The Cloud Security on AWS course provides practical training on securing cloud infrastructure using AWS-native services. You'll gain hands-on knowledge in cloud security fundamentals, AWS Identity and Access Management (IAM), network security, data encryption, threat detection, and incident response.
通过 Coursera Plus 提高技能,仅需 239 美元/年(原价 399 美元)。立即节省
11 条评论
推荐体验
推荐体验
初级
A good understanding of fundamental cloud computing concepts and basic knowledge of AWS services is necessary.
11 条评论
推荐体验
推荐体验
初级
A good understanding of fundamental cloud computing concepts and basic knowledge of AWS services is necessary.
您将学到什么
Apply encryption, key management, and secure storage practices with AWS services.
Configure AWS IAM for identity, access, and permissions management.
Design secure architectures with VPCs, firewalls, and network access controls.
Implement monitoring, logging, and response workflows for incident detection.
要了解的详细信息

添加到您的领英档案
3 项作业
了解顶级公司的员工如何掌握热门技能

该课程共有1个模块
This Module covers fundamental cloud security concepts, AWS security services, and access control. You'll also learn threat detection, network security, encryption, incident response, and AWS compliance.
涵盖的内容
24个视频12篇阅读材料3个作业6个讨论话题
24个视频•总计118分钟
- Course Introductory Video•4分钟
- Applying the AWS Shared Responsibility Model•6分钟
- Getting Started with AWS Cloud Essentials•5分钟
- Explore the AWS Security Services, Foundations and its's Pillars•7分钟
- Managing AWS Risk and Compliance program•4分钟
- Securely Manage AWS Identity and Access Management (IAM) •8分钟
- Centrally Manage AWS IAM Identity Center (successor to SSO)•6分钟
- Implement Secure Identity Management and User Authentication to Amazon Cognito•6分钟
- Access Control on Amazon Verified Permissions •2分钟
- Centralized User and Device Management for AWS Directory Service •5分钟
- Automate Security Checks, Centralize Alerts with AWS Security Hub•6分钟
- Protect AWS accounts with threat detection using Amazon GuardDuty •5分钟
- Continual vulnerability management at scale with Amazon Inspector•3分钟
- Observe and Monitor Resources and Applications on AWS with Amazon CloudWatch•5分钟
- Centralized Firewall Rule Management with AWS Firewall Manager•5分钟
- Deploy VPC Network Firewall Security using AWS Network Firewall•6分钟
- Protect Web Applications from Exploits with AWS Web Application Firewall (WAF)•5分钟
- Filter and control outbound DNS traffic for your VPCs with Amazon Route 53 Resolver DNS Firewall•3分钟
- Discover and Protect your Sensitive Data at Scale with Amazon Macie•4分钟
- Create and Control Keys to Encrypt using AWS Key Management Service (AWS KMS)•4分钟
- Centrally Manage Secrets using AWS Secrets Manager•6分钟
- Analyze and visualize security data to investigate potential security issues with Amazon Detective•4分钟
- Scalable, cost-effective application recovery to AWS using AWS Elastic Disaster Recovery•5分钟
- No cost, Self-service Portal for On-demand Access to AWS Compliance Reports with AWS Artifact•4分钟
12篇阅读材料•总计74分钟
- Course Overview•4分钟
- How to Use Discussion Forums•1分钟
- Simply and Securely Share your AWS Resources with AWS Resource Access Manager•5分钟
- Centrally Manage the Enviroment with AWS Organizations•5分钟
- Assess, Audit, and Evaluate Resource Configurations using AWS Config•7分钟
- Track user activity and API usage with AWS CloudTrail•7分钟
- Managed DDoS Protection through AWS Shield•7分钟
- Secure Access to Corporate Applications without a VPN using AWS Verified Access•7分钟
- Manage HSMs on AWS with AWS CloudHSM•7分钟
- Provision SSL/TLS certificates using AWS Certificate Manager•7分钟
- Simplifying AWS Usage Auditing for Risk & Compliance with AWS Audit Manager•7分钟
- Course Synopsis•10分钟
3个作业•总计30分钟
- Knowledge Check: Securely Manage Identity and Access Management •5分钟
- Knowledge Check: Network and Application Protection •5分钟
- End Course Knowledge Check •20分钟
6个讨论话题•总计18分钟
- How is the Shared Responsibility Model in AWS security impacting customers and the vulnerability of data?•3分钟
- Are AWS Resources Isolated Based on Least Privilege Principles?•3分钟
- How do you Monitor and Respond to Security Incidents in Real-Time using AWS Security Tools and Services?•3分钟
- Is there a process for regularly reviewing and updating security groups and NACL rules?•3分钟
- Have you identified all the applications, services, and processes that need access to the stored secrets?•3分钟
- How can AWS Detective be Utilized in the Industrial Sector to Analyze and Visualize Security Data, Aiding in the Investigation of Potential Security Issues?•3分钟
位教师

