AWS: Infrastructure Security

Coursera Courses ↗ · Coursera

Open Course on Coursera

Free to audit · Opens on Coursera

AWS: Infrastructure Security

Coursera · Beginner ·🔐 Cybersecurity ·1mo ago
AWS: Infrastructure Security Course is the second course of Exam Prep SCS-C02: AWS Certified Security – Specialty Specialization. This course assists learners to design security controls for edge services such as AWS WAF and AWS Shield. This course is basically divided into two modules and each module is further segmented by Lessons and Video Lectures. This course facilitates learners with approximately 3:00-3:30 Hours of Video lectures that provide both Theory and Hands-On knowledge. Also, Graded and Ungraded Quizzes are provided with every module in order to test the ability of learners. Module 1: Network Security Controls: VPC Components Module 2: Network Security Controls: VPC Peering and Endpoints Module 3: Security Controls for Edge Services in AWS Two years of experience in configuring VPC infrastructure. Candidates being certified with AWS Solutions Architect Associate can prepare for this course and appear for the Security specialty exam. By the end of this course, a learner will be able to: - Implement VPC security mechanisms in AWS. - Determine solutions to produce desired network behavior in AWS. - Explore AWS services to scan vulnerabilities in compute workloads.
Watch on Coursera ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Related AI Lessons

WordPress 7.0 Faces Security Concerns Over AI API Keys via @sejournal, @martinibuster
WordPress 7.0 exposes valuable AI API keys, posing a significant security risk
Search Engine Journal
Secure Video Transcoding API: No FFmpeg Server to Patch
Learn how to secure video transcoding using APIs without relying on FFmpeg servers, reducing vulnerability to over 100 known CVEs
Dev.to · Javid Jamae
Six Trust Boundaries Between Your React App and the Next Compromise
Learn how to establish trust boundaries between your React app and external dependencies to prevent security compromises
Medium · JavaScript
Six Trust Boundaries Between Your React App and the Next Compromise
Learn to secure your React app from supply-chain attacks with 6 trust boundaries after the TanStack npm package compromise
Medium · DevOps
Up next
What Is Security Clearance? Explained Simply
Coursera
Watch →