Learning Objectives
The Objectives of this course are as follows:
- Identify security benefits and responsibilities of using the AWS Cloud.
- Describe the access control and management features of AWS.
- Explain the available methods for encrypting data at rest and in transit.
- Describe how to secure network access to your AWS resources.
- Determine which AWS services can be used for monitoring and incident response.
Target Audience
The course is intended for:
- Security professionals with minimal to no working knowledge of AWS
- Security IT business-level professionals interested in cloud security practices
Prerequisite Experience
- Working knowledge of IT security practices and infrastructure concepts and familiarity with cloud computing concepts (Recommended)
Course Outline
Exploring the Security Pillar
- AWS Well-Architected Framework: Security Pillar
- Shared responsibility model
- AWS Global Infrastructure
- Compliance and governance
Identity and Access Management
- Identity and access management
- Data access and protection essentials
- Lab 1: Introduction to Security Policies
Protecting Infrastructure and Data
- Protecting your network infrastructure
- Edge Security
- DDoS Mitigation
- Protecting compute resources
- Lab 2: Securing VPC Resources with Security Groups
- Monitoring and detective controls
- Incident response essentials