Listing Thumbnail

    EPAM/UpSkill : Security Engineering on AWS - Instructor-Led Training

     Info
    You will learn to efficiently use AWS security services including Amazon Security Lake, Amazon Detective, AWS Control Tower, AWS Secrets Manager, Amazon CloudWatch, Amazon GuardDuty, and more for automation, continuous monitoring and logging, and responding to security incidents. The course also includes additional hands-on tasks to polish your skills within special EPAM AWS Sandbox, for no extra fee.
    Listing Thumbnail

    EPAM/UpSkill : Security Engineering on AWS - Instructor-Led Training

     Info

    Overview

    Security is a concern for both customers in the cloud, and those considering cloud adoption. An increase in cyberattacks and data leaks remains top of mind for most industry personnel. The Security Engineering on AWS  course addresses these concerns by helping you better understand how to interact and build with Amazon Web Services (AWS) in a secure way. In this course, you will learn about managing identities and roles, managing and provisioning accounts, and monitoring API activity for anomalies. You will also learn about how to protect data stored on AWS. The course explores how you can generate, collect, and monitor logs to help identify security incidents. Finally, you will review detecting and investigating security incidents with AWS services. The course is delivered by skilled Amazon Authorized Instructors, who daily polish their skills and knowledge on production enterprise projects.

    It also includes additional hands-on tasks to polish your skills within special EPAM AWS Sandbox, for no extra fee.

    Activities

    This course includes presentations, hands-on labs, demonstrations, and group exercises.

    Course objectives

    In this course, you will learn to:

    • State an understanding of AWS cloud security based on the CIA triad.
    • Create and analyze authentication and authorizations with IAM.
    • Manage and provision accounts on AWS with appropriate AWS services.
    • Identify how to manage secrets using AWS services.
    • Monitor sensitive information and protect data via encryption and access controls.
    • Identify AWS services that address attacks from external sources.
    • Monitor, generate, and collect logs.
    • Identify indicators of security incidents.
    • Identify how to investigate threats and mitigate using AWS services.

    Intended audience

    This course is intended for:

    • Security engineers
    • Security architects
    • Cloud architects
    • Cloud operators working across all global segments.

    Prerequisites

    We recommend that attendees of this course have: Completed the following courses:

    Highlights

    • Additional hands-on tasks to polish your skills within special EPAM AWS Sandbox
    • Production-involved trainers, who constantly improve their hands-on experience
    • Raising IT talents since 2003, including delivering AWS trainings since 2016

    Details

    Categories

    Delivery method

    Pricing

    Custom pricing options

    Pricing is based on your specific requirements and eligibility. To get a custom quote for your needs, request a private offer.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Support

    Vendor support

    If you would like to learn more about the courses delivered by EPAM, prices and available time slots, please contact WFBAWSTrainingsGlobal@epam.com , and we will be glad to provide the details and discuss the agreement.

    The price depends on the size of the course attendees group.