"IT security is a set of cybersecurity strategies that prevents unauthorized access to organizational assets such as computers, networks, and data. It maintains the integrity and confidentiality of sensitive information, blocking the access of sophisticated hackers." - source
You have made an application for your college event registrations that handles fee collection. Since you will need to collect sensitive personal information such as credit card information, encryption must be used to protect this data. You need to have access control policies in place to limit data exposure and implement multifactor authentication for reliable authorized logins. To ensure that these security protocols are properly implemented you need to be well-versed in Security, Privacy and Safety protocols.
You can learn more about Security services by visiting AWS Cloud Security
Title | Description | Format |
---|---|---|
AWS Security Fundamentals - Skillbuilder | In this self-paced course, you will learn fundamental AWS cloud security concepts, including AWS access control, data encryption methods, and how network access to your AWS infrastructure can be secured. | Course |
Title | Description | Format |
---|---|---|
Cybersecurity Specialist[1] | Learn about AWS Shared Security Responsibility Model, Network Security, Access Control and Management, Encryption, Security Logging and Monitoring in this course. | Videos |
Online Privacy[1] | In this course you will make yourself aware on how you can secure your online privacy by changing everyday habits when interacting with social platforms. | Videos |
[1] requires logging into AWS Educate before clicking on the resource link.
Title | Description | Format |
---|---|---|
Ransomware on S3 - Security Event Simulation and Detection | In this workshop, you will be simulating a scenario by creating a few IAM users and then infiltrating the security using a few scripts | Workshop |
Unauthorized IAM Credential Use - Security Event Simulation and Detection | During this workshop, you will simulate the unauthorized use of IAM credentials using a script invoked within AWS CloudShell. | Workshop |
Implementing a True Passwordless Authentication with Amazon Cognito and Transmit Security | Use Amazon Cognito for your application authentication and leverage Transmit Security to provide end users with a passwordless authentication experience. | Workshop |