[FreeCoursesOnline.Me] A Cloud Guru - AWS Security Best Practices (2020)

Torrent Details


[FreeCoursesOnline.Me] A Cloud Guru - AWS Security Best Practices <span style=color:#777>(2020)</span>

NAME
[FreeCoursesOnline.Me] A Cloud Guru - AWS Security Best Practices (2020).torrent
CATEGORY
Other
INFOHASH
d0ae3654f837f70a2255146df2e365da60e37093
SIZE
639 MB in 72 files
ADDED
Uploaded on 04-06-2020 by our crawler pet called "Spidey".
SWARM
0 seeders & 0 peers
RATING
No votes yet.

Please login to vote for this torrent.


Description

Lynda and other Courses >>> https://www.freecoursesonline.me/

For Developer Tools & Apps >>> https://ftuapps.com/

Forum for discussion >>> https://1hack.us/







By: Lee Atchison

Publisher: ACloud.Guru

Course Source: https://acloud.guru/learn/aws-security-best-practices



Learn what cloud security is all about and how to use the principle of shared responsibility to build a secure environment for your applications within the AWS Cloud ecosystem.



Description



Some of the most commonly heard reasons for why a company can’t move to the cloud are concerns around security: “Our data is too sensitive to put in the cloud.”; “We can only trust servers that are in our data centers.”; “We can’t trust someone else with the security of our system”.



In reality, a cloud-based system often provides a more secure environment than an equivalent on-premise solution. How can this be? Well, cloud providers hire highly experienced security experts to help build their security capabilities, so by moving to the cloud, you too can use these security capabilities created by experts without having to be an expert yourself!



The key to achieving this is understanding the sophisticated tools made available to you by the cloud vendor, and the key to understanding is right here in this course! This course discusses the security capabilities available to users of AWS, and best practices for utilizing those capabilities. When finished with this course, you will have a solid understanding of the Shared Responsibility Model that is at the heart of AWS security patterns, along with how to employ basic security best practices such as the principle of least privilege.



This course will explore the theory behind various security topics, as well as provide examples of how those topics can be put to use within the AWS Cloud ecosystem. We'll focus on explaining these best practices, and how to apply them to keep your applications well protected. The end result is a more secure system – more secure than even your own data center.



EXPECTED OUTCOMES[b]



• Demonstrate an understanding of the principle of shared responsibility and how it applies to AWS and you.

• Demonstrate an understanding of authentication and authorization best practices.

• Understand security at various layers including infrastructure, operating system, data and application .

• Learn how to detect threats and intrusions.

• Learn to create policies and enforce their requirements.



[b]INTENDED AUDIENCE[b]



• Security engineers concerned about building cloud-based applications securely.

• Operations engineers tasked with creating a secure cloud production environment.

• Technical management who wants to understand the principles and best practices involved in maintaining a secure cloud-based application.



[b]About Author



Lee Atchison is the Senior Director, Cloud Architecture at New Relic. He’s been with New Relic for seven years where he led the building of the New Relic infrastructure products, and helped New Relic architect a solid service-based system. Lee has 31 years of industry experience, and learned cloud-based, scalable systems during his seven years as a Senior Manager at Amazon.com, where among other things he led the creation of AWS Elastic Beanstalk. Lee is the author of the book “Architecting for Scale”, published in 2016 by O’Reilly Media.







