This course demonstrates how to efficiently use AWS security services to stay secure in the AWS Cloud. The course focuses on the security practices that AWS recommends for enhancing the security of your data and systems in the cloud. The course highlights the security features of AWS key services including compute, storage, networking, and database services. You will also learn how to leverage AWS services and tools for automation, continuous monitoring and logging, and responding to security incidents.Intended AudienceThis course is intended for:Security engineersSecurity architectsInformation securityCourse ObjectivesIn this course, you will learn how to:Assimilate and leverage the AWS shared security responsibility modelArchitect and build AWS application infrastructures that are protected against the most common security threatsProtect data at rest and in transit with encryptionApply security checks and analyses in an automated and reproducible mannerConfigure authentication for resources and applications in the AWS CloudGain insight into events by capturing, monitoring, processing, and analyzing logsIdentify and mitigate incoming threats against applications and dataPerform security assessments to ensure that common vulnerabilities are patched and security best practices are appliedPrerequisitesWe recommend that attendees of this course have the following prerequisites:AWS Cloud PractitionerAWS Security FundamentalsArchitecting on AWSWorking knowledge of IT security practices and infrastructure conceptsFamiliarity with cloud computing conceptsDelivery MethodThis course is delivered through a mix of:Classroom trainingHands-on labsGroup exercisesHands-on ActivityThis course allows you to test new skills and apply knowledge to your working environment through a variety of practical exercises.Duration3 daysCourse OutlineThis course covers the following concepts:Day 1Entry points on AWSSecurity considerations for Web Application environmentsSecuring network communications inside the Amazon VPCApplication security with incident responseDay 2Data security with incident responseSecurity considerations hybrid environmentAWS monitoring and log collectingProcessing logs on AWSProtecting against threats outside of the Amazon VPCDay 3Account management on AWSSecurity considerations serverless environmentSecrets management on AWSAutomating security and incident response on AWSThreat detection and sensitive data monitoring
Mention Learnbetween.com when calling,you may can get additional discount.