History
home
BDA ์—ฐํ˜
home
8๏ธโƒฃ

Machine Learning Security

ย Course Description

AWS์—์„œ ๊ฐ€์žฅ ๋†’์€ ์šฐ์„  ์ˆœ์œ„๋ฅผ ๋‘๋Š” ๋ถ€๋ถ„์€ ๋ณด์•ˆ์ž…๋‹ˆ๋‹ค. ๊ถŒํ•œ ์ œ์–ด์™€ ๊ด€๋ฆฌ, ํŠธ๋ž˜ํ”ฝ ๊ถŒํ•œ ๋ถ€์—ฌ๋Š” ๋ชจ๋‘ AWS ํ”Œ๋žซํผ์—์„œ ๋งค์šฐ ์•ˆ์ „ํ•œ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜๊ณผ ํ™˜๊ฒฝ์„ ๊ตฌ์ถ•ํ•˜๋Š” ๊ณผ์ •์˜ ์ผ๋ถ€์ž…๋‹ˆ๋‹ค. ์ด ์ปค๋ฆฌํ˜๋Ÿผ์—์„œ๋Š” NACL, ๋ณด์•ˆ ๊ทธ๋ฃน, AWS Identity and Access Management ๋ฐ ์•”ํ˜ธํ™” ํ‚ค ๊ด€๋ฆฌ์— ๋Œ€ํ•ด ์ž์„ธํžˆ ์„ค๋ช…ํ•˜๋Š” ํŠน์ • ์ฃผ์ œ๋ฅผ ํ†ตํ•ด ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜๊ณผ ํ™˜๊ฒฝ์„ ๋ณดํ˜ธํ•˜๋Š” AWS ์ œํ’ˆ ๋ฐ ์„œ๋น„์Šค์— ๋Œ€ํ•ด ์•Œ์•„๋ด…๋‹ˆ๋‹ค.

ย Authentication and Authorization with AWS Identity and Access Management

ย Differences between Security Groups and NACLs

ย Protecting Your Instance with Security Groups

ย Understanding Amazon EBS Volume Encryption

ย AWS Security Fundamentalsย