Continuous Encryption on AWS (The DevSecOps on AWS Series) LiveLessons (Video Training)

Continuous Encryption on AWS (The DevSecOps on AWS Series) LiveLessons (Video Training) PDF Author: PaulM. Duvall
Publisher:
ISBN:
Category :
Languages : en
Pages :

Get Book Here

Book Description
5+ Hours of Video Instruction Overview In this course, you learn how to use AWS services that provide the capability to define encryption and compliance as code. These services include AWS Key Management Service, AWS CloudFormation, AWS CodePipeline, AWS CodeCommit, AWS CodeBuild, AWS Config and Config Rules, Amazon CloudWatch Event Rules, and AWS Lambda. You learn how to use a combination of these services and tools to encrypt, prevent, detect, and remediate noncompliant resources within your software systems. Throughout the course, you will see working examples of how to automate the encryption of these services and how they can be included as part of a deployment pipeline using AWS CloudFormation and AWS CodePipeline. Skill Level Intermediate to Advanced Learn How To * Use AWS CloudFormation to provision AWS resources as code.* Use AWS CodePipeline to model continuous delivery workflows.* Create, disable, and delete symmetric keys using the AWS Key Management Service (KMS).* Automate the management of KMS keys using AWS CloudFormation.* Perform client-side encryption using the AWS Encryption SDK.* Create and automatically rotate encrypted username and password secrets for Amazon RDS using the AWS Secrets Manager and AWS Lambda.* Automate the provisioning of a deployment pipeline that deploys SSL/TLS AWS Certificate Manager (ACM) digital certificates using AWS CloudFormation and AWS CodePipeline.* Automate the provisioning of encryption when creating EBS, DynamoDB, RDS, and S3 resources using AWS CloudFormation.* Automate the provisioning of a deployment pipeline that deploys AWS Config Rules to detect unencrypted AWS resources using AWS CloudFormation and AWS CodePipeline.* Automatically provision a CloudTrail trail in CloudFormation and search the JSON files generated by CloudTrail using Amazon Athena.* Automate the provisioning of a deployment pipeline that deploys a solution capable of preventing, detecting, and remediating unencrypted resources using AWS CloudFormation and AWS CodePipeline. Who Should Take This Course * Software developers and security and compliance professionals who want to integrate encryption into every facet of the software development and delivery process.* Professionals with a working knowledge of AWS and programming knowledge who want to make encryption ubiquitous across their systems. Course Requirements * Working knowledge of AWS (that is, at least one to two years working with AWS) is required.* Practical e...

Continuous Encryption on AWS (The DevSecOps on AWS Series) LiveLessons (Video Training)

Continuous Encryption on AWS (The DevSecOps on AWS Series) LiveLessons (Video Training) PDF Author: PaulM. Duvall
Publisher:
ISBN:
Category :
Languages : en
Pages :

Get Book Here

Book Description
5+ Hours of Video Instruction Overview In this course, you learn how to use AWS services that provide the capability to define encryption and compliance as code. These services include AWS Key Management Service, AWS CloudFormation, AWS CodePipeline, AWS CodeCommit, AWS CodeBuild, AWS Config and Config Rules, Amazon CloudWatch Event Rules, and AWS Lambda. You learn how to use a combination of these services and tools to encrypt, prevent, detect, and remediate noncompliant resources within your software systems. Throughout the course, you will see working examples of how to automate the encryption of these services and how they can be included as part of a deployment pipeline using AWS CloudFormation and AWS CodePipeline. Skill Level Intermediate to Advanced Learn How To * Use AWS CloudFormation to provision AWS resources as code.* Use AWS CodePipeline to model continuous delivery workflows.* Create, disable, and delete symmetric keys using the AWS Key Management Service (KMS).* Automate the management of KMS keys using AWS CloudFormation.* Perform client-side encryption using the AWS Encryption SDK.* Create and automatically rotate encrypted username and password secrets for Amazon RDS using the AWS Secrets Manager and AWS Lambda.* Automate the provisioning of a deployment pipeline that deploys SSL/TLS AWS Certificate Manager (ACM) digital certificates using AWS CloudFormation and AWS CodePipeline.* Automate the provisioning of encryption when creating EBS, DynamoDB, RDS, and S3 resources using AWS CloudFormation.* Automate the provisioning of a deployment pipeline that deploys AWS Config Rules to detect unencrypted AWS resources using AWS CloudFormation and AWS CodePipeline.* Automatically provision a CloudTrail trail in CloudFormation and search the JSON files generated by CloudTrail using Amazon Athena.* Automate the provisioning of a deployment pipeline that deploys a solution capable of preventing, detecting, and remediating unencrypted resources using AWS CloudFormation and AWS CodePipeline. Who Should Take This Course * Software developers and security and compliance professionals who want to integrate encryption into every facet of the software development and delivery process.* Professionals with a working knowledge of AWS and programming knowledge who want to make encryption ubiquitous across their systems. Course Requirements * Working knowledge of AWS (that is, at least one to two years working with AWS) is required.* Practical e...

