Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

LinkedIn Learning

AWS Well-Architected Framework: Security Pillar

via LinkedIn Learning

Overview

Take a deeper look at the second pillar of the AWS Well-Architected Framework: security.

Syllabus

Introduction
  • Understanding the AWS Well-Architected Framework: The security pillar
  • What you should know
1. Design Principles of the Security Pillar
  • Security pillar overview
  • Design principles
  • Identity and Access Management
  • Demo: IAM security overview
  • Protecting AWS credentials
  • Identify threats: Detective controls
2. Identity and Security
  • AWS detective controls for security
  • Implement an auditing workflow
  • Challenge: Review a CloudTrail event
  • Solution: Review a CloudTrail event
3. Auditing
  • Auditing and notifications
  • Infrastructure protection
  • Key AWS services for infrastucture protection
4. Data and Protection
  • Data protection methods
  • Key AWS services for data protection
  • Protecting your data at rest at AWS
  • Protecting data in transit at AWS
  • Responding to security incidents
  • Managing incident response
  • Demo: Using the Well-Architected tool
Conclusion
  • Next steps

Taught by

Mark Wilkins

Reviews

4.8 rating at LinkedIn Learning based on 59 ratings

Start your review of AWS Well-Architected Framework: Security Pillar

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.