AWS Security Essentials
- Code training GK3337
- Duur 1 dag
Andere trainingsmethoden
Methode
Deze training is in de volgende formats beschikbaar:
-
Class Connect
Verbind naar een klas in HD
-
Klassikale training
Klassikaal leren
-
Op locatie klant
Op locatie klant
-
Virtueel leren
Virtueel leren
Vraag deze training aan in een andere lesvorm.
Trainingsbeschrijving
Naar bovenData
Naar boven-
- Methode: Virtueel leren
-
Datum:
12 december, 2025 | 9:00 AM to 5:00 PM
Last Minute
- Locatie: Virtueel-en-klassikaal (W. Europe )
- Taal: Engels
-
- Methode: Virtueel leren
- Datum: 22 januari, 2026 | 10:00 AM to 6:00 PM
- Locatie: Virtueel-en-klassikaal (W. Europe )
- Taal: Engels
-
- Methode: Klassikale training
- Datum: 06 maart, 2026 | 9:00 AM to 5:00 PM
- Locatie: Eindhoven (Evoluon Noord Brabantlaan 1) (W. Europe )
- Taal: Nederlands
-
- Methode: Virtueel leren
- Datum: 06 maart, 2026 | 9:00 AM to 5:00 PM
- Locatie: Virtueel-en-klassikaal (W. Europe )
- Taal: Nederlands
-
- Methode: Virtueel leren
- Datum: 01 mei, 2026 | 10:00 AM to 6:00 PM
- Locatie: Virtueel-en-klassikaal (W. Europe )
- Taal: Engels
-
- Methode: Klassikale training
- Datum: 04 juni, 2026 | 9:00 AM to 5:00 PM
- Locatie: Groningen/Paterswolde (Groningerweg 19) (W. Europe )
- Taal: Nederlands
Doelgroep
Naar bovenThis course is intended for:
- IT business-level professionals interested in cloud security practices
- Security professionals with minimal working knowledge of AWS
Trainingsdoelstellingen
Naar bovenThis course is designed to teach you how to:
- Identify security benefits and responsibilities when using the AWS Cloud
- Describe the access control and management features of AWS
- Understand the different data encryption methods to secure sensitive data
- Describe how to secure network access to your AWS resources
- Determine which AWS services can be used for security logging and monitoring
Inhoud training
Naar bovenModule 1: Exploring the Security Pillar
- AWS Well-Architected Framework: Security Pillar
Module 2: Security of the Cloud
- Shared responsibility model
- AWS Global Infrastructure
- Compliance and governance
Module 3: Identity and Access Management
- Identity and access management
- Data access and protection essentials
- Lab 1: Introduction to Security Policies
Module 4: Protecting Infrastructure and Data
- Protecting your network infrastructure
- Edge Security
- DDoS Mitigation
- Protecting compute resources
- Lab 2: Securing VPC Resources with Security Groups
Module 5: Detection and Response
- Monitoring and detective controls
- Incident response essentials
Module 6: Course Wrap-Up
- Course review
Voorkennis
Naar bovenWe recommend that attendees of this course have:
- Working knowledge of IT security practices and infrastructure concepts, familiarity with cloud computing concepts