Amazon Elastic Compute Cloud (EC2) is a cloud computing service provided by AWS. EC2 makes it possible to deploy applications at scale, launching instances of servers as and when they need. As you might expect, this creates the need to secure networks and server-instances across the service. This course is a deep dive into the nitty-gritty of security for EC2, exploring both the offensive and defensive approaches, and practical applications of network security in AWS.
We begin with a comprehensive look at network security features in AWS, and Amazon Virtual Private Cloud (VPC). The course then shifts focus to EC2 security, where we explore STS metadata, AWS Systems Manager, and AWS Inspector. Moving into offensive security, we’ll use a host of hands-on labs to gain practical experience in attacking EC2 deployments using Server-Side Request Forgery, compromising S3, and more. As a counterpoint, the next lesson looks at defensive security, where you’ll learn how to fortify apps in EC2 against external threats. Our last two lessons also focus heavily on learning practical techniques configuring AWS Inspector and applying the various network security measures we’ve previously learned about.
This course is completely focused on providing you with a robust, hands-on look at network security for cloud-native apps in EC2 and various AWS services. All our material is designed to deliver real-world problem-solving experience. When you finish this course, you’ll be able to directly apply what you’ve learned to secure cloud-native apps and networks that rely on AWS.