Table of Contents
- Setting Up AWS Accounts and Organization
- Access Management with IAM Policies and Roles
- Key Management with KMS and CloudHSM
- Securing Data on S3 with Policies and Techniques
- Network and EC2 Security with VPCs
- Web Security Using Certificates, CDNs, and Firewalls
- Monitoring with CloudWatch, CloudTrail, and Config
- Compliance with GuardDuty, Macie, Inspector, and Analyzer
- Advanced Identity and Directory Management
- Additional Services and Practices for AWS Security

