AWS Security Essentials
This course covers fundamental Amazon Web Services (AWS) security concepts, including AWS access control, data encryption methods, and how to secure network access to your AWS infrastructure. Based on the AWS Shared Responsibility Model, you learn your responsibilities related to implementing security in the AWS Cloud and which security-oriented services are available to you. You also learn why and how the security services help meet the security needs of your organization.
What you will learn
- Identify security benefits and responsibilities of using the AWS Cloud.
- Describe the access control and management features of AWS.
- Explain the available methods for encrypting data at rest and in transit.
- Describe how to secure network access to your AWS resources.
- Determine which AWS services can be used for monitoring and incident response.
Prerequisites
- Working knowledge of IT security practices and infrastructure concepts and familiarity with cloud computing concepts.
Target audience
- Security IT business-level professionals interested in cloud security practices, Security professionals with minimal to no working knowledge of AWS
Training Program
7 modules to master the fundamentals
Topics covered
- →AWS Well-Architected Framework: Security Pillar
Topics covered
- →Shared responsibility model
- →AWS Global Infrastructure
- →Compliance and governance
Topics covered
- →Identity and access management
- →Data access and protection essentials
Activities
Lab 1: Introduction to Security Policies
Topics covered
- →Protecting your network infrastructure
- →Edge Security
- →DDoS Mitigation
- →Protecting compute resources
Activities
Lab 2: Securing VPC Resources with Security Groups
Topics covered
- →Monitoring and detective controls
- →Incident response essentials
Topics covered
- →Course review
Quality Process
SFEIR Institute's commitment: an excellence approach to ensure the quality and success of all our training programs. Learn more about our quality approach
- Lectures / Theoretical Slides — Presentation of concepts using visual aids (PowerPoint, PDF).
- Technical Demonstration (Demos) — The instructor performs a task or procedure while students observe.
- Guided Labs — Guided practical exercises on software, hardware, or technical environments.
The achievement of training objectives is evaluated at multiple levels to ensure quality:
- Continuous Knowledge Assessment : Verification of knowledge throughout the training via participatory methods (quizzes, practical exercises, case studies) under instructor supervision.
- Progress Measurement : Comparative self-assessment system including an initial diagnostic to determine the starting level, followed by a final evaluation to validate skills development.
- Quality Evaluation : End-of-session satisfaction questionnaire to measure the relevance and effectiveness of the training as perceived by participants.
Train multiple employees
- Volume discounts (multiple seats)
- Private or custom session
- On-site or remote