Listing Thumbnail

    Security Engineering on AWS (AWS-AWSSO)

     Info
    This course demonstrates how to efficiently use AWS security services to stay secure in the AWS Cloud. The course focuses on the security practices that AWS recommends for enhancing the security of your data and systems in the cloud. The course highlights the security features of AWS key services including compute, storage, networking, and database services. You will also learn how to leverage AWS services and tools for automation, continuous monitoring and logging, and responding to security incidents.
    Listing Thumbnail

    Security Engineering on AWS (AWS-AWSSO)

     Info

    Overview

    Course description

    This course demonstrates how to efficiently use AWS security services to stay secure in the AWS Cloud. The course focuses on the security practices that AWS recommends for enhancing the security of your data and systems in the cloud. It highlights the security features of AWS key services including compute, storage, networking, and database services. You will also learn how to leverage AWS services and tools for automation, continuous monitoring and logging, and responding to security incidents.

    Course level: Intermediate

    Duration 3 days

    Activities

    This course includes presentations, demonstrations, and hands-on labs.

    Intended audience

    This course is intended for security engineers, security architects, and information security professionals.

    Prerequisites

    We recommend that attendees of this course have:

    • Working knowledge of IT security practices and infrastructure concepts
    • Familiarity with cloud computing concepts
    • Completed AWS Security Essentials and Architecting on AWS instructor-led courses

    Course Outline

    • Module 1: Security on AWS
    • Module 2: Identifying Entry Points on AWS
    • Module 3: Security Considerations: Web Application Environments
    • Module 4: Application Security
    • Module 5: Data Security
    • Module 6: Securing Network Communications
    • Module 7: Monitoring and Collecting Logs on AWS
    • Module 8: Processing Logs on AWS
    • Module 9: Security Considerations: Hybrid Environments
    • Module 10: Out-Of-Region Protection
    • Module 11: Security Considerations: Serverless Environments
    • Module 12: Threat Detection and Investigation
    • Module 13: Secrets Management on AWS
    • Module 14: Automation and Security by Design
    • Module 15: Account Management and Provisioning on AWS

    Highlights

    • What you'll learn Assimilate and leverage the AWS shared security responsibility model; Architect and build AWS application infrastructures that are protected against the most common security threats; Protect data at rest and in transit with encryption; Apply security checks and analyses in an automated and reproducible manner and much more.

    Details

    Delivery method

    Pricing

    Custom pricing options

    Pricing is based on your specific requirements and eligibility. To get a custom quote for your needs, request a private offer.

    Legal

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Resources

    Vendor resources

    Support

    Vendor support