array(5) {
  string(6) "0.0000"
  string(6) "0.0269"
  string(6) "0.0042"
  string(6) "0.0000"
  string(6) "0.0311"
Mastering AWS Security | Albert Anthony | Packt Publishing | 9781788290791 | E-Sentral Ebook Portal

Mastering AWS Security by Albert Anthony

Mastering AWS Security by Albert Anthony from  in  category
Privacy Policy
Read using
(price excluding 0% GST)
Author: Albert Anthony
Category: Engineering & IT
ISBN: 9781788290791
File Size: 6.31 MB
Format: EPUB (e-book)
DRM: Applied (Requires eSentral Reader App)
(price excluding 0% GST)


Key FeaturesLearn to secure your network, infrastructure, data and applications in AWS cloudLog, monitor and audit your AWS resources for continuous security and continuous compliance in AWS cloudUse AWS managed security services to automate security. Focus on increasing your business rather than being diverged onto security risks and issues with AWS security.Delve deep into various aspects such as the security model, compliance, access management and much more to build and maintain a secure environment.Book DescriptionMastering AWS Security starts with a deep dive into the fundamentals of the shared security responsibility model. This book tells you how you can enable continuous security, continuous auditing, and continuous compliance by automating your security in AWS with the tools, services, and features it provides.Moving on, you will learn about access control in AWS for all resources. You will also learn about the security of your network, servers, data and applications in the AWS cloud using native AWS security services.By the end of this book, you will understand the complete AWS Security landscape, covering all aspects of end - to -end software and hardware security along with logging, auditing, and compliance of your entire IT environment in the AWS cloud.Lastly, the book will wrap up with AWS best practices for security.What you will learnLearn about AWS Identity Management and Access controlGain knowledge to create and secure your private network in AWSUnderstand and secure your infrastructure in AWSUnderstand monitoring, logging and auditing in AWSEnsure Data Security in AWSLearn to secure your applications in AWSExplore AWS Security best practicesAbout the AuthorAlbert Anthony is a seasoned IT professional with 18 years of experience working with various technologies and in multiple teams spread all across the globe. He believes that the primary purpose of information technology is to solve problems faced by businesses and organizations. He is an AWS certified solutions architect and a corporate trainer. He holds all three AWS associate-level certifications along with PMI-PMP and Certified Scrum Master certifications. He has been training since 2008 on project management, cost management, and people management, and on AWS since 2016.He has managed multiple projects on AWS that runs big data applications, hybrid mobile application development, DevOps, and infrastructure monitoring on AWS. He has successfully migrated multiple workloads to AWS from on-premise data centers and other hosting providers. He is responsible for securing workloads for all his customers, with hundreds of servers; processing TBs of data; and running multiple web, mobile, and batch applications. As well as this, he and his team has saved their customers millions of dollars by optimizing usage of their AWS resources and following AWS best practices.Albert has worked with organizations of all shapes and sizes in India, the USA, and the Middle East. He has worked with government organizations, non-profit organizations, banks and financial institutions, and others to deliver transformational projects. He has worked as a programmer, system analyst, project manager, and senior engineering manager throughout his career. He is the founder of a cloud training and consulting startup, LovesCloud, in New Delhi, India.Table of ContentsOverview of Security in AWSAWS Identity and Access ManagementAWS Virtual Private CloudData Security in AWSSecuring Servers in AWSSecuring Applications in AWSMonitoring in AWSLogging and Auditing in AWSAWS Security Best Practices


Write your review