Understanding AWS Cloud Service Infrastructure Construction, Hacking, and Security
IT services are rapidly transitioning to cloud environments. You will learn security practices from basic virtual infrastructure construction to security threat monitoring and vulnerability diagnosis for each area to secure the Amazon AWS cloud environment.
Complete the essential fundamentals for security practice! 👨🔧
Cloud Security?
As IT services transition to a cloud environment, The importance of cloud environment security It's getting bigger and bigger.
Most of the IT services we use now are being converted to a cloud environment. They are leading the way with Amazon AWS cloud services, followed by Microsoft Azure, Google GCP, and in Korea, Naver Cloud.
The importance of security management, monitoring, vulnerability diagnosis, and secure coding in cloud environments is increasing. Web hacking and mobile hacking are continuously occurring against platforms and applications running on the cloud, and important information is frequently exposed due to insufficient security settings.
The security control work and breach incident analysis work in the existing on-premise network environment are also changing a lot in their work forms. Now, when preparing for employment in IT security or moving to a position as a security manager in the financial sector/large corporation, you may face great difficulties if you do not know about cloud service security.
For cloud security You need to know the basic virtual infrastructure environment.
Amazon Web Services
However, in order to secure the cloud, you need to understand the basic virtual infrastructure environment that you need to know for securing the Amazon AWS cloud environment. In addition, you need to understand security by adding how to monitor security threats and diagnose vulnerabilities in each area.
Learning Contents
This lecture will cover important topics from infrastructure construction to security of the cloud service environment as follows. In addition, we will cover supplementary utilization methods for secure operation of cloud services.
Basic concepts of Amazon AWS services
Basic concepts of AWS IAM and how to set up and manage security
Practice configuring a virtual network (VPC, Subnet) in Amazon AWS services
Understanding and practicing network firewalls (NACLs) and instance security groups (Security Groups)
Practice collecting security logs for each area using VPC Log, AWS Trail, AWS CloudWatch, etc.
Practice attack cases due to insufficient S3 storage and database security settings
AWS Web Firewall Hands-on for Web Application Security
Understanding and practicing mock hacking methodology used for web service vulnerability diagnosis and system diagnosis
Understanding Network Security Architecture for Cloud Service Security
Please make sure to check before learning!
In this course, you will use various services such as Amazon AWS service resources, networks, storage, and integrated logs. You may be able to practice within the free tier fee, but depending on the situation, you may be charged additional fees if you exceed the fee. After completing the practice for each chapter (table of contents), please be sure to delete the resources you created .
Features of this course
This is a step-by-step, hands-on explanation based on the latest AWS cloud management console.
We will explain the security elements and create a network configuration diagram that can be used immediately in practice.
Instructor Introduction (CEO Cho Jeong-won)
- Security Project Manager and Representative - CEO of OneForAll Co., Ltd. - (Former) KB Securities IT Planning Information Protection Part - (Former) A3 Security Mock Hacking Team - Security consulting and training for over 200 large and small businesses - Multi-campus IT security external expert instructor - Visiting Professor, Department of Industrial Security, Chung-Ang University - Visiting Professor, Seoul Digital University - Android Mobile App Simulated Hacking (Acorn Publishing, 2017) - Perfect Practice of Web Mock Hacking Using Vibox (Hanbit Media, 2016) - IT Engineer Two Jobs, Book Review (Bifan Books, 2015) - Utilizing Buffsuite and Web Simulated Hacking (Hanbit Media, 2015) - Analysis of WordPress plugin vulnerabilities and simulated hacking (Hanbit Media, 2015) - How to live as an IT engineer 1 (Bifanbooks, 2015) - Android Mobile Malware and Simulated Hacking Diagnosis (Acorn Publishing, 2014) - What is Simulated Hacking (Wikibooks, 2014) - Simulated Hacking Using Kali Linux (Acorn Publishing, 2014) - The World of Digital Forensics (Infobooks, 2014) - Hacker, the Cracker Catcher (Seongandang, 2010)
Published over 30 books
Recommended for these people
Who is this course right for?
Anyone who wants to understand cloud service security
Anyone who wants to understand building a cloud service infrastructure
Anyone who wants to learn about simulated hacking in a cloud service environment
Need to know before starting?
IT Security Terms
Understanding Cloud Services Basics
Hello This is
101,887
Learners
3,175
Reviews
445
Answers
4.7
Rating
67
Courses
보안프로젝트 ( www.boanproject.com )는 IT보안, 빅데이터, 머신러닝, IoT 등 다양한 분야의 온라인 강의, 그룹 강의를 진행하고 있습니다.
In this lecture, you said that you would focus on diagnosing vulnerabilities in web, mobile, and API services. Is there a separate lecture that focuses on management-related infrastructure diagnosis and source code diagnosis? If so, I would like to apply for the course.