Security Engineering on AWS

Price
$2,025.00
Duration
 3 Days
Delivery Methods
 VILT    Private Group

This course demonstrates how to efficiently use AWS security services to stay secure in the AWS Cloud. The course focuses on the security practices that AWS recommends for enhancing the security of your data and systems in the cloud. The course highlights the security features of AWS key services including compute, storage, networking, and database services. You will also learn how to leverage AWS services and tools for automation, continuous monitoring and logging, and responding to security incidents.

 

Upcoming Class Dates and Times

Oct 27  - Oct 29, 2020
9:00AM - 5:00PM Central
3 Days
Virtual Instructor Led
 GTR
Nov 04  - Nov 06, 2020
11:00AM - 7:00PM Central
3 Days
Virtual Instructor Led
Nov 10  - Nov 12, 2020
8:00AM - 4:00PM Central
3 Days
Virtual Instructor Led
 GTR
Nov 23  - Nov 25, 2020
11:00AM - 7:00PM Central
3 Days
Virtual Instructor Led
Dec 15  - Dec 17, 2020
9:00AM - 5:00PM Central
3 Days
Virtual Instructor Led
Dec 22  - Dec 24, 2020
8:00AM - 4:00PM Central
3 Days
Virtual Instructor Led
Dec 28  - Dec 30, 2020
8:00AM - 4:00PM Central
3 Days
Virtual Instructor Led
 GTR

Who Should Attend

  • Security engineers
  • Security architects
  • Security operations
  • Information security

Course Objectives

  • Assimilate and leverage the AWS shared security responsibility model
  • Architect and build AWS application infrastructures that are protected against the most common security threats
  • Protect data at rest and in transit with encryption
  • Apply security checks and analyses in an automated and reproducible manner
  • Configure authentication for resources and applications in the AWS Cloud
  • Gain insight into events by capturing, monitoring, processing, and analyzing logs
  • Identify and mitigate incoming threats against applications and data
  • Perform security assessments to ensure that common vulnerabilities are patched and security best practices are applied

Agenda

1 - Day One
  • Identifying Entry Points on AWS
  • Security Considerations: Web Application Environments
  • Application Security
  • Securing Networking Communications – Part 1
2 - Day Two
  • Data Security
  • Security Considerations: Hybrid Environments
  • Monitoring and Collecting Logs on AWS
  • Processing Logs on AWS
  • Securing Networking Communications – Part 2
  • Out-Of-Region Protection
3 - Day Three
  • Account Management on AWS
  • Security Considerations: Serverless Environments
  • Secrets Management on AWS
  • Automating Security on AWS
  • Threat Detection and Sensitive Data Monitoring