только у нас скачать шаблон dle скачивать рекомендуем

Фото видео монтаж » Видео уроки » Comprehensive Guide To Aws Waf - Protecting Web Applications

Comprehensive Guide To Aws Waf - Protecting Web Applications


Comprehensive Guide To Aws Waf - Protecting Web Applications
Comprehensive Guide To Aws Waf - Protecting Web Applications
Published 8/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 213.83 MB | Duration: 2h 16m


AWS WAF

What you'll learn

Advanced AWS WAF Configuration

Combining AWS WAF with Other AWS Services

AWS WAF Best Practices

AWS WAF in Real-World Scenarios

AWS WAF Security Automation

AWS WAF Performance and Cost Optimization

Requirements

Basic knowledge of AWS services and cloud computing concepts.

Familiarity with web application architecture and security fundamentals.

Description

The "Comprehensive Guide to AWS WAF" is course designed to provide participants with a thorough understanding of AWS Web Application Firewall (WAF) and its role in safeguarding web applications from cyber threats. With a focus on hands-on learning and real-world examples, this course covers the essential concepts, best practices, and advanced configurations related to AWS WAF.Throughout the course, participants will be introduced to the basics of AWS WAF, including its key features and benefits, while gaining insights into common web application security threats and attack vectors. They will learn to create and customize WAF Web ACLs, rules, conditions, and filters, and explore the intricacies of rule actions and priority settings.The course delves into advanced WAF configurations, such as rate-based and IP-based rules, geolocation filtering, and protection against Cross-site Scripting (XSS) and SQL injection attacks. Moreover, participants will discover how to integrate AWS WAF with other AWS services, such as Amazon CloudFront, Application Load Balancer (ALB), and AWS Firewall Manager.With a strong emphasis on security automation, the course equips participants with the skills to automate WAF management using AWS API, CLI, and AWS CloudFormation. They will also learn to monitor WAF logs and metrics effectively and optimize WAF performance and costs.By the end of the course, participants will possess the knowledge and proficiency needed to implement robust security measures using AWS WAF. Whether protecting static websites or dynamic web applications, mitigating DDoS attacks, or ensuring cost-efficient and scalable WAF architecture, attendees will be equipped to secure their web applications against a wide array of cyber threats in real-world scenarios. Prerequisites include a basic understanding of AWS services and web application security fundamentals

Overview

Section 1: Introduction

Lecture 1 Introduction

Section 2: Introduction to AWS WAF

Lecture 2 What is WAF - Web Application Firewall?

Lecture 3 WAF VS IPS

Lecture 4 Understanding the basics of AWS WAF

Lecture 5 Key features and benefits of AWS WAF

Lecture 6 Web application security threats and attack vectors

Lecture 7 Web ACLs (Access Control Lists) and Rule Groups

Section 3: Getting Started with AWS WAF

Lecture 8 Creating a AWS WAF Web ACL

Lecture 9 Understanding AWS WAF Conditions and Rules

Lecture 10 Defining AWS WAF Filters and Conditions

Lecture 11 Customizing rule actions and priority

Lecture 12 AWS WAF logging and metrics

Section 4: Advanced AWS WAF Configuration

Lecture 13 Rate-based and IP-based rules

Lecture 14 Managing whitelisting and blacklisting

Lecture 15 Deeper into managing whitelisting and blacklisting

Lecture 16 Geolocation filtering

Lecture 17 How do I allow or block requests from a specific country or geolocation?

Lecture 18 Implementing Cross-site Scripting (XSS) protection

Lecture 19 Mitigating SQL injection attacks

Lecture 20 Mitigating SQL injection attacks-LAB

Lecture 21 How To Setup A Virtual Penetration Testing Lab

Lecture 22 Testing for SQL injection attack

Section 5: Combining AWS WAF with Other AWS Services

Lecture 23 Introduction - Combining AWS WAF with Other AWS Services

Lecture 24 Integrating AWS WAF with Amazon CloudFront

Lecture 25 AWS WAF with Application Load Balancer (ALB) and API Gateway

Lecture 26 Using AWS WAF with AWS Firewall Manager

Lecture 27 Automated security with AWS WAF and AWS Lambda

Section 6: AWS WAF Best Practices

Lecture 28 Introduction - AWS WAF Best Practices

Lecture 29 Optimizing WAF rule performance

Lecture 30 Building a scalable and cost-effective WAF architecture

Lecture 31 Handling false positives and false negatives

Lecture 32 Continuous monitoring and rule updates

Lecture 33 Incident response and remediation strategies

Section 7: AWS WAF in Real-World Scenarios

Lecture 34 Protecting a static website with AWS WAF

Lecture 35 Securing a dynamic web application using WAF

Lecture 36 Preventing DDoS attacks with AWS WAF and Shield

Lecture 37 Combining WAF with AWS Security Groups and Network ACLs

Section 8: AWS WAF Security Automation

Lecture 38 Introduction

Lecture 39 Leveraging AWS WAF API and CLI for automation

Lecture 40 Building custom scripts for rule management

Lecture 41 Using AWS CloudFormation for WAF deployments

Lecture 42 CI/CD integration for WAF rule updates

Lecture 43 Security Automation for AWS WAF

Lecture 44 WAF Automation on AWS Architecture

Section 9: AWS WAF Performance and Cost Optimization

Lecture 45 Introduction

Lecture 46 Monitoring and analyzing WAF logs and metrics

Lecture 47 AWS WAF pricing models and cost optimization strategies

Lecture 48 Scaling WAF resources for high-traffic applications

Lecture 49 WAF resource allocation for cost efficiency

Section 10: LAB

Lecture 50 Using AWS WAF To Secure WordPress Login

Lecture 51 AWS WAF Workshop

Lecture 52 AWS WAF Workshop

Section 11: Bonus

Lecture 53 Bonus

Cloud architects and security professionals responsible for web application security on AWS.,DevOps engineers looking to implement automated security measures for their applications.,IT managers and administrators seeking to enhance their web application protection capabilities.








Poproshajka




Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.