Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

Securing the AWS Cloud: A Guide for Learning to Secure AWS Infrastructure (Tech Today) 1st Edition

Rating
-
Sold
-
Pages
517
Grade
A+
Uploaded on
15-05-2025
Written in
2024/2025

Securing the AWS Cloud: A Guide for Learning to Secure AWS Infrastructure (Tech Today) 1st Edition Dive into the world of cloud security with Securing the AWS Cloud: A Guide for Learning to Secure AWS Infrastructure by Brandon Carroll, a comprehensive guide crafted for those eager to fortify their Amazon Web Services (AWS) deployments. Whether you are starting from scratch or looking to enhance an existing setup, this book serves as your essential roadmap to understanding and implementing robust security measures in the AWS environment. The author, a seasoned infrastructure security expert, begins with the basics of cybersecurity and gradually introduces more complex AWS-specific security practices. His structured approach helps you use your existing knowledge to effectively secure your AWS cloud. The book navigates through a series of real-world challenges and provides actionable solutions, equipping you with the skills needed to tackle security issues head-on. You'll: Learn foundational security practices to safeguard your AWS environment right from the start. Master advanced techniques for identity management, threat detection, and data security within AWS. Develop resilience and recovery strategies to maintain robust security and ensure business continuity. Securing the AWS Cloud is the ideal resource for IT professionals, system administrators, and anyone aspiring to specialize in cloud security. It's tailor-made to enhance your ability to deploy secure, reliable, and private AWS solutions consistently. If you're ready to take your AWS security skills to the next level, don't wait. Buy your copy today and start building a safer cloud environment!

Show more Read less
Institution
Securing The AWS Cloud
Course
Securing the AWS Cloud

Content preview

,Table of Contents
Cover
Table of Contents
Title Page
Copyright
Dedication
Preface
Acknowledgments
Chapter 1: Introduction to Cloud Security
Understanding Cloud Computing
AWS’s Role in Cloud Computing
Chapter 2: AWS Security Fundamentals
AWS Security Service and Features
Security Best Practices
The AWS Well-Architected Framework
Conclusion
Reference
Chapter 3: Identity and Access Management on AWS
Overview
Use Cases for IAM
Understanding the Lingo
Policies and Permissions in IAM
IAM Identities and Managing Access
Creating an IAM
IAM User Groups
IAM Roles
IAM Policies

, AWS IAM Identity Center
Conclusion
References
Chapter 4: AWS Identity Center: Centralizing Access Management
Understanding AWS Identity Center
Best Practices and Advanced Features
Conclusion
Reference
Chapter 5: Infrastructure Protection on AWS
Core Infrastructure Protection Concepts
Creating VPCs and Subnets
Security Groups and Network Access Control Lists (NACLs)
Elastic Load Balancing Security
Adding AWS Network Firewall to Your VPC
Cleaning Up Your AWS Resources
Conclusion
References
Chapter 6: Threat Detection and Management on AWS
Introduction to Threat Detection
Diving into Threat-Detection Services with Amazon GuardDuty
AWS Security Hub Implementation
Threat-Detection Methodologies
Conclusion
References
Chapter 7: Data Security and Cryptography on AWS
Introduction to Data Security and Cryptography
Introduction to Encryption
Secrets Management with AWS Secrets Manager
Cryptographic Best Practices

, Cleaning Up Your Resources
Conclusion
References
Chapter 8: Monitoring, Logging, and Compliance on AWS
Overview
Core Concepts of Monitoring and Logging
Monitoring Network Traffic with VPC Flow Logs
Monitoring IAM Activity with CloudTrail
Centralized Security Dashboard Setup
Compliance Framework Examples
Best Practices for Monitoring and Logging in AWS Environments
Cleaning Up Your Resources
Conclusion
References
Chapter 9: Resilience and Recovery Strategies
Why Resilience and Recovery Matter to Cloud Security
Professionals
Understanding Recovery Objectives
Cleaning Up Your Resources
Conclusion
References
Chapter 10: Security Operations and Automation
The Evolution of Security Operations
Building Automated Security Controls
Security Operations Workflow
Implementing Different Types of Playbooks
Understanding Security Orchestration
Measuring Security Operations Effectiveness
Cleaning Up Your Resources

Written for

Institution
Securing the AWS Cloud
Course
Securing the AWS Cloud

Document information

Uploaded on
May 15, 2025
Number of pages
517
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$25.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Wiseman NURSING
View profile
Follow You need to be logged in order to follow users or courses
Sold
7357
Member since
4 year
Number of followers
3860
Documents
27802
Last sold
7 hours ago
Premier Academic Solutions

3.9

1510 reviews

5
742
4
278
3
231
2
81
1
178

Trending documents

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions