AWS Security Essentials
- Course Code GK3337
- Duration 1 day
Course Delivery
Jump to:
Course Delivery
This course is available in the following formats:
-
Class Connect HD
Connect to a class in HD
-
Company Event
Event at company
-
Public Classroom
Traditional Classroom Learning
-
Virtual Learning
Learning that is virtual
Request this course in a different delivery format.
Course Overview
TopClass-Connect™ HD
This is live hands-on interactive learning where you can attend a course from different training centres. This premium experience uses HD quality audio and video that connects the classrooms over a high capacity managed network to ensure a 'real time' experience. The instructor will be presenting from one location and students attending from other centres are able to interact with the instructor and other delegates using video and voice conferencing.
Course Schedule
TopTarget Audience
TopThis course is intended for:
- IT business-level professionals interested in cloud security practices
- Security professionals with minimal working knowledge of AWS
Course Objectives
TopThis course is designed to teach you how to:
- Identify security benefits and responsibilities when using the AWS Cloud
- Describe the access control and management features of AWS
- Understand the different data encryption methods to secure sensitive data
- Describe how to secure network access to your AWS resources
- Determine which AWS services can be used for security logging and monitoring
Course Content
TopModule 1: Exploring the Security Pillar
- AWS Well-Architected Framework: Security Pillar
Module 2: Security of the Cloud
- Shared responsibility model
- AWS Global Infrastructure
- Compliance and governance
Module 3: Identity and Access Management
- Identity and access management
- Data access and protection essentials
- Lab 1: Introduction to Security Policies
Module 4: Protecting Infrastructure and Data
- Protecting your network infrastructure
- Edge Security
- DDoS Mitigation
- Protecting compute resources
- Lab 2: Securing VPC Resources with Security Groups
Module 5: Detection and Response
- Monitoring and detective controls
- Incident response essentials
Module 6: Course Wrap-Up
- Course review
Course Prerequisites
TopWe recommend that attendees of this course have:
- Working knowledge of IT security practices and infrastructure concepts, familiarity with cloud computing concepts
- /-/media/global-knowledge/rte-images/campaigns-and-promotions/aws_awardwebbanner.jpg?sc_lang=en-be https://www.globalknowledge.com/us-en/company/awards/ #000000