Users Online
· Guests Online: 40
· Members Online: 0
· Total Members: 188
· Newest Member: meenachowdary055
· Members Online: 0
· Total Members: 188
· Newest Member: meenachowdary055
Forum Threads
Newest Threads
No Threads created
Hottest Threads
No Threads created
Latest Articles
DEMO - AWS Security Operations Securing Core AWS Infrastructure Services
DEMO - AWS Security Operations Securing Core AWS Infrastructure Services AWS Cloud Services |
Categories | Most Recent | Top Rated | Popular Courses |
Uploader | Date Added | Views | Rating | |
Superadmin | 31.05.17 | 475 | No Rating | |
Description | ||||
By observing this tutorial, you will learn the most valuable tutorial on how to secure the infrastructure hosted by Amazon Web Services. The instructor teaches you all the content in plain language and during practical projects. Course Overview : Course Overview Managing Access Control : Securing Core Infrastructure Services Identity and Access Management Defining Security Controls Controlling Root Account Security Managing Multiple Accounts IAM Users and Security Controls Defining IAM Policy for the User Controlling Access to Resources Access Keys and Passwords Security Tools IAM Groups IAM Policies: The Basics IAM Policy Types Delegation and Federation Best Practices for Planning Access Control Securing Core Infrastructure : Securing Core Infrastructure Securing EC2 Infrastructure Amazon Machine Instances AMI Storage Choices and Key Pairs EC2 Security Options Interfaces and Addresses Network Interfaces and Addresses Dedicated Instances and Hosts Securing EBS Volume EBS Volume and Snapshot Security VPC Architecture VPC Setup Options VPC Security: Part A VPC Security and Connectivity: Part B VPC Security Considerations Best Practices Securing Access to Edge Locations : Securing Access to Edge Locations Elastic Load Balancing (Classic) Load Balancer Elastic Load Balancer Operation Classic ELB Security Features Application Load Balancer Elastic Load Balancer Setup Route 53 AWS Web Application Firewall Configuring the Web Application Firewall Best Practices for Securing Access |
Ratings
Comments
No Comments have been Posted.
Post Comment
Please Login to Post a Comment.