AWS Security Essentials
- Kursuskode GK3337
- Varighed 1 Dag
Leveringsmetoder
Leveringsmetoder
Kurset er tilgængeligt i følgende formater:
-
Firma kursus
Et lukket firma kursus
-
Åbent kursus
Traditionel klasserumsundervisning
-
Åbent kursus (Virtuelt)
Live klasserumsundervisning du tilgår virtuelt
Anmod om dette kursus Med en anden leveringsløsning
Beskrivelse
ToppenKursusdato
Toppen-
- Leveringsmetode: Åbent kursus (Virtuelt)
-
Dato:
20 december, 2024
Guaranteed Event
- Kursussted: Virtual
- Sprog: engelsk
-
- Leveringsmetode: Åbent kursus (Virtuelt)
- Dato: 14 marts, 2025
- Kursussted: Virtual
- Sprog: engelsk
-
- Leveringsmetode: Åbent kursus (Virtuelt)
- Dato: 16 juni, 2025
- Kursussted: Virtual
- Sprog: engelsk
-
- Leveringsmetode: Åbent kursus (Virtuelt)
- Dato: 16 juni, 2025
- Kursussted: Virtual
- Sprog: engelsk
-
- Leveringsmetode: Åbent kursus (Virtuelt)
- Dato: 12 september, 2025
- Kursussted: Virtual
- Sprog: engelsk
-
- Leveringsmetode: Åbent kursus (Virtuelt)
- Dato: 12 december, 2025
- Kursussted: Virtual
- Sprog: engelsk
Målgruppe
ToppenThis course is intended for:
- IT business-level professionals interested in cloud security practices
- Security professionals with minimal working knowledge of AWS
Kursets formål
ToppenThis course is designed to teach you how to:
- Identify security benefits and responsibilities when using the AWS Cloud
- Describe the access control and management features of AWS
- Understand the different data encryption methods to secure sensitive data
- Describe how to secure network access to your AWS resources
- Determine which AWS services can be used for security logging and monitoring
Kursusindhold
ToppenModule 1: Exploring the Security Pillar
- AWS Well-Architected Framework: Security Pillar
Module 2: Security of the Cloud
- Shared responsibility model
- AWS Global Infrastructure
- Compliance and governance
Module 3: Identity and Access Management
- Identity and access management
- Data access and protection essentials
- Lab 1: Introduction to Security Policies
Module 4: Protecting Infrastructure and Data
- Protecting your network infrastructure
- Edge Security
- DDoS Mitigation
- Protecting compute resources
- Lab 2: Securing VPC Resources with Security Groups
Module 5: Detection and Response
- Monitoring and detective controls
- Incident response essentials
Module 6: Course Wrap-Up
- Course review
Forudsætninger
ToppenWe recommend that attendees of this course have:
- Working knowledge of IT security practices and infrastructure concepts, familiarity with cloud computing concepts
- #000000