Continuous Compliance on AWS (The DevSecOps on AWS Series)

Continuous Compliance on AWS (The DevSecOps on AWS Series) PDF Author: Paul Duvall
Publisher:
ISBN:
Category :
Languages : en
Pages :

Get Book Here

Book Description
6+ Hours of Video Instruction Automatically adhere to best practices by learning to run compliance as code in a Continuous Delivery process using AWS Config Rules, Amazon CloudWatch Event Rules, AWS CloudFormation, AWS CodePipeline, and AWS Lambda. Overview In this course, you will learn to use AWS services to define compliance as code, including AWS Config Rules, Amazon CloudWatch Event Rules, AWS CloudFormation, AWS CodePipeline, and AWS Lambda. You also learn how to use a combination of these tools to prevent, detect, and remediate noncompliant resources in your software systems. Paul Duvall has six AWS certifications, including AWS Certified DevOps Engineer Professional and AWS Certified Security 'Äì Specialty. He has architected, implemented, and managed software and systems solutions for more than 20 years. Throughout the course, you will have the opportunity to work along with Paul as he demonstrates how to automate the provisioning of these services and how to include them as part of a deployment pipeline using AWS CloudFormation and AWS CodePipeline. About the Instructor Paul Duvall is a founder of Stelligent and Chief AWS Evangelist at Mphasis'Äìan AWS Premier Consulting Partner with the DevOps, Security, and Financial Services Competencies that has been implementing Continuous Delivery solutions on AWS since 2009. Paul has been an AWS Community Hero since 2016. He has six AWS certifications, including AWS Certified DevOps Engineer Professional and AWS Certified Security 'Äî Specialty. He has architected, implemented, and managed software and systems solutions for more than 20 years. He is the principal author of Continuous Integration: Improving Software Quality and Reducing Risk (Addison-Wesley, 2007), a 2008 Jolt Award Winner, and author of many other publications, including DevOps Essentials on AWS LiveLessons (Addison-Wesley, 2017). He writes for several publications including Forbes , Stelligent , and Mphasis , and hosts the "DevOps on AWS Radio" podcast. Skill Level Intermediate to Advanced Learn How To Apply key compliance concepts on AWS. Use AWS services and tools to automate compliance, including AWS CloudFormation, AWS Config Rules, AWS CodePipeline, Amazon CloudWatch Event Rules, and AWS Lambda. Integrate Continuous Compliance workflows for prevention, detection, and remediation into your software delivery process. Who Should Take This Course Software developers and security and compliance professionals who...

DevOps in AWS LiveLessons (Video Training)

DevOps in AWS LiveLessons (Video Training) PDF Author: Paul Duvall
Publisher:
ISBN:
Category :
Languages : en
Pages :

Get Book Here

Book Description
Overview Jolt-award winning Continuous Integration author and consultant Paul M. Duvall trains infrastructure developers on how to create a fully-automated continuous delivery system in Amazon Web Services (AWS) using DevOps best practices and tools. Description Amazon Web Services (AWS) is the leading cloud computing provider. AWS began selling its cloud services to startups but has rapidly evolved into serving large enterprises. While large companies can migrate their infrastructure to AWS over a period of months or years, the real value comes from properly leveraging key features of AWS, such as programmable infrastructure, elasticity and ephemeral resources. When companies bring a DevOps mindset to AWS, they can achieve the benefits of having always-releasable software, continuous feedback and reduction of the overall lead time. DevOps in AWS focuses on how to implement the key architectural construct in continuous delivery: the deployment pipeline. Viewers receive step-by-step instructions on how to do this in AWS based on an open-source software system that is in production. They also learn the DevOps practices teams can embrace to increase their effectiveness. About the Instructor Paul M. Duvall is the Chairman and CTO of Stelligent. Stelligent is an expert in Cloud Delivery solutions in Amazon Web Services (AWS) and has been working with AWS for over five years. Paul is the principal author of Continuous Integration: Improving Software Quality and Reducing Risk (Addison-Wesley, 2007) and a 2008 Jolt Award Winner. Paul is an author of many other books, videos and publications including DevOps in the Cloud (Addison-Wesley, 2012) and two IBM developerWorks series on topics concerned with automation, DevOps, and cloud computing. He is passionate about software delivery and the cloud and actively blogs at http://www.stelligent.com/. You can follow him on Twitter @paulduvall. Skill Level Intermediate What You Will Learn How to set up and establish a process for applying continuous delivery in AWS How to create a fully-automated deployment pipeline using the Jenkins Continuous Integration server, CloudFormation, OpsWorks and Chef How to use AWS deployment and management tools to automate infrastructure How to write and run infrastructure/deployment tests Who Should Take This Course Infrastructure and application developers, Sys Ops engineers Anyone else involved in the software systems lifecycle. This will includes testers, DBAs, managers ...

