Course Name |
Hours |
List Price |
Content |
AWS Security Best Practices |
7.00 |
$675.00 |
|
Description: In this course, you will cover an overview of some of the industry best practices for using AWS security and control types. Currently, the average cost of a security breach can be upwards of 4 million. This course helps you understand your responsibilities while providing valuable guidelines for how to keep your workload safe and secure. You will learn how to secure your network infrastructure using sound design options. You will also learn how you can harden your compute resources and manage them securely. Finally, by understanding AWS monitoring and alerting, you can detect and alert on suspicious events to help you quickly begin the response process in the event of a potential compromise.
# of Days:
Setting:
|
AWS Security Essentials |
7.00 |
$675.00 |
|
Description: This course covers fundamental AWS cloud security concepts, including AWS access control, data encryption methods, and how network access to your AWS infrastructure can be secured. Based on the AWS Shared Security Model, you learn where you are responsible for implementing security in the AWS Cloud and what security-oriented services are available to you and why and how the security services can help meet the security needs of your organization.
Skills Gained
In this course, you will learn how to:
Assimilate Identify security benefits and responsibilities of using the AWS Cloud
Describe the access control and management features of AWS
Explain the available methods for providing encryption of data in transit and data at rest when storing your data in AWS.
Describe how to secure network access to your AWS resources
Determine which AWS services can be used for monitoring and incident response
Who Can Benefit
This course is intended for:
Security IT business-level professionals interested in cloud security practices
Security professionals with minimal to no working knowledge of AWS
# of Days:
Setting:
|
AWS Security Governance at Scale |
7.00 |
$675.00 |
|
Description: In this course, you will learn how security is foundational to AWS. Governance at scale is a new concept for automating cloud governance that can help companies retire manual processes in account management, budget enforcement, and security and compliance. By automating common challenges, companies can scale without inhibiting agility, speed, or innovation. In addition, they can provide decision makers with the visibility, control, and governance necessary to protect sensitive data and systems. In this course, you will learn how to facilitate developer speed and agility, and incorporate preventive and detective controls. By the end of this course, you will be able to apply governance best practices.
# of Days:
Setting:
|
Security Engineering on AWS |
21.00 |
$2,025.00 |
|
Description: This course demonstrates how to efficiently use AWS security services to stay secure in the AWS Cloud. The course focuses on the security practices that AWS recommends for enhancing the security of your data and systems in the cloud. The course highlights the security features of AWS key services including compute, storage, networking, and database services. You will also learn how to leverage AWS services and tools for automation, continuous monitoring and logging, and responding to security incidents.
Skills Gained
This course teaches you how to:
Assimilate and leverage the AWS shared security responsibility model
Architect and build AWS application infrastructures that are protected against the most common security threats
Protect data at rest and in transit with encryption
Apply security checks and analyses in an automated and reproducible manner
Configure authentication for resources and applications in the AWS Cloud
Gain insight into events by capturing, monitoring, processing, and analyzing logs
Identify and mitigate incoming threats against applications and data
Perform security assessments to ensure that common vulnerabilities are patched and security best practices are applied
Who Can Benefit
This course is intended for:
Security engineers
Security architects
Security operations
Information security
# of Days:
Setting:
|