DevSecOps: How to secure Web App with AWS WAF and CloudWatch
DevSecOps: How to secure Web App with AWS WAF and CloudWatch, available at $54.99, has an average rating of 4.87, with 46 lectures, based on 142 reviews, and has 9898 subscribers.
You will learn about How to secure Web application at AWS How Web Application firewall works How to configure AWS WAF poperly How to configure WAF alarms How to use Athena to analyse WAF and Application logs How custom exceptions and custom logging can become a security defense tool How to use CloudWatch for working with Application Logs How to build custom CloudWatch filters and alerts upon it How to provide cyber threat analysis using Athena and Excel after a hacker's attack This course is ideal for individuals who are Anyone who is interested at cyber security or who is responsible for Web resources – software engineers, DevOps, admin, CTO, CEO It is particularly useful for Anyone who is interested at cyber security or who is responsible for Web resources – software engineers, DevOps, admin, CTO, CEO.
Enroll now: DevSecOps: How to secure Web App with AWS WAF and CloudWatch
Summary
Title: DevSecOps: How to secure Web App with AWS WAF and CloudWatch
Price: $54.99
Average Rating: 4.87
Number of Lectures: 46
Number of Published Lectures: 46
Number of Curriculum Items: 46
Number of Published Curriculum Objects: 46
Original Price: $99.99
Quality Status: approved
Status: Live
What You Will Learn
- How to secure Web application at AWS
- How Web Application firewall works
- How to configure AWS WAF poperly
- How to configure WAF alarms
- How to use Athena to analyse WAF and Application logs
- How custom exceptions and custom logging can become a security defense tool
- How to use CloudWatch for working with Application Logs
- How to build custom CloudWatch filters and alerts upon it
- How to provide cyber threat analysis using Athena and Excel after a hacker's attack
Who Should Attend
- Anyone who is interested at cyber security or who is responsible for Web resources – software engineers, DevOps, admin, CTO, CEO
Target Audiences
- Anyone who is interested at cyber security or who is responsible for Web resources – software engineers, DevOps, admin, CTO, CEO
What you’ll learn:
-
How exceptions and logging should be organized at web application to become a security defensive tool
-
How to secure Web application at AWS Cloud
-
How to configure AWS WAF
-
How to use AWS WAF managed rules
-
How to use AWS WAF custom black and white list
-
How to use AWS WAF custom rate rules
-
How to configure WAF alarms
-
How to use CloudWatch as detector of abnormal hacker’s behavior
-
How to build custom CloudWatch filters and alerts upon it
-
How to use Athena to analyse WAF and application logs
-
Cyber thread analysis basics using Athena and Excel
Requirements:
-
Active AWS account
-
Some active web domain
-
Basic knowledge at using docker and web programming
Short description:
Current course is about how to secure Web Application against hacker’s attacks with AWS cloud solutions using application level, centralized log system and firewall protection. You will also learn a lot about how to provide effective cyber thread analysis during hacker’s attack and after it.
COURSE STRUCTURE:
The course starts from creating a very small API application. For that purpose I will use the Python programming language and Flask framework. If you are not aware of current technologies, don’t worry, you should not. Believe me, the application would be extremely simple, so anyone, even a child, can understand how it works.
While creating according application I will concentrate at next essential aspects:
-
Custom exceptions
-
Logging
I will explain why it is so essential to have those both things at any application and how to make it properly in order it would be helpful from a security defense perspective.
The principles which I will show you are extremely simple and can be easily propagated at any existing web application. You will see the real power of properly done exceptions and logging at your own eyes when we will make real hacker’s attacks simulations at our application after deploying it at AWS cloud
Generally speaking, deploying – it is 2nd essential part of our learning. Together we will deploy our test API application at AWS using Terraform. And again, if you have never used current technology, don’t worry. I will show you step by step, how to run according terraform scripts.
At 1st we will prepare the AWS network, after that we will deploy AWS ALB with WAF, and finally, at the last step, we will deploy our application at EC2 using an auto scaling group. Current pattern of deployment can be easily used by you at production as it is rather cost effective and almost a HA solution. Though as every solution it also has some limitations, which I will discover during Terraform lectures
At deployment section I will speak a lot about different AWS Services, that would be used for creating security defense mechanisms
-
IAM policies and Security groups as restriction mechanisms to our resources
-
S3 as place for keeping our ALB and WAF logs
-
CloudWath as centralized log storage and alarm system
-
SNS – as mechanism for sending alarm notifications during security attacks detection
-
I will also touch a little bit Route 53 and Certificate manager services
The deployed Falsk application and all AWS infrastructure around it would be intensively used as a lab environment for imitating different hacker’s attacks and providing a cyber security learning process. That will allow you to perform real practice training and try different security tools and tricks with your own hands. That is why, as for me, it is so essential to have it to be done.
In the third section we will speak about AWS WAF. We will discuss in details:
-
What resources can we attach WAF at – ALB, API gateway, CloudFront
-
How properly to configure it
-
Why correct configurationof AWS WAF is so time consuming process
-
How to set up AWS WAF managed rules and custom blocking policies
-
How to analyse WAF and ALB logs using Athena
-
Why WAF is not silver bullet that can’t protect web app against all possible threats
At current section I will also show you some examples of real attacks that were blocked by WAF taken from my commercial experience, in order you could feel how powerful WAF is as a security defense tool
At 4th section we will discuss deeply AWS CloudWatch service, especially:
-
how to use our application logs as security detector
-
how to build custom CloudWatch filters
-
how to raise alerts in case web application is under the hacker’s attack
-
how you can be aware of attack even before WAF will detect it, or when WAF could not deal with the problem
In the 5th section we will speak about cyber threat analysis using Atena and Excel after a hacker’s attack. We will discuss how to gather all required data using Athena and how to verify if the hacker’s actions had any success.