Mastering AWS Security

Mastering AWS Security PDF Author: Albert Anthony
Publisher: Packt Publishing Ltd
ISBN: 1788290798
Category : Computers
Languages : en
Pages : 247

Get Book Here

Book Description
In depth informative guide to implement and use AWS security services effectively. About This Book Learn to secure your network, infrastructure, data and applications in AWS cloud Log, monitor and audit your AWS resources for continuous security and continuous compliance in AWS cloud Use AWS managed security services to automate security. Focus on increasing your business rather than being diverged onto security risks and issues with AWS security. Delve deep into various aspects such as the security model, compliance, access management and much more to build and maintain a secure environment. Who This Book Is For This book is for all IT professionals, system administrators and security analysts, solution architects and Chief Information Security Officers who are responsible for securing workloads in AWS for their organizations. It is helpful for all Solutions Architects who want to design and implement secure architecture on AWS by the following security by design principle. This book is helpful for personnel in Auditors and Project Management role to understand how they can audit AWS workloads and how they can manage security in AWS respectively. If you are learning AWS or championing AWS adoption in your organization, you should read this book to build security in all your workloads. You will benefit from knowing about security footprint of all major AWS services for multiple domains, use cases, and scenarios. What You Will Learn Learn about AWS Identity Management and Access control Gain knowledge to create and secure your private network in AWS Understand and secure your infrastructure in AWS Understand monitoring, logging and auditing in AWS Ensure Data Security in AWS Learn to secure your applications in AWS Explore AWS Security best practices In Detail Mastering AWS Security starts with a deep dive into the fundamentals of the shared security responsibility model. This book tells you how you can enable continuous security, continuous auditing, and continuous compliance by automating your security in AWS with the tools, services, and features it provides. Moving on, you will learn about access control in AWS for all resources. You will also learn about the security of your network, servers, data and applications in the AWS cloud using native AWS security services. By the end of this book, you will understand the complete AWS Security landscape, covering all aspects of end - to -end software and hardware security along with logging, auditing, and compliance of your entire IT environment in the AWS cloud. Lastly, the book will wrap up with AWS best practices for security. Style and approach The book will take a practical approach delving into different aspects of AWS security to help you become a master of it. It will focus on using native AWS security features and managed AWS services to help you achieve continuous security and continuous compliance.

Mastering AWS Security

Mastering AWS Security PDF Author: Albert Anthony
Publisher:
ISBN: 9781788293723
Category : Computers
Languages : en
Pages : 252

Get Book Here

Book Description
In depth informative guide to implement and use AWS security services effectively.About This Book* Learn to secure your network, infrastructure, data and applications in AWS cloud* Log, monitor and audit your AWS resources for continuous security and continuous compliance in AWS cloud* Use AWS managed security services to automate security. Focus on increasing your business rather than being diverged onto security risks and issues with AWS security.* Delve deep into various aspects such as the security model, compliance, access management and much more to build and maintain a secure environment.Who This Book Is ForThis book is for all IT professionals, system administrators and security analysts, solution architects and Chief Information Security Officers who are responsible for securing workloads in AWS for their organizations. It is helpful for all Solutions Architects who want to design and implement secure architecture on AWS by the following security by design principle. This book is helpful for personnel in Auditors and Project Management role to understand how they can audit AWS workloads and how they can manage security in AWS respectively.If you are learning AWS or championing AWS adoption in your organization, you should read this book to build security in all your workloads. You will benefit from knowing about security footprint of all major AWS services for multiple domains, use cases, and scenarios.What You Will Learn* Learn about AWS Identity Management and Access control* Gain knowledge to create and secure your private network in AWS* Understand and secure your infrastructure in AWS* Understand monitoring, logging and auditing in AWS* Ensure Data Security in AWS* Learn to secure your applications in AWS* Explore AWS Security best practicesIn DetailMastering AWS Security starts with a deep dive into the fundamentals of the shared security responsibility model. This book tells you how you can enable continuous security, continuous auditing, and continuous compliance by automating your security in AWS with the tools, services, and features it provides.Moving on, you will learn about access control in AWS for all resources. You will also learn about the security of your network, servers, data and applications in the AWS cloud using native AWS security services.By the end of this book, you will understand the complete AWS Security landscape, covering all aspects of end - to -end software and hardware security along with logging, auditing, and compliance of your entire IT environment in the AWS cloud.Lastly, the book will wrap up with AWS best practices for security.Style and approachThe book will take a practical approach delving into different aspects of AWS security to help you become a master of it. It will focus on using native AWS security features and managed AWS services to help you achieve continuous security and continuous compliance.

Amazon Web Services (AWS)

Amazon Web Services (AWS) PDF Author: Richard Jones
Publisher:
ISBN:
Category :
Languages : en
Pages :

Get Book Here

Book Description