17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
TORRENT DETAILS
[FreeCoursesOnline.Me] A Cloud Guru - AWS Security Best Practices (2020)
TORRENT SUMMARY
Status:
All the torrents in this section have been verified by our verification system
Learn what cloud security is all about and how to use the principle of shared responsibility to build a secure environment for your applications within the AWS Cloud ecosystem.
Description
Some of the most commonly heard reasons for why a company can’t move to the cloud are concerns around security: “Our data is too sensitive to put in the cloud.”; “We can only trust servers that are in our data centers.”; “We can’t trust someone else with the security of our system”.
In reality, a cloud-based system often provides a more secure environment than an equivalent on-premise solution. How can this be? Well, cloud providers hire highly experienced security experts to help build their security capabilities, so by moving to the cloud, you too can use these security capabilities created by experts without having to be an expert yourself!
The key to achieving this is understanding the sophisticated tools made available to you by the cloud vendor, and the key to understanding is right here in this course! This course discusses the security capabilities available to users of AWS, and best practices for utilizing those capabilities. When finished with this course, you will have a solid understanding of the Shared Responsibility Model that is at the heart of AWS security patterns, along with how to employ basic security best practices such as the principle of least privilege.
This course will explore the theory behind various security topics, as well as provide examples of how those topics can be put to use within the AWS Cloud ecosystem. We'll focus on explaining these best practices, and how to apply them to keep your applications well protected. The end result is a more secure system – more secure than even your own data center.
EXPECTED OUTCOMES[b]
• Demonstrate an understanding of the principle of shared responsibility and how it applies to AWS and you.
• Demonstrate an understanding of authentication and authorization best practices.
• Understand security at various layers including infrastructure, operating system, data and application .
• Learn how to detect threats and intrusions.
• Learn to create policies and enforce their requirements.
[b]INTENDED AUDIENCE[b]
• Security engineers concerned about building cloud-based applications securely.
• Operations engineers tasked with creating a secure cloud production environment.
• Technical management who wants to understand the principles and best practices involved in maintaining a secure cloud-based application.
[b]About Author
Lee Atchison is the Senior Director, Cloud Architecture at New Relic. He’s been with New Relic for seven years where he led the building of the New Relic infrastructure products, and helped New Relic architect a solid service-based system. Lee has 31 years of industry experience, and learned cloud-based, scalable systems during his seven years as a Senior Manager at Amazon.com, where among other things he led the creation of AWS Elastic Beanstalk. Lee is the author of the book “Architecting for Scale”, published in 2016 by O’Reilly Media.
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
0. Websites you may like/How you can help our Group!.txt
208 B
01 Introduction/001 Introduction.mp4
36.4 MB
01 Introduction/002 AWS Security Best Practices White Paper Dated August 2016.txt
64 B
01 Introduction/002 Course Material.mp4
10.8 MB
01 Introduction/002 Security Worksheet.docx
36.2 KB
01 Introduction/002 Security Worksheet.pdf
146.9 KB
01 Introduction/003 Principle of Shared Responsibility.mp4
23.2 MB
01 Introduction/004 Chapter Summary.mp4
11.7 MB
02 Running Example/001 Introduction.mp4
9.9 MB
02 Running Example/002 The Example Application.mp4
18.4 MB
02 Running Example/003 Example Application Architecture.mp4
19.1 MB
02 Running Example/004 Example Infrastructure Architecture.mp4
16.1 MB
02 Running Example/005 Example Users and Access Management.mp4