AWS Security Essentials
- Code training GK3337
- Duur 1 dag
- Versie link.aspx
Andere trainingsmethoden
Methode
Deze training is in de volgende formats beschikbaar:
-
Class Connect
Verbind naar een klas in HD
-
Klassikale training
Klassikaal leren
-
Op locatie klant
Op locatie klant
-
Virtueel leren
Virtueel leren
Vraag deze training aan in een andere lesvorm.
Trainingsbeschrijving
Naar bovenData
Naar boven-
- Methode: Virtueel leren
-
Datum:
20 december, 2024
Startgarantie
- Locatie: Virtueel-en-klassikaal
- Taal: Engels
-
- Methode: Klassikale training
- Datum: 14 maart, 2025
- Locatie: Nieuwegein (Iepenhoeve 5)
- Taal: Engels
-
- Methode: Virtueel leren
- Datum: 14 maart, 2025
- Locatie: Virtueel-en-klassikaal
- Taal: Engels
-
- Methode: Virtueel leren
- Datum: 16 juni, 2025
- Locatie: Virtueel-en-klassikaal
- Taal: Engels
-
- Methode: Virtueel leren
- Datum: 16 juni, 2025
- Locatie: Virtueel-en-klassikaal
- Taal: Engels
-
- Methode: Virtueel leren
- Datum: 12 september, 2025
- Locatie: Virtueel-en-klassikaal
- Taal: Engels
Doelgroep
Naar bovenThis course is intended for:
- IT business-level professionals interested in cloud security practices
- Security professionals with minimal working knowledge of AWS
Trainingsdoelstellingen
Naar bovenThis course is designed to teach you how to:
- Identify security benefits and responsibilities when using the AWS Cloud
- Describe the access control and management features of AWS
- Understand the different data encryption methods to secure sensitive data
- Describe how to secure network access to your AWS resources
- Determine which AWS services can be used for security logging and monitoring
Inhoud training
Naar bovenModule 1: Exploring the Security Pillar
- AWS Well-Architected Framework: Security Pillar
Module 2: Security of the Cloud
- Shared responsibility model
- AWS Global Infrastructure
- Compliance and governance
Module 3: Identity and Access Management
- Identity and access management
- Data access and protection essentials
- Lab 1: Introduction to Security Policies
Module 4: Protecting Infrastructure and Data
- Protecting your network infrastructure
- Edge Security
- DDoS Mitigation
- Protecting compute resources
- Lab 2: Securing VPC Resources with Security Groups
Module 5: Detection and Response
- Monitoring and detective controls
- Incident response essentials
Module 6: Course Wrap-Up
- Course review
Voorkennis
Naar bovenWe recommend that attendees of this course have:
- Working knowledge of IT security practices and infrastructure concepts, familiarity with cloud computing concepts
- #000000