AWS Security Essentials (EN)
- Course Code GK3337
- Duration 1 day
Course Delivery
Jump to:
Course Delivery
This course is available in the following formats:
-
Public Classroom
Traditional Classroom Learning
-
Virtual Learning
Learning that is virtual
Request this course in a different delivery format.
Course Overview
TopVirtual Learning
This interactive training can be taken from any location, your office or home and is delivered by a trainer. This training does not have any delegates in the class with the instructor, since all delegates are virtually connected. Virtual delegates do not travel to this course, Global Knowledge will send you all the information needed before the start of the course and you can test the logins.
Course Schedule
Top-
- Delivery Format: Virtual Learning
- Date: 13 January, 2025
- Location: Virtual
-
- Delivery Format: Virtual Learning
- Date: 10 February, 2025
- Location: Virtual
-
- Delivery Format: Virtual Learning
- Date: 10 March, 2025
- Location: Virtual
Target Audience
TopThis course is intended for:
- IT business-level professionals interested in cloud security practices
- Security professionals with minimal working knowledge of AWS
Course Objectives
TopThis course is designed to teach you how to:
- Identify security benefits and responsibilities when using the AWS Cloud
- Describe the access control and management features of AWS
- Understand the different data encryption methods to secure sensitive data
- Describe how to secure network access to your AWS resources
- Determine which AWS services can be used for security logging and monitoring
Course Content
TopModule 1: Exploring the Security Pillar
- AWS Well-Architected Framework: Security Pillar
Module 2: Security of the Cloud
- Shared responsibility model
- AWS Global Infrastructure
- Compliance and governance
Module 3: Identity and Access Management
- Identity and access management
- Data access and protection essentials
- Lab 1: Introduction to Security Policies
Module 4: Protecting Infrastructure and Data
- Protecting your network infrastructure
- Edge Security
- DDoS Mitigation
- Protecting compute resources
- Lab 2: Securing VPC Resources with Security Groups
Module 5: Detection and Response
- Monitoring and detective controls
- Incident response essentials
Module 6: Course Wrap-Up
- Course review
Course Prerequisites
TopWe recommend that attendees of this course have:
- Working knowledge of IT security practices and infrastructure concepts, familiarity with cloud computing concepts