
Comfort with the AWS CLI will be helpful and familiarity with Linux is a bonus.
Description
Amazon's Elastic Cloud Compute (EC2) service is borderline magic. After all, being able to provision and launch a fully-functioning, enterprise-quality cloud server in just a minute or two with no up-front costs is something we could barely have imagined even a decade ago. But all that cloud goodness doesn't change an admin's primary responsibility: to protect infrastructure from attack. The easier EC2 makes it to push out more and more applications, the more we're exposed to a lot of hostile - and scary - threats.If you're responsible for EC2 instance workloads - or even if you're just considering the possibility - you need to understand what defensive skills and tools are available and how you can use them. This course will review the current threat landscape and some general server security best practices. I'll introduce you to the significant security measures AWS themselves have taken on our behalf, and how to make the best use of their security groups, IAM roles, and VPC design architectures. We'll also learn about how AWS offers networking tools like VPNs and instance connectivity to help us push back against the bad guys. I've also included everything you might need to follow along with the practical demos on your own laptop or work station. Successfully completing all the videos, reading content, test-yourself quizzes, and demos yourself will leave you with a strong sense of what you can and should be doing to protect your application instances.
Overview
Section 1: Introduction to EC2 Security
Lecture 1 Understanding the Security Problem
Lecture 2 Exploring the Threat Landscape
Section 2: The Basics
Lecture 3 The Quick (and Safe) EC2 Launch
Lecture 4 Server Security Basics
Section 3: Controlling External (Application) Access
Lecture 5 Protecting Your Applications
Lecture 6 Working With Security Groups
Lecture 7 Working With IAM Roles
Lecture 8 Understanding VPC Architecture
Section 4: Controlling Internal (Administration) Connectivity
Lecture 9 Working With VPN Connections
Lecture 10 Working With EC2 Connectivity Solutions
Lecture 11 Course Review
Section 5: Course Resources (code, links, etc.)
Lecture 12 Code Snippets
Lecture 13 Helpful Links and Homework Exercises
Project managers planning application deployments,AWS solution architects looking to make sure they're not missing anything important,Application developers and admins responsible for infrastructure health,Individuals looking to safely introduce themselves to core AWS tools
Download linkrapidgator.net:
https://rapidgator.net/file/84b1f9ea44497804037db7cfcc885063/hronb.Securing.Amazon.Ec2.Instances.rar.html
uploadgig.com:
https://uploadgig.com/file/download/1E0c1833Bf6dEcd6/hronb.Securing.Amazon.Ec2.Instances.rar
nitroflare.com:
https://nitroflare.com/view/4FFC6FC47872E47/hronb.Securing.Amazon.Ec2.Instances.rar
1dl.net:
https://1dl.net/tihpe929kh1r/hronb.Securing.Amazon.Ec2.Instances.rar.html