• Report Links
    We do not store any files or images on our server. XenPaste only index and link to content provided by other non-affiliated sites. If your copyrighted material has been posted on XenPaste or if hyperlinks to your copyrighted material are returned through our search engine and you want this material removed, you must contact the owners of such sites where the files and images are stored.
  • Home
  • -
  • New Pastes

Securing Amazon Ec2 Instances

  • Thread starter King
  • Start date Nov 8, 2022

King

Administrator
Joined
Jul 12, 2021
Messages
25,005
Reaction score
5
Points
38
  • Nov 8, 2022
  • #1




Securing Amazon Ec2 Instances
Published 11/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 374.54 MB | Duration: 1h 0m

Using security groups, VPCs, IAM roles, and basic server security best practices to protect your AWS resources​

What you'll learn
Address the threat categories facing EC2 instances and the possible consequences of an attack
Apply the range of security tools AWS provides to help us protect our instances
Configure instance security groups, IAM roles, and VPC design to provide optimal protection
Integrate general server security best-practices and the AWS Shared Responsibility Model with your infrastructure design
Requirements
Besides basic familiarity with using EC2 instances, no prerequisite knowledge is needed for this course.
Comfort with the AWS CLI will be helpful and familiarity with Linux is a bonus.
Description
Amazon's Elastic Cloud Compute (EC2) service is borderline magic. After all, being able to provision and launch a fully-functioning, enterprise-quality cloud server in just a minute or two with no up-front costs is something we could barely have imagined even a decade ago. But all that cloud goodness doesn't change an admin's primary responsibility: to protect infrastructure from attack. The easier EC2 makes it to push out more and more applications, the more we're exposed to a lot of hostile - and scary - threats.If you're responsible for EC2 instance workloads - or even if you're just considering the possibility - you need to understand what defensive skills and tools are available and how you can use them. This course will review the current threat landscape and some general server security best practices. I'll introduce you to the significant security measures AWS themselves have taken on our behalf, and how to make the best use of their security groups, IAM roles, and VPC design...

Read more

Continue reading...
 
https://xenforo.be/
Upvote 0 Downvote
You must log in or register to reply here.
Share:
Facebook Twitter Reddit Pinterest Tumblr WhatsApp Email
  • Home
  • -
  • New Pastes
  • Terms and rules
  • Privacy policy
  • Help
  • Home
AMP generated by AMPXF.com
Menu
Log in

Register

  • Home
    • Go Premium
  • Go Premium / Advertise
  • New Ad Listings
  • What's new
    • New posts
    • New Ad Listings
    • Latest activity
  • Members
    • Registered members
    • Current visitors
X

Privacy & Transparency

We use cookies and similar technologies for the following purposes:

  • Personalized ads and content
  • Content measurement and audience insights

Do you accept cookies and these technologies?

X

Privacy & Transparency

We use cookies and similar technologies for the following purposes:

  • Personalized ads and content
  • Content measurement and audience insights

Do you accept cookies and these technologies?