In this section, you will learn how to design and implement a level of security that surrounds your EC2 instances via different techniques. You'll do this by applying vulnerability scans, using key pairs, and isolating your instance for forensic analysis. You'll also learn how to use AWS Systems Manager to administer your EC2 instances.
You will then master how to secure a multi-subnet virtual private cloud through a variety of infrastructure security controls, including route tables, network access control lists, NAT gateways, security groups, and more!Â
Using a variety of different AWS services specifically designed to secure your applications, we'll look at how to both implement and manage the security configuration of many of them to ensure your applications remain protected.
Unfortunately, there will always be malicious...