Tutorialspoint

April Learning Carnival is here, Use code FEST10 for an extra 10% off

Securing Amazon EC2 Instances

person icon David Clinton

4.3

Securing Amazon EC2 Instances

Using security groups, VPCs, IAM roles, and basic server security best practices to protect your AWS resources

updated on icon Updated on Apr, 2024

language icon Language - English

person icon David Clinton

category icon IT & Software,Network & Security,Amazon AWS,AWS Certification

Lectures -16

Resources -2

Quizzes -3

Duration -58 mins

4.3

price-loader

30-days Money-Back Guarantee

Training 5 or more people ?

Get your team access to 10000+ top Tutorials Point courses anytime, anywhere.

Course Description

Amazon's Elastic Cloud Compute (EC2) service is borderline magic. After all, being able to provision and launch a fully-functioning, enterprise-quality cloud server in just a minute or two with no up-front costs is something we could barely have imagined even a decade ago. But all that cloud goodness doesn't change an admin's primary responsibility: to protect infrastructure from attack. The easier EC2 makes it to push out more and more applications, the more we're exposed to a lot of hostile - and scary - threats.

If you're responsible for EC2 instance workloads - or even if you're just considering the possibility - you need to understand what defensive skills and tools are available and how you can use them.

This course will review the current threat landscape and some general server security best practices. I'll introduce you to the significant security measures AWS themselves have taken on our behalf, and how to make the best use of their security groups, IAM roles, and VPC design architectures. We'll also learn about how AWS offers networking tools like VPNs and instance connectivity to help us push back against the bad guys.

I've also included everything you might need to follow along with the practical demos on your own laptop or work station. Successfully completing all the videos, reading content, test-yourself quizzes, and demos yourself will leave you with a strong sense of what you can and should be doing to protect your application instances.

Who this course is for:

  • Project managers planning application deployments
  • AWS solution architects looking to make sure they're not missing anything important
  • Application developers and admins responsible for infrastructure health
  • Individuals looking to safely introduce themselves to core AWS tools

Goals

What will you learn in this course:

  • Address the threat categories facing EC2 instances and the possible consequences of an attack

  • Apply the range of security tools AWS provides to help us protect our instances

  • Configure instance security groups, IAM roles, and VPC design to provide optimal protection

  • Integrate general server security best-practices and the AWS Shared Responsibility Model with your infrastructure design

Prerequisites

What are the prerequisites for this course?

  • Besides basic familiarity with using EC2 instances, no prerequisite knowledge is needed for this course.

  • Comfort with the AWS CLI will be helpful and familiarity with Linux is a bonus.

Securing Amazon EC2 Instances

Curriculum

Check out the detailed breakdown of what’s inside the course

Introduction to EC2 Security
2 Lectures
  • play icon Understanding the Security Problem 04:48 04:48
  • play icon Exploring the Threat Landscape 05:32 05:32
The Basics
3 Lectures
Tutorialspoint
Controlling External (Application) Access
5 Lectures
Tutorialspoint
Controlling Internal (Administration) Connectivity
4 Lectures
Tutorialspoint
Course Resources (code, links, etc.)
2 Lectures
Tutorialspoint

Instructor Details

David Clinton

David Clinton

Linux System Administrator, AWS Solutions Architect, and Technology Content Provider: technology books and courseware

David Clinton is an AWS Solutions Architect and a Linux server administrator. He has written about and published training material (including books with Wiley/Sybex, Bootstrap IT, and Manning, and online courses on Pluralsight and Udemy) for many cutting edge technology subjects including Linux systems, Cloud Computing (in particular Amazon's AWS), container technologies like containers, data analytics, and DevOps tools. 

Course Certificate

Use your certificate to make a career change or to advance in your current career.

sample Tutorialspoint certificate

Our students work
with the Best

Related Video Courses

View More

Annual Membership

Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video Courses

Subscribe now
Annual Membership

Online Certifications

Master prominent technologies at full length and become a valued certified professional.

Explore Now
Online Certifications

Talk to us

1800-202-0515