提供方

提供方

Edureka is an online education platform focused on delivering high-quality learning to working professionals. We have the highest course completion rate in the industry and we strive to create an online ecosystem for our global learners to equip themselves with industry-relevant skills in today’s cutting edge technologies.
从 Computer Security and Networks 浏览更多内容
PPackt
课程
状态:免费免费指导项目
人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.

Jennifer J.

Larry W.

Chaitanya A.
常见问题
The Cloud Security on AWS course is a comprehensive training program that focuses on cloud security, AWS security services, and AWS security specialties. This course delves into the intricacies of cloud security, emphasizing the importance of AWS security in the realm of cloud computing security. Participants learn to secure data, applications, and networks through various AWS security services and strategies, understanding key concepts like data security in cloud computing and cloud network security.
Taking the Cloud Security on AWS course provides numerous advantages, including in-depth knowledge of cloud security and AWS security services, hands-on experience in securing cloud-based resources, and the expertise to design and implement secure AWS cloud security solutions. The course not only prepares individuals for the AWS security specialty certification but also equips them with the skills necessary to address challenges related to cloud computing security and data security in cloud computing.
Cloud security encompasses the practices, technologies, and policies implemented to protect cloud-based data, applications, and infrastructure. It emphasizes the secure deployment of resources in cloud environments, ensuring AWS security and safeguarding against threats. This includes understanding and addressing issues related to cloud network security, data security in cloud computing, and leveraging AWS security services effectively.
Cloud security is of paramount importance due to its role in safeguarding sensitive data and ensuring the integrity of cloud-based systems. It guarantees the confidentiality and privacy of information through robust AWS security measures, addresses concerns related to cloud network security, and mitigates risks associated with cloud computing security. A strong emphasis on data security in cloud computing is crucial for building trust and credibility, emphasizing the significance of AWS cloud security solutions.
Various threats, including cloud security breaches, DDoS attacks, malware, insecure APIs, insider threats, and misconfigured security settings, pose risks to AWS security and cloud computing security. Understanding these threats is essential to implementing effective cloud network security measures and fortifying data security in cloud computing environments.
Implementing cloud security best practices involves employing robust AWS security services, data encryption methods, access control mechanisms, and multi-factor authentication. Regular audits, patch management, and the formulation of an incident response plan are essential components of ensuring AWS cloud security. Emphasizing these practices enhances cloud network security and addresses challenges related to data security in cloud computing effectively.
To delve deeper into cloud security, individuals can explore online courses focusing on AWS security, cloud computing security, and cloud network security. Engaging in forums and communities dedicated to AWS cloud security and cloud security topics provides valuable insights.
The Cloud Security on AWS course is designed for a wide range of individuals and professionals interested in cloud security, AWS security services. This includes:
- Security Professionals: Security experts and professionals responsible for designing and implementing secure cloud infrastructures using AWS security services.
- System Administrators: IT administrators involved in managing and securing cloud-based systems and resources.
- Cloud Architects: Professionals responsible for designing and architecting cloud solutions, focusing on AWS cloud security and cloud computing security.
- Developers: Software developers keen on understanding secure coding practices in cloud environments and ensuring AWS security in their applications.
- IT Managers: Managers overseeing cloud deployments, emphasizing the importance of cloud security, and AWS cloud security measures.
- Compliance and Risk Professionals: Individuals dealing with regulatory compliance, risk management, and audit processes in cloud environments, ensuring adherence to cloud security standards.
You’ll learn to use AWS KMS, CloudHSM, and related encryption features to manage keys and protect sensitive data.
Yes, you’ll configure IAM roles, policies, and permissions to manage secure access at scale.
Yes, you’ll explore CloudTrail, GuardDuty, and CloudWatch for monitoring, alerts, and automated response strategies.
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
When you purchase a Certificate you get access to all course materials, including graded assignments. Upon completing the course, your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.
更多问题
提供助学金,




