Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
AWS Certified Advanced Networking - Specialty Exam Guide

You're reading from   AWS Certified Advanced Networking - Specialty Exam Guide Build your knowledge and technical expertise as an AWS-certified networking specialist

Arrow left icon
Product type Paperback
Published in May 2019
Publisher Packt
ISBN-13 9781789952315
Length 308 pages
Edition 1st Edition
Tools
Arrow right icon
Author (1):
Arrow left icon
Marko Sluga Marko Sluga
Author Profile Icon Marko Sluga
Marko Sluga
Arrow right icon
View More author details
Toc

Table of Contents (21) Chapters Close

Preface 1. Section 1: Introduction
2. Overview of AWS Certified Advanced Networking - Specialty Certification FREE CHAPTER 3. Section 2: Managing Networks in AWS
4. Networking with the Virtual Private Cloud 5. VPC Network Security 6. Connecting On-Premises and AWS 7. Section 3: Managing and Securing Network-Attached Platform Services in AWS
8. Managing and Securing Servers with ELB 9. Managing and Securing Content Distribution with CloudFront 10. Managing and Securing the Route 53 Domain Name System 11. Managing and Securing API Gateway 12. Section 4: Monitoring and Operating the AWS Networks
13. Monitoring and Troubleshooting Networks in AWS 14. Section 5: Network automation in AWS
15. Network Automation with CloudFormation 16. Section 6: The Exam
17. Exam Tips and Tricks 18. Mock Tests 19. Assessments 20. Other Books You May Enjoy

An overview of network security

When dealing with network security, we should always strive to implement as many security mechanisms as our application design and budget will support. Think of network security as an onion – the more layers the onion has, the more work there will be to get to the middle of it. The same idea applies to providing network security.

The more security devices we implement, the harder it will be for malicious traffic to reach our application. We should be thinking about network security at all the layers of our application. We need to be careful, especially when it comes to identifying our entry points and protecting each of them with the appropriate security measures.

The following diagram breaks down the attack vectors according to Verisign. The diagram represents the security breaches that were successful in 2018 and network security only accounts...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime