Udacity Logo
Log InSign Up

Design for Security

Course

In this course, you will explore best practices and strategies around securing access to cloud services and infrastructure. You will also use tools and methods available with AWS to ensure that data stored in the cloud is protected. Finally, you will investigate security practices around monitoring and defending cloud-based applications and environments.

In this course, you will explore best practices and strategies around securing access to cloud services and infrastructure. You will also use tools and methods available with AWS to ensure that data stored in the cloud is protected. Finally, you will investigate security practices around monitoring and defending cloud-based applications and environments.

Skills

Cloud security in AWS

AWS key management service

Data encryption in AWS

AWS IAM

Advanced

1 week

Real-world Projects

Completion Certificate

Last Updated May 5, 2023

Prerequisites:

Application architecture

AWS development

Course Lessons

Lesson 1

Introduction to Designing for Security

The who, what, when, and why of Designing for Security in the cloud.

Lesson 2

Securing Access to Cloud Services

After this lesson, you will be able to secure access for both AWS users and applications, apply security best practices such as identity federation, and fine tune least privilege access permissions.

Lesson 3

Securing Access to Cloud Infrastructure

After this lesson, you will be able to access cloud resources securely, protect against data exfiltration, ensure compliance, and configure VPC endpoints to keep traffic within your VPC.

Lesson 4

Protecting Data Stored in the Cloud

Our goal is to minimize the risk of a malicious actor accessing our networks and servers, invoke the AWS API, and, ultimately, perform destructive or unauthorized actions in our environments.

Lesson 5

Defensive Security in the Cloud

You will identify vulnerable misconfigurations, guard against malicious activity, and design a deployment pipeline that ensures that security practices are implemented early on.

Lesson 6 • Project

Project: Secure the Recipe Vault Web Application

In this project, you'll put everything you learned in the course to secure a web application.

Taught By The Best

Photo of Mehdi Razvi

Mehdi Razvi

Senior Cloud Architect at NuEra Automotive Solutions

Mehdi is a senior cloud architect and consultant based out of the Chicago area. He loves helping companies large and small build, deploy, and run their applications in the cloud. Most recently, he has worked with companies such as 2ndWatch and GuidePoint Security.

Taught By The Best

Photo of Mehdi Razvi

Mehdi Razvi

Senior Cloud Architect at NuEra Automotive Solutions

Mehdi is a senior cloud architect and consultant based out of the Chicago area. He loves helping companies large and small build, deploy, and run their applications in the cloud. Most recently, he has worked with companies such as 2ndWatch and GuidePoint Security.

Get Started Today

Design for Security