Length
3 days

Overview

In this course, you will learn how to efficiently use AWS security services to stay secure and compliant in the AWS cloud.

You will learn recommended security best practices that can be implemented to enhance the security of data and systems. We will explore security features of AWS key services, including compute, storage, networking, and database services. We will also consider common security control objectives and regulatory compliance standards and examine use cases for running regulated workloads on AWS across different verticals, globally.

You will learn how to leverage AWS services and tools for automation and continuous monitoring – taking your security operations to the next level.

This course is delivered through a mix of instructor-led training (ILT), hands-on labs, and group exercises.

Key Topics

Detailed Info
  • Entry points on AWS
  • Security considerations for Web Application environments
  • Securing network communications inside the Amazon VPC
  • Application security with incident response
  • Data security with incident response
  • Security considerations for a hybrid environment
  • AWS monitoring and log collecting
  • Processing logs on AWS
  • Protecting against threats outside of the Amazon VPC
  • Account management on AWS
  • Security considerations for a serverless environment
  • Secrets management on AWS
  • Automating security and incident response on AWS
  • Threat detection and sensitive data monitoring
Skills Gained
Key Topics
Target Audience
Prerequisites

Skills Gained

In this course, participants will learn how to:

  • Assimilate and leverage the AWS shared security responsibility model
  • Manage user identity and access management in the AWS Cloud
  • Use AWS security services such as AWS Identity and Access Management (IAM), Amazon Virtual Private Cloud (Amazon VPC), AWS Config, AWS CloudTrail, AWS Key Management Service (AWS KMS), AWS CloudHSM, and AWS Trusted Advisor
  • Implement better security controls for your resources in the AWS Cloud
  • Manage and audit your AWS resources from a security perspective
  • Monitor and log access and usage of AWS compute, storage, networking, and database services
  • Assimilate and leverage the AWS shared compliance responsibility model
  • Identify AWS services and tools to help automate, monitor, and manage security operations on AWS
  • Perform security incident management in the AWS Cloud

Key Topics

Day 1

  • Entry points on AWS
  • Security considerations for Web Application environments
  • Securing network communications inside the Amazon VPC
  • Application security with incident response

Day 2

  • Data security with incident response
  • Security considerations for a hybrid environment
  • AWS monitoring and log collecting
  • Processing logs on AWS
  • Protecting against threats outside of the Amazon VPC

Day 3

  • Account management on AWS
  • Security considerations for a serverless environment
  • Secrets management on AWS
  • Automating security and incident response on AWS
  • Threat detection and sensitive data monitoring

Please note: This is an emerging technology course. Course outline is subject to change as needed.

Target Audience

This course is intended for:

  • Security Engineers
  • Security Architects
  • Security Analysts
  • Security Auditors
  • Individuals who are responsible for governing, auditing, and testing an organisation’s IT infrastructure, and ensuring conformity of the infrastructure to security, risk, and compliance guidelines

We can also deliver and customise this training course for larger groups – saving your organisation time, money and resources. For more information, please contact us on 1800 853 276.

Prerequisites

We recommend that attendees of this course have the following prerequisites:

  • Architecting on AWS course
  • Complete the AWS Cloud Practitioner Essentials web-based training
  • Complete the AWS Security Fundamentals web-based training
  • Experience with governance, risk, and compliance regulations and control objectives
  • Working knowledge of IT security practices
  • Working knowledge of IT infrastructure concepts
  • Familiarity with cloud computing concepts
Print course details

The supply of this course by DDLS is governed by the booking terms and conditions. Please read the terms and conditions carefully before enrolling in this course, as enrolment in the course is conditional on acceptance of these terms and conditions.

Request Course Information

You don't appear to have Javascript enabled, our contact forms & booking process unfortunately requires it.

If you'd like more information, or to book a course please email us

Email Course Outline
Request a Callback

Enter your details below and we'll email you a pdf of the course outline.

Enter your details below and one of our team will give you a call to answer any questions you may have.