SPECIAL OFFERS
Keep up with new releases and promotions.Sign up to hear from us.
Video accessible from yourAccountpage after purchase.
Register your productto gain access to bonus material or receive a coupon.
Almost 4 Hours of Video Instruction
创建一个连续的安全姿势通过定义一个ll your AWS security and compliance as code, and run in a continuous delivery workflow with every change using services and tools such as AWS CloudFormation, AWS CodePipeline, and many others.
Overview
In this course, you will learn how to use AWS services, which provide the ability to create an end-to-end continuous security solution. These services include AWS CloudFormation, AWS CodePipeline, Amazon EventBridge, AWS Lambda, AWS Step Functions, AWS Organizations, AWS Security Hub, Amazon GuardDuty, AWS Config Rules, Amazon Inspector, AWS Secrets Manager, Amazon VPC, Amazon Macie, and AWS Audit Manager--among many others. You will learn how to use a combination of these services to apply key design principles for security and build continuous security solutions within your software systems. Throughout the course, you will see working examples of how to automate security using AWS services.
About the Instructor
Paul Duvallis a founder and former CTO of Stelligent--a Premier Consulting Partner with the DevOps and Security Competencies. He holds multiple AWS certifications including AWS Certified Security - Specialty. He has architected, implemented, and managed software and systems solutions for over 20 years. He is principal author ofContinuous Integration: Improving Software Quality and Reducing Risk(Addison-Wesley, 2007), a 2008 Jolt Award winner.
He is also the author of many other publications, including the videosContinuous Compliance on AWSandContinuous Encryption on AWS, andContinuous Security on AWS, which are part of Addison-Wesley's DevSecOps on AWS Series. He hosted the“DevOps on AWS Radio” podcastfor over three years.
他喜欢写博客和口语话题related to DevSecOps, Serverless, and AWS. You can find his blog posts and other content atpaulduvall.io.
Skill Level
Intermediate to Advanced
勒arn How To
Introduction
0.1 AWS Security Concepts
0.2 AWS Security Practices and Resources
勒sson 1: Common Tools for Continuous Security
勒arning objectives
1.1 Amazon CloudWatch
1.2 AWS CodePipeline
1.3 AWS Cloud9
1.4 AWS CloudFormation
1.5 Amazon EventBridge
1.6 AWS Step Functions
1.7 AWS Systems Manager
1.8 AWS Lambda
1.9 Deployment Pipeline Architectures
1.10 Demo: Setup Dev Environment and CD Pipelines
勒sson 2: Identity and Access Management
勒arning objectives
2.1 AWS IAM
2.2 AWS Single-Sign On
2.3 Amazon Cognito
2.4 AWS Directory Service
2.5 AWS Resource Access Manager
2.6 AWS Organizations
2.7 Deployment Pipeline Architectures
2.8 Demo: AWS Organizations
勒sson 3: Detection and Incident Response
勒arning objectives
3.1 AWS Security Hub
3.2 Amazon GuardDuty
3.3 Amazon Inspector
3.4 AWS Config
3.5 AWS CloudTrail
3.6 AWS IoT Device Defender
3.7 Amazon Detective
3.8 CloudEndure Disaster Recovery
3.9 Services Pipelines: Shift Left
3.10 Deployment Pipeline Architectures
3.11 Demo: AWS Security Hub
勒sson 4: Infrastructure Protection
勒arning objectives
4.1 AWS Shield
4.2 AWS Web应用程序防火墙
4.3 AWS Firewall Manager
4.4 Amazon VPC
4.5 Deployment Pipeline Architectures
4.6 Demo: Amazon VPC
勒sson 5: Data Protection
勒arning Objectives
5.1 Amazon Macie
5.2 AWS Key Management Service (KMS)
5.3 AWS CloudHSM
5.4 AWS Certificate Manager (ACM)
5.5 AWS Secrets Manager
5.6 Deployment Pipeline Architectures
5.7 Demo: Amazon Macie
勒sson 6: Compliance
勒arning Objectives
6.1 AWS Artifact
6.2 AWS Audit Manager
6.3 Deployment Pipeline Architectures
6.4 Demo: AWS Audit Manager
勒sson 7: Deployment Architectures
勒arning Objectives
7.1 Deployment Architecture Considerations for Security
7.2 Demo: Container Security
Summary