Security is a concern for both customers in the cloud, and those considering cloud adoption. An increase in cyberattacks and data leaks remains top of mind for most industry personnel. The Security Engineering on AWS course addresses these concerns by helping you better understand how to interact and build with Amazon Web Services (AWS) in a secure way. In this course, you will learn about managing identities and roles, managing and provisioning accounts, and monitoring API activity for anomalies. You will also learn about how to protect data stored on AWS. The course explores how you can generate, collect, and monitor logs to help identify security incidents. Finally, you will review detecting and investigating security incidents with AWS services.
Course Objectives
In this course, you learn how to:
- Understand AWS cloud security based on the Confidentiality, Integrity, and Availability (CIA) triad.
- Create and analyze authentication and authorization with AWS Identity and Access Management (IAM).
- Manage and provision accounts on AWS with appropriate AWS services.
- Identify how to manage secrets using AWS services.
- Monitor sensitive information and protect data through encryption and access controls.
- Identify AWS services that address attacks from external sources.
- Monitor, generate, and collect logs.
- Identify indicators of security incidents.
- Identify how to investigate and mitigate threats using AWS services.
Intended Audience
This course is intended for:
- Security engineers
- Security architects
- Cloud architects
Prerequisites
We recommend that attendees of this course have:
- Completion of the following courses:
- Â Â Â AWS Security Essentials or AWS Security Fundamentals, 2nd edition
- Â Â Â Architecting on AWS
- Working knowledge of IT security practices and infrastructure concepts
- Familiarity with the AWS Cloud
Course Outline
- Course Overview
- Module 1 – Security Overview
- Module 2 – Access and Authorizations on AWS
- Module 3 – Account Management
- Module 4 – Managing Key and Secrets on AWS
- Module 5 – Data Security
- Module 6 – Infrastructure and Edge Protection
- Module 7 – Logging and Monitoring
- Module 8 – Responding to Threats