Udacity Logo
Log InJoin for Free

Design for Security

Course

In this course, you will explore best practices and strategies around securing access to cloud services and infrastructure. You will also use tools and methods available with AWS to ensure that data stored in the cloud is protected. Finally, you will investigate security practices around monitoring and defending cloud-based applications and environments.

In this course, you will explore best practices and strategies around securing access to cloud services and infrastructure. You will also use tools and methods available with AWS to ensure that data stored in the cloud is protected. Finally, you will investigate security practices around monitoring and defending cloud-based applications and environments.

Advanced

1 week

Real-world Projects

Completion Certificate

Last Updated February 22, 2024

Skills you'll learn:
Cloud security in AWS • AWS key management service • Data encryption in AWS • AWS IAM
Prerequisites:
Application architecture • AWS development • Object-oriented programming basics

Course Lessons

Lesson 1

Introduction to Designing for Security

The who, what, when, and why of Designing for Security in the cloud.

Lesson 2

Securing Access to Cloud Services

After this lesson, you will be able to secure access for both AWS users and applications, apply security best practices such as identity federation, and fine tune least privilege access permissions.

Lesson 3

Securing Access to Cloud Infrastructure

After this lesson, you will be able to access cloud resources securely, protect against data exfiltration, ensure compliance, and configure VPC endpoints to keep traffic within your VPC.

Lesson 4

Protecting Data Stored in the Cloud

Our goal is to minimize the risk of a malicious actor accessing our networks and servers, invoke the AWS API, and, ultimately, perform destructive or unauthorized actions in our environments.

Lesson 5

Defensive Security in the Cloud

You will identify vulnerable misconfigurations, guard against malicious activity, and design a deployment pipeline that ensures that security practices are implemented early on.

Lesson 6 • Project

Project: Secure the Recipe Vault Web Application

In this project, you'll put everything you learned in the course to secure a web application.

Taught By The Best

Photo of Mehdi Razvi

Mehdi Razvi

Senior Cloud Architect at NuEra Automotive Solutions

Mehdi is a senior cloud architect and consultant based out of the Chicago area. He loves helping companies large and small build, deploy, and run their applications in the cloud. Most recently, he has worked with companies such as 2ndWatch and GuidePoint Security.

The Udacity Difference

Combine technology training for employees with industry experts, mentors, and projects, for critical thinking that pushes innovation. Our proven upskilling system goes after success—relentlessly.

Demonstrate proficiency with practical projects

Projects are based on real-world scenarios and challenges, allowing you to apply the skills you learn to practical situations, while giving you real hands-on experience.

  • Gain proven experience

  • Retain knowledge longer

  • Apply new skills immediately

Top-tier services to ensure learner success

Reviewers provide timely and constructive feedback on your project submissions, highlighting areas of improvement and offering practical tips to enhance your work.

  • Get help from subject matter experts

  • Learn industry best practices

  • Gain valuable insights and improve your skills