AWS Security Essentials
- Course Code GK3337
- Duration 1 day
Course Delivery
Jump to:
Course Delivery
This course is available in the following formats:
-
Company Event
Event at company
-
Public Classroom
Traditional Classroom Learning
-
Virtual Learning
Learning that is virtual
Request this course in a different delivery format.
Course Overview
TopCourse Schedule
Top-
- Delivery Format: Virtual Learning
-
Date:
20 December, 2024
Guaranteed To Run
- Location: Virtual
-
- Delivery Format: Virtual Learning
- Date: 14 March, 2025
- Location: Virtual
-
- Delivery Format: Virtual Learning
- Date: 16 June, 2025
- Location: Virtual
-
- Delivery Format: Virtual Learning
- Date: 16 June, 2025
- Location: Virtual
-
- Delivery Format: Virtual Learning
- Date: 12 September, 2025
- Location: Virtual
-
- Delivery Format: Virtual Learning
- Date: 12 December, 2025
- Location: Virtual
Target Audience
TopThis course is intended for:
- IT business-level professionals interested in cloud security practices
- Security professionals with minimal working knowledge of AWS
Course Objectives
TopThis course is designed to teach you how to:
- Identify security benefits and responsibilities when using the AWS Cloud
- Describe the access control and management features of AWS
- Understand the different data encryption methods to secure sensitive data
- Describe how to secure network access to your AWS resources
- Determine which AWS services can be used for security logging and monitoring
Course Content
TopModule 1: Exploring the Security Pillar
- AWS Well-Architected Framework: Security Pillar
Module 2: Security of the Cloud
- Shared responsibility model
- AWS Global Infrastructure
- Compliance and governance
Module 3: Identity and Access Management
- Identity and access management
- Data access and protection essentials
- Lab 1: Introduction to Security Policies
Module 4: Protecting Infrastructure and Data
- Protecting your network infrastructure
- Edge Security
- DDoS Mitigation
- Protecting compute resources
- Lab 2: Securing VPC Resources with Security Groups
Module 5: Detection and Response
- Monitoring and detective controls
- Incident response essentials
Module 6: Course Wrap-Up
- Course review
Course Prerequisites
TopWe recommend that attendees of this course have:
- Working knowledge of IT security practices and infrastructure concepts, familiarity with cloud computing concepts
- /-/media/global-knowledge/rte-images/campaigns-and-promotions/aws_awardwebbanner.jpg?sc_lang=en-gb https://www.globalknowledge.com/us-en/company/awards/ #000000