Search icon
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
AWS Certified Cloud Practitioner Exam Guide

You're reading from  AWS Certified Cloud Practitioner Exam Guide

Product type Book
Published in Jan 2022
Publisher Packt
ISBN-13 9781801075930
Pages 630 pages
Edition 1st Edition
Languages
Author (1):
Rajesh Daswani Rajesh Daswani
Profile icon Rajesh Daswani

Table of Contents (23) Chapters

Preface 1. Section 1: Cloud Concepts
2. Chapter 1: What Is Cloud Computing? 3. Chapter 2: Introduction to AWS and the Global Infrastructure 4. Chapter 3: Exploring AWS Accounts, Multi-Account Strategy, and AWS Organizations 5. Section 2: AWS Technologies
6. Chapter 4: Identity and Access Management 7. Chapter 5: Amazon Simple Storage Service (S3) 8. Chapter 6: AWS Networking Services – VPCs, Route53, and CloudFront 9. Chapter 7: AWS Compute Services 10. Chapter 8: AWS Database Services 11. Chapter 9: High Availability and Elasticity on AWS 12. Chapter 10: Application Integration Services 13. Chapter 11: Analytics on AWS 14. Chapter 12: Automation and Deployment on AWS 15. Chapter 13: Management and Governance on AWS 16. Section 3: AWS Security
17. Chapter 14: Implementing Security in AWS 18. Section 4: Billing and Pricing
19. Chapter 15: Billing and Pricing 20. Chapter 16: Mock Tests 21. Answers 22. Other Books You May Enjoy

AWS vulnerability scanning

As an AWS customer, you are going to be consuming various services to build and deploy your cloud applications. You want to make sure that your cloud solutions are highly secure and protected. To that end, you will follow key guidelines and industry best practices while implementing security controls and procedures at the different levels of your cloud ecosystem.

But how you can confirm that the level of protection you have implemented is sufficient and whether the controls you have put in place work?

AWS allows its customers to conduct penetration testing on their workloads in the AWS cloud. Also known as pen testing, this is a simulated cyber-attack against your computer systems to check for vulnerabilities. This is usually conducted by your internal or appointed security team.

As a customer, you need to follow the service policy for penetration testing, which includes permitted services and prohibited activities. For example, you are prohibited...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime}