Video description
Overview
Continuous Compliance, Encryption, and Security on AWS is a series of video courses that will help you use AWS services to define compliance and encryption as code, and to create an end-to-end continuous security solution. These services include AWS Config Rules, Amazon EventBridge Rules, AWS CloudFormation, AWS CodePipeline, AWS Lambda, AWS Key Management Service, AWS CodeCommit, AWS CodeBuild, AWS Step Functions, AWS Organizations, AWS Security Hub, Amazon GuardDuty, Amazon Inspector, AWS Secrets Manager, Amazon VPC, Amazon Macie, AWS Audit Manager, and many others.
You will learn how to use a combination of these tools to prevent, detect, encrypt, and remediate noncompliant resources in your software systems. The videos in this series will also help you apply design principles for security and build continuous security solutions. Paul Duvall has multiple AWS certifications including AWS Certified Security - Specialty. He has architected, implemented, and managed software and systems solutions for more than 20 years. Throughout the series, you will have the opportunity to work along with Paul as he demonstrates how to automate the provisioning, encryption and security of these services, and how to include them as part of a deployment pipeline using AWS CloudFormation and AWS CodePipeline.
Courses include
- Continuous Compliance on AWS (The DevSecOps on AWS Series) LiveLessons (Video Training)
- Continuous Encryption on AWS (The DevSecOps on AWS Series) LiveLessons (Video Training)
- Continuous Security on AWS (The DevSecOps on AWS Series) LiveLessons (Video Training)
Skill Level
- Intermediate to Advanced
Learn How To
- Apply key compliance, encryption, and security concepts on AWS.
- Use AWS services and tools to automate compliance, encryption, and security into your software delivery process.
Who Should Take This Course
- Software developers and security and compliance professionals who want to integrate compliance, encryption, and security into every facet of the software development and delivery process.
- Professionals with a working knowledge of AWS and programming experience who want to make compliance, encryption, and security ubiquitous across their systems.
Course Requirements
- Working knowledge of AWS (for example, 1-2+ years working with AWS).
- Knowledge of AWS CloudFormation.
- Practical experience with high-level programming experience, such as Python, Java, Node.js, etc. is helpful.
About the Author
Paul Duvall was a founder and CTO of an AWS Premier Consulting Partner for over 10 years. He was an AWS Hero from 2016-2021. He has multiple AWS certifications including AWS Certified Security - Specialty. He has architected, implemented, and managed software and systems solutions for more than 20 years. He is the principal author of Continuous Integration: Improving Software Quality and Reducing Risk (Addison-Wesley, 2007), a 2008 Jolt Award Winner, and author of many other publications, including DevOps Essentials on AWS LiveLessons (Addison-Wesley, 2017). He's written for several publications including Forbes and Stelligent and hosted the "DevOps on AWS Radio" podcast.
About Pearson Video Training
Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Sams, and Que Topics include: IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.
Table of contents
- Introduction
- Lesson 1: Automating AWS Resources
- Lesson 2: Preventive Controls
- Lesson 3: Detective Controls
- Lesson 4: More Detective Controls
- Lesson 5: Automated Remediation
- Lesson 6: Continuous Compliance
- Summary
- Introduction
- Lesson 1: Automating AWS Resources
- Lesson 2: Key Management
- Lesson 3: Developing with Encryption
- Lesson 4: Encryption in Transit
- Lesson 5: Encryption at Rest
- Lesson 6: Detecting Encrypted Resources
- Lesson 7: Logging and Searching KMS Keys
- Lesson 8: Continuous Encryption
- Summary
- Introduction
- Lesson 1: Common Tools for Continuous Security
- Lesson 2: Identity and Access Management
-
Lesson 3: Detection and Incident Response
- Learning objectives
- 3.1 AWS Security Hub
- 3.2 Amazon GuardDuty
- 3.3 Amazon Inspector
- 3.4 AWS Config
- 3.5 AWS CloudTrail
- 3.6 AWS IoT Device Defender
- 3.7 Amazon Detective
- 3.8 CloudEndure Disaster Recovery
- 3.9 Services Pipelines: Shift Left
- 3.10 Deployment Pipeline Architectures
- 3.11 Demo: AWS Security Hub
- Lesson 4: Infrastructure Protection
- Lesson 5: Data Protection
- Lesson 6: Compliance
- Lesson 7: Deployment Architectures
- Summary
Product information
- Title: Continuous Compliance, Encryption, and Security on AWS (The DevSecOps Series on AWS)
- Author(s):
- Release date: June 2021
- Publisher(s): Pearson
- ISBN: 0137628074
You might also like
video
Continuous Security on AWS (The DevSecOps on AWS Series)
Almost 4 Hours of Video Instruction Create a continuous security posture by defining all your AWS …
video
Continuous Encryption on AWS (The DevSecOps on AWS Series) LiveLessons (Video Training)
5+ Hours of Video Instruction Overview In this course, you learn how to use AWS services …
book
AWS Security Cookbook
Secure your Amazon Web Services (AWS) infrastructure with permission policies, key management, and network security, along …
book
Securing DevOps
Securing DevOps explores how the techniques of DevOps and security should be applied together to make …