Module 1: Security on AWS
Module 2: Identifying Entry Points on AWS
Module 3: Security Considerations: Web Application Environments
Module 4: Application Security
Module 5: Data Security
Module 6: Securing Network Communications
Module 7: Monitoring and Collecting Logs on AWS
Module 8: Processing Logs on AWS
Module 9: Security Considerations: Hybrid Environments
Module 10: Out-Of-Region Protection
Module 11: Security Considerations: Serverless Environments
Module 12: Threat Detection and Investigation
Module 13: Secrets Management on AWS
Module 14: Automation and Security by Design
Module 15: Account Management and Provisioning on AWS
Day 4: AWS Jam Day
Consists of the following modules
AWS JAM Day will be featured on the final 4th day of this course, as a gamified event where you will be split into teams to compete in a series of best practice challenges based on concepts covered in the course. In addition to the hands-on labs of the ILT courses, an additional day of curated and instructor-facilitated challenges allows learners to use AWS Jam to address real-world scenarios, representing common operational and troubleshooting tasks relevant for your job role. You will be able to apply your knowledge in a safe and real AWS environment and score points if you solve the challenge correctly. The aim of an AWS Jam is to develop, improve, and validate your skills in the AWS cloud and get ready to use your practical skills when you are back on your daily job.
This course prepares you to achieve the following official AWS Certification:
AWS Certified Security - Specialty.
This course comes in 4 instructor-led full day sessions with the instructor supervising the participants live. Each course consits of theory parts with live demos and practical lab exercises. The course can be attended virtually via Zoom. Please also refer to each course's description for specific details regarding the prerequisites and the covered topics.
The last day of the course is an AWS JAM: Transform your theoretical skills into practical doing by solving real-word problems in a sandbox environment.
This course is intended for the following job roles:
The training is carried out in cooperation with an authorized training partner.
For the purpose of implementation, participant data will be transferred to the training partner and the training partner assumes responsibility for the processing of these data.