At last section we will make a short summary of all passed practice materials, by creating effective security defense framework, that can be used at any cloud or even at on-premise solutions
Who this course is for:
-
Anyone who is interested at cyber security or who is responsible for Web resources:
-
Software engineer
-
DevOps
-
Admin
-
CTO
-
CEO
Course Curriculum
Chapter 1: Introduction
Lecture 1: Promo introduction video
Lecture 2: About me and cyber security experience
Lecture 3: Coarse road map
Chapter 2: Flask test API application
Lecture 1: Flask app – local environment
Lecture 2: Flask app – code overview, how application works
Lecture 3: Flask app – custom exceptions
Lecture 4: Flask app – logging
Chapter 3: Application deployment at AWS using Terraform
Lecture 1: Terraform installation with tfenv
Lecture 2: AWS profile and terrafrom configuration
Lecture 3: Running terraform scripts – essential introduction
Lecture 4: Applying terraform – Part 1: pre init and network terrafrom modules
Lecture 5: Applying terraform – Part 2: AWS ALB and AWS Certificate Manage
Lecture 6: Build docker image and push it to the AWS ECR
Lecture 7: Applying terraform – Part 3: flask application at EC2 using auto scaling group
Lecture 8: Applying terraform – Part 4: add EC2 to AWS ALB as target group
Lecture 9: REMEMBER TO DESTROY ENV IN THE END – BELOW IS THE ARTICLE HOW TO DO IT PROPERLY
Chapter 4: AWS WAF – deep inside
Lecture 1: What is WAF and how it works
Lecture 2: AWS WAF managed rules as first step
Lecture 3: AWS WAF managed rules and count mode
Lecture 4: AWS WAF logs and test data set
Lecture 5: Initial Athena-WAF configuration
Lecture 6: Athena – running first query, WAF logs structure, Athena pricing
Lecture 7: How to analyse WAF log’s data with Athena queries – part 1
Lecture 8: How to analyse WAF log’s data with Athena queries – part 2
Lecture 9: AWS WAF managed rules configuration methodology and rules versions
Lecture 10: AWS WAF managed rules in action
Lecture 11: AWS WAF – custom white and black lists – part 1
Lecture 12: AWS WAF – custom white and black lists – part 2
Lecture 13: AWS WAF and custom regex pattern set
Lecture 14: AWS WAF rate rules introduction
Lecture 15: How to calculate rate thresholds for application using Athena and ALB logs
Lecture 16: AWS WAF rate rules in practice – part 1
Lecture 17: AWS WAF rate rules in practice – part 2
Lecture 18: AWS WAF metrics and alarms
Lecture 19: AWS WAF priority
Lecture 20: Why AWS WAF is not a silver bullet
Chapter 5: Application and CloudWatch as security monitoring tool
Lecture 1: How to use CloudWatch logs
Lecture 2: Understanding Application logs with CloudWatch Logs Insights and Dashboards
Lecture 3: Custom CloudWatch metrics and alerts as sensitive detector of abnormal behavior
Chapter 6: Cyber threat analysis using Atena and Excel
Lecture 1: Cyber threat analysis workflow – part 1
Lecture 2: Cyber threat analysis workflow – part 2
Lecture 3: Analyse data at Excel – part 1
Lecture 4: Analyse data at Excel – part 2
Chapter 7: Security defense framework
Lecture 1: Security defense framework
Lecture 2: Cyber Security Questionnaire
Chapter 8: Additional Info
Lecture 1: How to debug possible Flask app problems
Instructors
-
Sergii Demianchuk
CTO/System Architect
Rating Distribution
- 1 stars: 0 votes
- 2 stars: 0 votes
- 3 stars: 2 votes
- 4 stars: 9 votes
- 5 stars: 131 votes
Frequently Asked Questions
How long do I have access to the course materials?
You can view and review the lecture materials indefinitely, like an on-demand channel.
Can I take my courses with me wherever I go?
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!
You may also like
- Digital Marketing Foundation Course
- Google Shopping Ads Digital Marketing Course
- Multi Cloud Infrastructure for beginners
- Master Lead Generation: Grow Subscribers & Sales with Popups
- Complete Copywriting System : write to sell with ease
- Product Positioning Masterclass: Unlock Market Traction
- How to Promote Your Webinar and Get More Attendees?
- Digital Marketing Courses
- Create music with Artificial Intelligence in this new market
- Create CONVERTING UGC Content So Brands Will Pay You More
- Podcast: The top 8 ways to monetize by Podcasting
- TikTok Marketing Mastery: Learn to Grow & Go Viral
- Free Digital Marketing Basics Course in Hindi
- MailChimp Free Mailing Lists: MailChimp Email Marketing
- Automate Digital Marketing & Social Media with Generative AI
- Google Ads MasterClass – All Advanced Features
- Online Course Creator: Create & Sell Online Courses Today!
- Introduction to SEO – Basic Principles of SEO
- Affiliate Marketing For Beginners: Go From Novice To Pro
- Effective Website Planning Made Simple