Comprehensive Guide To Aws Waf - Protecting Web Applications - Printable Version +- Softwarez.Info - Software's World! (https://softwarez.info) +-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone) +--- Forum: Video Tutorials (https://softwarez.info/Forum-Video-Tutorials) +--- Thread: Comprehensive Guide To Aws Waf - Protecting Web Applications (/Thread-Comprehensive-Guide-To-Aws-Waf-Protecting-Web-Applications) |
Comprehensive Guide To Aws Waf - Protecting Web Applications - AD-TEAM - 09-17-2024 Comprehensive Guide To Aws Waf - Protecting Web Applications Published 8/2024 MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz Language: English | Size: 213.83 MB | Duration: 2h 16m AWS WAF
[b]What you'll learn[/b] Advanced AWS WAF Configuration Combining AWS WAF with Other AWS Services AWS WAF Best Practices AWS WAF in Real-World Scenarios AWS WAF Security Automation AWS WAF Performance and Cost Optimization [b]Requirements[/b] Basic knowledge of AWS services and cloud computing concepts. Familiarity with web application architecture and security fundamentals. [b]Description[/b] The "Comprehensive Guide to AWS WAF" is course designed to provide participants with a thorough understanding of AWS Web Application Firewall (WAF) and its role in safeguarding web applications from cyber threats. With a focus on hands-on learning and real-world examples, this course covers the essential concepts, best practices, and advanced configurations related to AWS WAF.Throughout the course, participants will be introduced to the basics of AWS WAF, including its key features and benefits, while gaining insights into common web application security threats and attack vectors. They will learn to create and customize WAF Web ACLs, rules, conditions, and filters, and explore the intricacies of rule actions and priority settings.The course delves into advanced WAF configurations, such as rate-based and IP-based rules, geolocation filtering, and protection against Cross-site Scripting (XSS) and SQL injection attacks. Moreover, participants will discover how to integrate AWS WAF with other AWS services, such as Amazon CloudFront, Application Load Balancer (ALB), and AWS Firewall Manager.With a strong emphasis on security automation, the course equips participants with the skills to automate WAF management using AWS API, CLI, and AWS CloudFormation. They will also learn to monitor WAF logs and metrics effectively and optimize WAF performance and costs.By the end of the course, participants will possess the knowledge and proficiency needed to implement robust security measures using AWS WAF. Whether protecting static websites or dynamic web applications, mitigating DDoS attacks, or ensuring cost-efficient and scalable WAF architecture, attendees will be equipped to secure their web applications against a wide array of cyber threats in real-world scenarios. Prerequisites include a basic understanding of AWS services and web application security fundamentals Overview Section 1: Introduction Lecture 1 Introduction Section 2: Introduction to AWS WAF Lecture 2 What is WAF - Web Application Firewall? Lecture 3 WAF VS IPS Lecture 4 Understanding the basics of AWS WAF Lecture 5 Key features and benefits of AWS WAF Lecture 6 Web application security threats and attack vectors Lecture 7 Web ACLs (Access Control Lists) and Rule Groups Section 3: Getting Started with AWS WAF Lecture 8 Creating a AWS WAF Web ACL Lecture 9 Understanding AWS WAF Conditions and Rules Lecture 10 Defining AWS WAF Filters and Conditions Lecture 11 Customizing rule actions and priority Lecture 12 AWS WAF logging and metrics Section 4: Advanced AWS WAF Configuration Lecture 13 Rate-based and IP-based rules Lecture 14 Managing whitelisting and blacklisting Lecture 15 Deeper into managing whitelisting and blacklisting Lecture 16 Geolocation filtering Lecture 17 How do I allow or block requests from a specific country or geolocation? Lecture 18 Implementing Cross-site Scripting (XSS) protection Lecture 19 Mitigating SQL injection attacks Lecture 20 Mitigating SQL injection attacks-LAB Lecture 21 How To Setup A Virtual Penetration Testing Lab Lecture 22 Testing for SQL injection attack Section 5: Combining AWS WAF with Other AWS Services Lecture 23 Introduction - Combining AWS WAF with Other AWS Services Lecture 24 Integrating AWS WAF with Amazon CloudFront Lecture 25 AWS WAF with Application Load Balancer (ALB) and API Gateway Lecture 26 Using AWS WAF with AWS Firewall Manager Lecture 27 Automated security with AWS WAF and AWS Lambda Section 6: AWS WAF Best Practices Lecture 28 Introduction - AWS WAF Best Practices Lecture 29 Optimizing WAF rule performance Lecture 30 Building a scalable and cost-effective WAF architecture Lecture 31 Handling false positives and false negatives Lecture 32 Continuous monitoring and rule updates Lecture 33 Incident response and remediation strategies Section 7: AWS WAF in Real-World Scenarios Lecture 34 Protecting a static website with AWS WAF Lecture 35 Securing a dynamic web application using WAF Lecture 36 Preventing DDoS attacks with AWS WAF and Shield Lecture 37 Combining WAF with AWS Security Groups and Network ACLs Section 8: AWS WAF Security Automation Lecture 38 Introduction Lecture 39 Leveraging AWS WAF API and CLI for automation Lecture 40 Building custom scripts for rule management Lecture 41 Using AWS CloudFormation for WAF deployments Lecture 42 CI/CD integration for WAF rule updates Lecture 43 Security Automation for AWS WAF Lecture 44 WAF Automation on AWS Architecture Section 9: AWS WAF Performance and Cost Optimization Lecture 45 Introduction Lecture 46 Monitoring and analyzing WAF logs and metrics Lecture 47 AWS WAF pricing models and cost optimization strategies Lecture 48 Scaling WAF resources for high-traffic applications Lecture 49 WAF resource allocation for cost efficiency Section 10: LAB Lecture 50 Using AWS WAF To Secure WordPress Login Lecture 51 AWS WAF Workshop Lecture 52 AWS WAF Workshop Section 11: Bonus Lecture 53 Bonus Cloud architects and security professionals responsible for web application security on AWS.,DevOps engineers looking to implement automated security measures for their applications.,IT managers and administrators seeking to enhance their web application protection capabilities. |