Security Engineering on AWS
This course demonstrates how to efficiently use AWS security services to stay secure in the AWS Cloud. The course focuses on the security practices that AWS recommends for enhancing the security of your data and systems in the cloud. The course highlights the security features of AWS key services including compute, storage, networking, and database services. You will also learn how to leverage AWS services and tools for automation, continuous monitoring and logging, and responding to security incidents.
Kod szkolenia
AWS-SEC
Czas trwania
3 dni
Poziom
Średni
Cena
6500
zł
Dla kogo?
This course is intended for:
- Security engineers
- Security architects
- Security operations
- Information security
Zdobyte umiejętności
In this course, you will learn how to:
- Assimilate and leverage the AWS shared security responsibility model
- Architect and build AWS application infrastructures that are protected against the most common security threats
- Protect data at rest and in transit with encryption
- Apply security checks and analyses in an automated and reproducible manner
- Configure authentication for resources and applications in the AWS Cloud
- Gain insight into events by capturing, monitoring, processing, and analyzing logs
- Identify and mitigate incoming threats against applications and data
- Perform security assessments to ensure that common vulnerabilities are patched and security best practices are applied
Wymagania wstępne
We recommend that attendees of this course have the following prerequisites:
- AWS Cloud Practitioner Essentials
- AWS Security Fundamentals
- Architecting on AWS
- Working knowledge of IT security practices and infrastructure concepts
- Familiarity with cloud computing concepts
Zakres szkolenia
- Introduction to Cloud Security
- Cloud Aware Governance and Compliance
- Identity and Access Management
- Using AWS IAM
- Securing AWS Infrastructure Services – Part 1
- Creating a virtual private cloud
- Securing AWS Infrastructure Services – Part 2
- Securing AWS Container Services – Part 1
- Securing AWS Container Services – Part 2
- Using RDS security groups
- Securing AWS Abstracted Services
- Securing Amazon S3 buckets
- Using AWS Security Services – Part 1
- Capturing logs
- Using AWS Security Products – Part 2
- Using AWS Config
- Using AWS Service Catalog
- Data Protection in the AWS Cloud
- Building Compliant Workloads on AWS – Case Studies
- Security Incident Management in the Cloud