Length
3 days

Overview

Learn how to use AWS security services to stay secure in the AWS Cloud. Enhance the security of your data and systems in the cloud with AWS-recommended security practices.

In this course, you’ll explore the security features of AWS key services, including compute, storage, networking, and database services. You’ll also learn how to use AWS services and tools for automation, continuous monitoring and logging, and responding to security incidents.

This intermediate-level course is delivered through a mix of instructor-led training (ILT), hands-on labs, and group exercises.

Key Topics

Detailed Info
  • Identifying entry points on AWS
  • Application security
  • Data security
  • Monitoring and collecting logs on AWS
  • Account management on AWS
  • Secrets management on AWS
  • Threat detection and sensitive data monitoring
  • Security considerations: web application environments
  • Securing network communications
  • Security considerations: hybrid environments
  • Processing logs on AWS
  • Out-of-region protection
  • Security considerations: serverless environments
  • Automating security on AWS
Skills Gained
Key Topics
Target Audience
Prerequisites

Skills Gained

This course is designed to teach participants how to:

  • Use the AWS shared security responsibility model
  • Architect and build AWS application infrastructures that are protected against the most common security threats
  • Use encryption to protect data at rest and in transit
  • Apply security checks and analyses in an automated and reproducible way
  • Configure authentication for resources and applications in the AWS Cloud
  • Gain insight into events by capturing, monitoring, processing, and analysing logs
  • Identify and mitigate incoming threats against applications and data
  • Perform security assessments to ensure that common vulnerabilities are patched and security best practices are applied

Key Topics

Module 0: Course introduction

  • Security in the AWS Cloud
  • AWS Shared Responsibility Model
  • Incident response overview
  • DevOps with security engineering

Module 1: Identifying entry points on AWS

  • Identify the different ways to access the AWS platform
  • Understanding IAM policies
  • IAM permissions boundary
  • Multi-factor authentication
  • AWS CloudTrail
  • Hands-on lab 1: Cross-account access

Module 2: Security considerations: web application environments

  • Threats in a three-tier architecture
  • Common threats: User access
  • Common threats: Data access
  • AWS Trusted Advisor

Module 3: Application security

  • Dedicated Amazon EC2 instances and hosts
  • Amazon machine images (AMIs)
  • Amazon Inspector
  • AWS Systems Manager
  • Hands-on lab 2: Using AWS Systems Manager and Amazon Inspector

Module 4: Securing network communications – part 1

  • Amazon VPC security considerations
  • Responding to compromised instances
  • Elastic Load Balancing
  • AWS Certificate Manager (ACM)

Module 5: Data security

  • Data protection strategies
  • Encryption on AWS
  • Protecting data at rest with Amazon S3, Amazon RDS, and Amazon DynamoDB
  • Protecting archived data with Amazon S3 Glacier

Module 6: Security considerations: hybrid environments

  • AWS site-to-site and client VPN connections
  • AWS Direct Connect (DX)
  • AWS Transit Gateway
  • AWS Storage Gateway

Module 7: Monitoring and collecting logs on AWS

  • Amazon CloudWatch and CloudWatch Logs
  • AWS Config
  • Amazon CloudWatch logs
  • Amazon VPC Flow logs
  • Amazon S3 server access logs
  • ELB access logs
  • Hands-on lab 3 part 1: Server log analysis – log collection

Module 8: Processing Logs on AWS

  • Amazon Kinesis for log processing
  • Amazon Athena for log processing
  • Hands-on lab 3 part 2: Server log analysis – log analysis

Module 9: Securing network communications – part 2

  • Amazon VPC peering
  • Amazon VPC endpoints

Module 10: Out-of-region protection

  • Denial of service threats overview
  • Amazon Route 53
  • AWS WAF
  • Amazon CloudFront
  • AWS Shield
  • AWS Firewall Manager
  • DDoS mitigation on AWS

Module 11: Account management on AWS

  • AWS Organisations
  • AWS Control Tower
  • AWS Single Sign-On (AWS SSO)
  • AWS Directory Service
  • Hands-on lab 4: Federated access with ADFS

Module 12: Security considerations: serverless environments

  • Amazon Cognito
  • Amazon API Gateway
  • Secure messaging with Amazon SQS and Amazon SNS
  • AWS Lambda
  • Hands-on lab 5: Monitor and respond with AWS Lambda and AWS Config

Module 13: Secrets Management on AWS

  • AWS Key Management Service (AWS KMS)
  • AWS CloudHSM
  • AWS Secrets Manager
  • Hands-on lab 6: Using AWS KMS

Module 14: Automating security on AWS

  • AWS CloudFormation
  • AWS Service Catalog
  • Hands-on lab 7: Security automation on AWS with AWS Service Catalog

Module 15: Threat detection and sensitive data monitoring

  • Amazon GuardDuty
  • Amazon Macie

Please note: This is an emerging technology course. Course outline is subject to change as needed.

Target Audience

This course is intended for:

  • Security Engineers
  • Security Architects
  • Information Security professionals

We can also deliver and customise this training course for larger groups – saving your organisation time, money and resources. For more information, please call us at +632 8244 2098 or email [email protected]

Prerequisites

It is recommended that attendees have the following prerequisites:

  • Working knowledge of IT security practices and infrastructure concepts
  • Familiarity with cloud computing concepts
  • Completed AWS Cloud Practitioner Essentials course or web-based training
  • Completed AWS Security Fundamentals web-based training
  • Completed Architecting on AWS course
Print course details

The supply of this course by DDLS is governed by the booking terms and conditions. Please read the terms and conditions carefully before enrolling in this course, as enrolment in the course is conditional on acceptance of these terms and conditions.

Book Your Course

Virtual Classroom
October 6 2021 - October 8 2021

Email Course Outline
Request a Callback

Enter your details below and we'll email you a pdf of the course outline.

Enter your details below and one of our team will give you a call to answer any questions you may have.