Graphical representation of AWS network security in form of network gates

Learning path: Cloud Security

AWS EC2 and Network Security Basics

Amazon Elastic Compute Cloud (EC2) is a cloud computing service provided by AWS. EC2 makes it possible to deploy applications at scale, launching instances of servers as and when they need. As you might expect, this creates the need to secure networks and server-instances across the service. This course is a deep dive into security for EC2, exploring both the offensive and defensive approaches, and practical applications of network security in AWS.

This Amazon EC2 and Network Security course begins with a comprehensive look at network security features in AWS, and Amazon Virtual Private Cloud (VPC). The course then shifts focus to EC2 security, where we explore STS metadata, AWS Systems Manager, and AWS Inspector. Moving into offensive security, we’ll use a host of hands-on labs to gain practical experience in attacking EC2 deployments using Server-Side Request Forgery, compromising S3, and more. 

As a counterpoint, the next lesson looks at defensive security, where you’ll learn how to fortify apps in EC2 against external threats. Our last two lessons also focus heavily on learning practical techniques configuring AWS Inspector and applying the various network security measures we’ve previously learned about.

This course is completely focused on providing you with a robust, hands-on look at network security for cloud-native apps in EC2 and various AWS services. All our material is designed to deliver real-world problem-solving experience. When you finish this course, you’ll be able to directly apply what you’ve learned to secure cloud-native apps and networks that rely on AWS.

Proficiency: Beginner
Audience: Cloud Security
Course Duration: 4 hours
47 lessons
4 Cloud Labs

Course Outline

  • Course Introduction
  • Course Pre-requisites
  • Network Security Intro and Features
  • Regions and Availability Zones
  • Introduction to VPC
  • VPC Networking Capability
  • VPC Security Controls – Intro
  • VPC Flow logs – Intro
  • EC2 – Intro and Features
  • Your Security Responsibility – EC2
  • STS Metadata and Metadata token compromise
  • EC2 Security Practices Intro
  • IMDSv1 vs IMDSv2
  • AWS Systems Manager – Intro
  • AWS Inspector
  • Server-Side Request Forgery Explanation
  • WeasyPrint SSRF Explanation
  • Enabling IMDSv2
  • Lab: AWS Inspector
  • VPC Flow Logs – Case Study