AWS Security, Video Edition
.MP4, AVC, 1280x720, 30 fps | English, AAC, 2 Ch | 8h 29m | 1.37 GB
Author: Dylan Shields
.MP4, AVC, 1280x720, 30 fps | English, AAC, 2 Ch | 8h 29m | 1.37 GB
Author: Dylan Shields
Video description
In Video Editions the narrator reads the book while the content, figures, code listings, diagrams, and text appear on the screen. Like an audiobook that you can also watch as a video.
Running your systems in the cloud doesn’t automatically make them secure. Learn the tools and new management approaches you need to create secure apps and infrastructure on AWS.
In AWS Security you’ll learn how to:
- Securely grant access to AWS resources to coworkers and customers
- Develop policies for ensuring proper access controls
- Lock-down network controls using VPCs
- Record audit logs and use them to identify attacks
- Track and assess the security of an AWS account
- Counter common attacks and vulnerabilities
Written by security engineer Dylan Shields, AWS Security provides comprehensive coverage on the key tools and concepts you can use to defend AWS-based systems. You’ll learn how to honestly assess your existing security protocols, protect against the most common attacks on cloud applications, and apply best practices to configuring identity and access management and virtual private clouds.
About the Technology
AWS provides a suite of strong security services, but it’s up to you to configure them correctly for your applications and data. Cloud platforms require you to learn new techniques for identity management, authentication, monitoring, and other key security practices. This book gives you everything you’ll need to defend your AWS-based applications from the most common threats facing your business.
About the Book
AWS Security is the guide to AWS security services you’ll want on hand when you’re facing any cloud security problem. Because it’s organized around the most important security tasks, you’ll quickly find best practices for data protection, auditing, incident response, and more. As you go, you’ll explore several insecure applications, deconstruct the exploits used to attack them, and learn how to react with confidence.
What's Inside
- Develop policies for proper access control
- Securely assign access to AWS resources
- Lock-down network controls using VPCs
- Record audit logs and use them to identify attacks
- Track and assess the security of an AWS account
About the Reader
For software and security engineers building and securing AWS applications.