AWS Cybersecurity Engineer: Server Hardening, Firewall Management, Vulnerability Scanning, and CI/CD Security Automation
Master AWS cybersecurity with hands-on training in server hardening, firewall management, vulnerability scanning, and CI/CD security automation.
...
Share
Introduction to AWS Security Best Practices
Unit 1: AWS Security Fundamentals
Shared Responsibility
Compliance Frameworks
AWS Account Setup
IAM Introduction
IAM Roles
Unit 2: Key AWS Security Services Overview
Intro to Security Services
GuardDuty Explained
AWS Inspector
AWS Shield
Key Management Service
EC2 Instance Hardening Fundamentals
Unit 1: Secure EC2 Instance Creation and Initial Configuration
Choosing Secure AMIs
Right-Sizing Instances
IAM Roles for EC2
Key Pair Generation
Launching Your Instance
Unit 2: Basic Hardening and Network Access Control
Disabling Unnecessary Services
Account Management
SSH Configuration
Security Groups Deep Dive
Limiting Inbound Traffic
Advanced Server Hardening Techniques
Unit 1: CIS Benchmarks and Host-Based Firewalls
CIS Benchmarks Intro
SSM for CIS
Host Firewall Intro
iptables Deep Dive
firewalld Deep Dive
Unit 2: OS Hardening and Intrusion Detection
Kernel Tuning
File System Security
IDS Intro
Deploying Suricata
Snort on AWS
Introduction to AWS Network Firewall
Unit 1: AWS Network Firewall Fundamentals
What is Network Firewall?
Firewall Architecture
Rule Groups Explained
Firewall Policies Defined
Pricing Considerations
Unit 2: Deploying and Configuring AWS Network Firewall
Prerequisites
Deploy the Firewall
Routing Configuration
Basic Firewall Rules
Testing Your Setup
Advanced AWS Network Firewall Configuration
Unit 1: Stateful Rules and Deep Packet Inspection
Stateful Firewall Rules
Rule Actions: Revisited
Suricata: Intro
Writing Suricata Rules
Suricata Rule Management
Unit 2: Logging, Automation, and Updates
Logging Overview
Metrics and Monitoring
Automated Rule Updates
Terraform for Firewall
Testing Your Firewall
Vulnerability Scanning with AWS Inspector
Unit 1: AWS Inspector Setup and Configuration
Inspector: The Basics
IAM Role for Inspector
Install the Agent
Creating a Target
Assessment Templates
Unit 2: Running Assessments and Analyzing Findings
Run Your First Scan
Findings Overview
Digging Deeper
Security Hub Integration
Automated Reporting
Remediation Workflow and Patch Management
Unit 1: Vulnerability Remediation Workflow
Remediation Workflow Intro
Prioritizing Findings
Creating Remediation Plans
Tracking Remediation
Verification and Closure
Unit 2: Automated Patch Management
Patch Manager Overview
Patch Baselines
Patching EC2 Instances
Rollback Strategies
Patch Compliance Reporting
Introduction to Infrastructure as Code (IaC) with Terraform
Unit 1: IaC Fundamentals and Terraform Setup
What is Infrastructure?
The IaC Revolution
Terraform: An Overview
Terraform Installation
AWS CLI Configuration
Unit 2: Terraform Basics and State Management
Terraform Configuration
Creating a VPC
EC2 Instance Creation
Terraform State Explained
Remote State Management
Securing CI/CD Pipelines with Terraform
Unit 1: Integrating Security Scanning Tools
Intro to Security Tools
Checkov Integration
Snyk Integration
Bridgecrew Deep Dive
Tool Comparison
Unit 2: Policy-as-Code and Secure State
Policy-as-Code Intro
AWS Config Rules
Sentinel Deep Dive
Securing Terraform State
State Versioning
CI/CD Pipeline Security with AWS CodePipeline
Unit 1: Building a Secure CI/CD Pipeline
Pipeline Foundations
IAM Roles for Pipelines
Source Code Security
Build Stage Security
Deployment Stage Security
Unit 2: Advanced Security Integrations and Automation
Static Code Analysis
Dynamic Security Testing
Approval Gates
Policy as Code
Automated Remediation
Continuous Security Monitoring with AWS Security Hub
Unit 1: Configuring and Integrating AWS Security Hub
Security Hub: The Basics
Enabling Security Hub
Hub and Inspector
Hub and GuardDuty
Hub and Other Services
Unit 2: Customization and Automation
Custom Findings
Creating Custom Insights
Automated Remediation
SIEM Integration
Security Hub: Pro Tips
Log Management and Analysis with CloudWatch
Unit 1: CloudWatch Logs Fundamentals
Intro to CloudWatch Logs
Configuring Log Collection
Collecting Service Logs
Log Data Retention
Basic Log Searching
Unit 2: Advanced Analysis and Integration
CloudWatch Metrics
CloudWatch Alarms
SIEM Integration
Log Data Encryption
Compliance
Threat Detection with Amazon GuardDuty
Unit 1: GuardDuty Fundamentals and Configuration
GuardDuty: The Basics
Enabling GuardDuty
Trusted IP Lists
GuardDuty Findings
Finding Archiving
Unit 2: Advanced GuardDuty and Automation
Prioritizing Incidents
Automated Responses
SIEM Integration
EventBridge Integration
Cross-Account Findings
Incident Response Planning and Execution
Unit 1: Crafting and Simulating Incident Response
IR Plan Essentials
AWS Incident Types
Tabletop Exercises
Simulate: EC2 Compromise
Simulate: Data Breach
Unit 2: AWS Services for Incident Response Automation
Forensics with S3
CloudTrail Deep Dive
Automate with SSM
Lambda for IR
IR Best Practices
Compliance and Auditing in AWS
Unit 1: AWS Compliance Programs and Monitoring
AWS Compliance Overview
AWS Artifact Deep Dive
Intro to AWS Config
Deploying AWS Config
Managed Config Rules
Unit 2: Data Residency, Sovereignty, and Audit Trails
Data Residency Explained
Data Residency Controls
Intro to CloudTrail
Configuring CloudTrail
Analyzing Audit Logs
Advanced Security Automation and Orchestration
Unit 1: Automating Security with Step Functions and Lambda
Intro to Step Functions
Building a Basic Workflow
Lambda Security Integration
Securing Step Functions
Real-World Examples
Unit 2: Advanced Automation with Boto3 and Security Tools
Intro to Boto3
Automating Security Tasks
Integrating 3rd Party Tools
Advanced Techniques
Best Practices