• Online, Self-Paced
Course Description

In this introductory video, we review how to secure access to your individual instances within AWS. We also explain how to use security groups to control permission and authorize traffic based on the source, defined as IP range, protocol and port.

Learning Objectives

In this introductory video, we review how to secure access to your individual instances within AWS. We also explain how to use security groups to control permission and authorize traffic based on the source, defined as IP range, protocol and port.

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.