AWS: Security and Key Management

Coursera Courses ↗ · Coursera

Open Course on Coursera

Free to audit · Opens on Coursera

AWS: Security and Key Management

Coursera · Intermediate ·🔐 Cybersecurity ·1mo ago
AWS: Security and Key Management Course is the third course of Exam Prep (SAP-C02): AWS Certified Solutions Architect - Professional Specialization. This course provides a comprehensive understanding of AWS IAM for managing users, groups, policies, and MFA, alongside AWS IAM Identity Center, AWS Certificate Manager for SSL/TLS certificates, AWS Key Management Service for encryption, including Amazon S3 encryption options, and AWS Resource Access Manager for centralized access control. The course covers network security with AWS WAF and Shield, threat detection using Amazon GuardDuty and Amazon Macie, and vulnerability management with Amazon Inspector. This course facilitates learners with approximately 3:00-3:30 Hours of Video lectures that provide both Theory and Hands-On knowledge. Also, Graded and Ungraded Quizzes are provided with every module to test learners' ability. - Module 1: Security in AWS - Module 2: Key Management in AWS This course is designed for professionals seeking to demonstrate a comprehensive understanding of core AWS security services, including Identity and Access Management, threat detection, data protection, and vulnerability management, crucial for building and deploying secure applications and protecting sensitive data on the AWS platform. - Senior Solutions Architects - Enterprise Architects - Cloud Infrastructure Architects - Senior DevOps Engineers By the end of the course, learners will be able to: - Manage users, groups, and roles using AWS IAM and IAM Identity Center. - Configure AWS WAF and AWS Shield to protect applications from common web exploits and DDoS attacks. - Manage encryption keys and secure data using AWS Key Management Service (KMS) and S3 encryption methods, respectively.
Watch on Coursera ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Related AI Lessons

Stop Blindly Disabling CSRF — Dynamic CSRF Configuration in Spring Security 6
Learn to dynamically configure CSRF protection in Spring Security 6 for hybrid enterprise APIs, replacing global disable strategies
Medium · Cybersecurity
Microsoft Reveals Kazuar Malware’s Advanced Modular Design and Peer-to-Peer Botnet Capabilities
Microsoft reveals Kazuar malware's advanced modular design and peer-to-peer botnet capabilities, posing a significant threat to cybersecurity
Medium · Cybersecurity
The OpenAI Breach Wasn't About OpenAI – It Was About the 84 Packages Above Them
The OpenAI breach highlights the importance of securing dependencies in the software supply chain, affecting 84 packages above them
Dev.to · Dimitris Kyrkos
Years of Apple's Best Security Work, Cracked in Five Days — Here's What Developers Should Know
Apple's best security measures were cracked in five days, highlighting the importance of ongoing security efforts for developers
Dev.to · ArshTechPro
Up next
How do I restrict access of IAM Identities to specific Amazon EC2 resources?
Amazon Web Services
Watch →