Discussion

Comments 0

Post Your Comment

Files in this torrent

FILENAMESIZE
0. Websites you may like/How you can help our Group!.txt208 B
01 Introduction/001 Introduction.mp436.4 MB
01 Introduction/002 AWS Security Best Practices White Paper Dated August 2016.txt64 B
01 Introduction/002 Course Material.mp410.8 MB
01 Introduction/002 Security Worksheet.docx36.2 KB
01 Introduction/002 Security Worksheet.pdf146.9 KB
01 Introduction/003 Principle of Shared Responsibility.mp423.2 MB
01 Introduction/004 Chapter Summary.mp411.7 MB
02 Running Example/001 Introduction.mp49.9 MB
02 Running Example/002 The Example Application.mp418.4 MB
02 Running Example/003 Example Application Architecture.mp419.1 MB
02 Running Example/004 Example Infrastructure Architecture.mp416.1 MB
02 Running Example/005 Example Users and Access Management.mp411.4 MB
02 Running Example/006 Security Worksheet - Facewoof.docx41.5 KB
02 Running Example/006 Security Worksheet - Facewoof.pdf163.9 KB
02 Running Example/006 Security Worksheet.mp410.7 MB
03 Assets and Accounts/001 Introduction.mp412.7 MB
03 Assets and Accounts/002 Determining Assets to Protect.mp413.7 MB
03 Assets and Accounts/003 Designing Your ISMS.mp47.4 MB
03 Assets and Accounts/004 Demo FaceWoof Security Plan.mp427 MB
03 Assets and Accounts/005 AWS Accounts vs Users.mp412.4 MB
03 Assets and Accounts/006 AWS Accounts.mp418.6 MB
03 Assets and Accounts/007 Best Practices.mp48.9 MB
04 The IAM User Model/001 Introduction.mp45.7 MB
04 The IAM User Model/002 IAM Users.mp418.4 MB
04 The IAM User Model/003 IAM Groups.mp49.7 MB
04 The IAM User Model/004 The IAM Model.mp44.5 MB
04 The IAM User Model/005 Best Practices.mp44.4 MB
05 The IAM Roles and Delegation/001 Introduction.mp43.1 MB
05 The IAM Roles and Delegation/002 Principle of Least Privilege.mp434.2 MB
05 The IAM Roles and Delegation/003 Delegation.mp411.4 MB
05 The IAM Roles and Delegation/004 IAM Roles in Practice.mp421.9 MB
05 The IAM Roles and Delegation/005 Complete IAM Model.mp43.3 MB
05 The IAM Roles and Delegation/006 Best Practices.mp45.1 MB
06 Infrastructure Security/001 Introduction.mp42.2 MB
06 Infrastructure Security/002 VPC.mp46.4 MB
06 Infrastructure Security/003 Security Zones and Network Segmentation.mp415.5 MB
06 Infrastructure Security/004 Strengthening Network Security.mp420.4 MB
06 Infrastructure Security/005 DoS and DDoS.mp410 MB
06 Infrastructure Security/006 Testing Security.mp47.4 MB
06 Infrastructure Security/007 FaceWoof Infrastructure Security.mp47.4 MB
06 Infrastructure Security/008 Best Practices.mp46.2 MB
07 Operating System Security/001 Introduction.mp41.8 MB
07 Operating System Security/002 Center for Internet Security (CIS).txt27 B
07 Operating System Security/002 EC2 Hardening.mp418.4 MB
07 Operating System Security/002 International Standards Organization (ISO).txt20 B
07 Operating System Security/002 National Institute for Standards Technology (NIST).txt21 B
07 Operating System Security/002 SysAdmin Audit Network Security Institute (SANS).txt21 B
07 Operating System Security/003 Makeware Protection.mp43.5 MB
07 Operating System Security/004 Additional Security Practices.mp43.7 MB
07 Operating System Security/005 Managing OS Level Access.mp43.5 MB
07 Operating System Security/006 Best Practices.mp42.5 MB
08 Data Security/001 Introduction.mp41.8 MB
08 Data Security/002 Data at Rest.mp420.1 MB
08 Data Security/003 Data in Transit.mp416.6 MB
08 Data Security/004 Data and FaceWoof.mp49.7 MB
08 Data Security/005 Best Practices.mp43.1 MB
09 Other Considerations/001 Introduction.mp45 MB
09 Other Considerations/002 Managing Logs.mp49.9 MB
09 Other Considerations/003 Data Decommissioning.mp45.3 MB
09 Other Considerations/004 AWS Assistance.mp45.8 MB
09 Other Considerations/005 Best Practices.mp45.8 MB
10 Wrapping Up/001 Introduction.mp43.7 MB
10 Wrapping Up/002 A Secure FaceWoof.mp427.9 MB
10 Wrapping Up/003 Amazon Virtual Private Cloud.txt28 B
10 Wrapping Up/003 AWS Certified Security Specialty ACG Course.txt59 B
10 Wrapping Up/003 AWS Security Best Practices White Paper Dated August 2016.txt64 B
10 Wrapping Up/003 AWS Security Hub.txt37 B
10 Wrapping Up/003 IAM Model.txt28 B
10 Wrapping Up/003 Practical Event-Driven Security with AWS ACG Course.txt67 B
10 Wrapping Up/003 Whats Next.mp411.4 MB
10 Wrapping Up/004 Conclusion.mp413 MB

Alternative Torrents for 'FreeCoursesOnline.Me Cloud Guru AWS Security Best Practices'.

There are no alternative torrents found.