MP4 | Video: h264, 1280×720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English | Duration: 58 Lessons (3h 55m) | Size: 5 GB
Overview
In this course, you will learn how to use AWS services, which provide the ability to create an end-to-end continuous security solution. These services include AWS CloudFormation, AWS CodePipeline, Amazon EventBridge, AWS Lambda, AWS Step Functions, AWS Organizations, AWS Security Hub, Amazon GuardDuty, AWS Config Rules, Amazon Inspector, AWS Secrets Manager, Amazon VPC, Amazon Macie, and AWS Audit Manager–among many others. You will learn how to use a combination of these services to apply key design principles for security and build continuous security solutions within your software systems. Throughout the course, you will see working examples of how to automate security using AWS services.
About the Instructor
Paul Duvall is a founder and former CTO of Stelligent–a Premier Consulting Partner with the DevOps and Security Competencies. He holds multiple AWS certifications including AWS Certified Security – Specialty. He has architected, implemented, and managed software and systems solutions for over 20 years. He is principal author of Continuous Integration: Improving Software Quality and Reducing Risk (Addison-Wesley, 2007), a 2008 Jolt Award winner.
He is also the author of many other publications, including the videos Continuous Compliance on AWS and Continuous Encryption on AWS, and Continuous Security on AWS, which are part of Addison-Wesley’s DevSecOps on AWS Series. He hosted the “DevOps on AWS Radio” podcast for over three years.
He enjoys blogging and speaking on all topics related to DevSecOps, Serverless, and AWS. You can find his blog posts and other content at paulduvall.io.
Skill Level
Intermediate to Advanced
Learn How To
Apply key design principles for security
Apply event-based design patterns for security
Utilize AWS Developer Tools for DevSecOps
Use AWS CodePipeline and AWS CloudFormation to model continuous security workflows
Define your AWS Organizations as code using org-formation
Automate detective controls using AWS CloudFormation, AWS Security Hub, AWS Config Rules, and Amazon Inspector
Protect network and host-level boundaries with Amazon VPC
Perform data classification using AWS CloudFormation and Amazon Macie
Create an audit assessment using AWS CloudFormation and AWS Audit Manager
Apply security as code for container-based workloads using AWS CodePipeline, AWS CodeBuild, and open source tooling
Who Should Take This Course
Software developers and security and compliance professionals who want to integrate security into every facet of the software development and delivery process
Professionals with a working knowledge of AWS and programming knowledge who want to make security ubiquitous across their systems
Course Requirements
Working knowledge of AWS (e.g., 1-2+ years working with AWS)
Practical experience with a high-level programming experience–such as Python, Java, Node.js, etc.–is helpful but not necessary
Table of Contents
Introduction
Lesson 1: Common Tools for Continuous Security
Lesson 2: Identity and Access Management
Lesson 3: Detection and Incident Response
Lesson 4: Infrastructure Protection
Lesson 5: Data Protection
Lesson 6: Compliance
Lesson 7: Deployment Architectures
Summary
Password/解压密码0daydown
Download rapidgator
https://rg.to/file/0e515a46c63492829cddb3eeec5d6c0b/Continuous_Security_on_AWS_(The_DevSecOps_on_AWS_Series).part01.rar.html
https://rg.to/file/525057f71a80074d2b0b2a84697d5750/Continuous_Security_on_AWS_(The_DevSecOps_on_AWS_Series).part02.rar.html
https://rg.to/file/7c196a2a726f6d73101090bda7ad1fc4/Continuous_Security_on_AWS_(The_DevSecOps_on_AWS_Series).part03.rar.html
https://rg.to/file/de62c0509b29a3cc36f486c0a0e6b87d/Continuous_Security_on_AWS_(The_DevSecOps_on_AWS_Series).part04.rar.html
https://rg.to/file/5e849f525140875a851a34901a1fef7e/Continuous_Security_on_AWS_(The_DevSecOps_on_AWS_Series).part05.rar.html
https://rg.to/file/69900b971249defff094aebfd00cb9c8/Continuous_Security_on_AWS_(The_DevSecOps_on_AWS_Series).part06.rar.html
https://rg.to/file/4f73f51ca0994fb9e8d01211284b87af/Continuous_Security_on_AWS_(The_DevSecOps_on_AWS_Series).part07.rar.html
https://rg.to/file/41a88b6a6b7a7a942c143e01add0eae9/Continuous_Security_on_AWS_(The_DevSecOps_on_AWS_Series).part08.rar.html
https://rg.to/file/3b6a034e71c1f359232e2797174c56ed/Continuous_Security_on_AWS_(The_DevSecOps_on_AWS_Series).part09.rar.html
https://rg.to/file/90f0a244b6f290c7b3219b87e5bf59d1/Continuous_Security_on_AWS_(The_DevSecOps_on_AWS_Series).part10.rar.html
https://rg.to/file/5494555ba78f88ef14b24adb9cb083f8/Continuous_Security_on_AWS_(The_DevSecOps_on_AWS_Series).part11.rar.html
Download nitroflare
https://nitroflare.com/view/09E4BC525DCBF7F/Continuous_Security_on_AWS_%28The_DevSecOps_on_AWS_Series%29.part01.rar
https://nitroflare.com/view/D10EC659D44EE42/Continuous_Security_on_AWS_%28The_DevSecOps_on_AWS_Series%29.part02.rar
https://nitroflare.com/view/1923961D91A3141/Continuous_Security_on_AWS_%28The_DevSecOps_on_AWS_Series%29.part03.rar
https://nitroflare.com/view/2D14E29EEC2DF67/Continuous_Security_on_AWS_%28The_DevSecOps_on_AWS_Series%29.part04.rar
https://nitroflare.com/view/5B822E59A3D7818/Continuous_Security_on_AWS_%28The_DevSecOps_on_AWS_Series%29.part05.rar
https://nitroflare.com/view/117444DB6EE93EE/Continuous_Security_on_AWS_%28The_DevSecOps_on_AWS_Series%29.part06.rar
https://nitroflare.com/view/2290391EEE889EF/Continuous_Security_on_AWS_%28The_DevSecOps_on_AWS_Series%29.part07.rar
https://nitroflare.com/view/324B31975C8B4CA/Continuous_Security_on_AWS_%28The_DevSecOps_on_AWS_Series%29.part08.rar
https://nitroflare.com/view/3DBD0DCA80388CD/Continuous_Security_on_AWS_%28The_DevSecOps_on_AWS_Series%29.part09.rar
https://nitroflare.com/view/65F760F542701B3/Continuous_Security_on_AWS_%28The_DevSecOps_on_AWS_Series%29.part10.rar
https://nitroflare.com/view/54064FFE3E08926/Continuous_Security_on_AWS_%28The_DevSecOps_on_AWS_Series%29.part11.rar
转载请注明:0daytown » Continuous Security on AWS (The DevSecOps on AWS Series)