Web application cyber security practical guidance. AWS DevSecOps WAF masterclass. AWS DevOps security tips and tricks.
This course includes:
- 3 hours on-demand video
- 3 articles
- 3 downloadable resources
- Access on mobile and TV
- Full lifetime access
- Certificate of completion
What you'll learn
- How to secure Web application at AWS
- How Web Application firewall works
- How to configure AWS WAF poperly
- How to configure WAF alarms
- How to use Athena to analyse WAF and Application logs
- How custom exceptions and custom logging can become a security defense tool
- How to use CloudWatch for working with Application Logs
- How to build custom CloudWatch filters and alerts upon it
- How to provide cyber threat analysis using Athena and Excel after a hacker's attack
Description
Current course is about how to secure cybersecurity applications against hacker's attacks with cloud security solutions using application security, centralized log system, and network firewall protection. You will also learn a lot about how to provide effective cyber threat analysis during hacker's attack and after it.
COURSE STRUCTURE:
The course starts from creating a very small API application. For that purpose, I will use the Python programming language and Flask framework. If you are not aware of current technologies, don't worry, you should not. Believe me, the application would be extremely simple, so anyone, even a child, can understand how it works.
While creating according application I will concentrate at next essential aspects:
Custom exceptions
Logging
I will explain why it is so essential to have those both things at any application and how to make it properly in order it would be helpful from a security defense perspective.
The principles which I will show you are extremely simple and can be easily propagated at any existing web application. You will see the real power of properly done exceptions and logging at your own eyes when we will make real hacker’s attacks simulations at our application after deploying it at AWS cloud
Generally speaking, deploying - it is 2nd essential part of our learning. Together we will deploy our test API application at AWS using Terraform. And again, if you have never used current technology, don’t worry. I will show you step by step, how to run according terraform scripts.
At 1st we will prepare the AWS network, after that we will deploy AWS ALB with WAF, and finally, at the last step, we will deploy our application at EC2 using an auto scaling group. Current pattern of deployment can be easily used by you at production as it is rather cost effective and almost a HA solution. Though as every solution it also has some limitations, which I will discover during Terraform lectures
At deployment section I will speak a lot about different AWS Services, that would be used for creating security defense mechanisms
IAM policies and Security groups as restriction mechanisms to our resources
S3 as place for keeping our ALB and WAF logs
CloudWatch as centralized log storage and alarm system
SNS - as mechanism for sending alarm notifications during security attacks detection
I will also touch a little bit Route 53 and Certificate manager services
The deployed Flask application and all AWS infrastructure around it would be intensively used as a lab environment for imitating different hacker’s attacks and providing a cybersecurity learning process. That will allow you to perform real practice training and try different security tools and tricks with your own hands. That is why, as for me, it is so essential to have it to be done.
In the third section we will speak about AWS WAF. We will discuss in detail:
What resources can we attach WAF at - ALB, API gateway, CloudFront
How properly to configure it
Why correct configuration of AWS WAF is so time-consuming process
How to set up AWS WAF managed rules and custom blocking policies
How to analyze WAF and ALB logs using Athena
Why WAF is not silver bullet that can’t protect web app against all possible threats
At current section I will also show you some examples of real attacks that were blocked by WAF taken from my commercial experience, in order you could feel how powerful WAF is as a security defense tool
At 4th section we will discuss deeply AWS CloudWatch service, especially:
how to use our application logs as security detector
how to build custom CloudWatch filters
how to raise alerts in case web application is under the hacker’s attack
how you can be aware of attack even before WAF will detect it, or when WAF could not deal with the problem
In the 5th section we will speak about cyber threat analysis using Athena and Excel after a hacker's attack. We will discuss how to gather all required data using Athena and how to verify if the hacker's actions had any success.
At last section we will make a short summary of all passed practice materials, by creating effective security defense framework, that can be used at any cloud or even at on-premise solutions
Requirements:
- Active AWS account
- Some active web domain
- Basic knowledge at using docker and web programming
Who this course is for:
Anyone who is interested at cyber security or who is responsible for Web resources:
- Software engineer
- DevOps
- Admin
- CTO
- CEO
Also See : Cloud Computing and Amazon Web Services (AWS) Fundamentals