CourseInfo | SimpliTrain

Security Engineering on AWS

Learning plan iconE-Learning

Description

This course demonstrates how to efficiently use AWS security services to stay secure in the AWS Cloud. The course focuses on the security practices that AWS recommends for enhancing the security of your data and systems in the cloud. It highlights the security features of AWS key services including compute, storage, networking, and database services. You will also learn how to leverage AWS services and tools for automation, continuous monitoring and logging, and responding to security incidents

This course demonstrates how to efficiently use AWS security services to stay secure in the AWS Cloud. The course focuses on the security practices that AWS recommends for enhancing the security of your data and systems in the cloud. It highlights the security features of AWS key services including compute, storage, networking, and database services. You will also learn how to leverage AWS services and tools for automation, continuous monitoring and logging, and responding to security incidents

In this course, you will learn to: Identify security benefits and responsibilities of using the AWS Cloud Build secure application infrastructures Protect applications and data from common security threats Perform and automate security checks Configure authentication and permissions for applications and resources Monitor AWS resources and respond to incidents Capture and process logs

This course is intended for: Security engineers Security architects Information security professionals

Lesson Id Title Description
1 Module 1: Security On AWS Security in the AWS cloud
AWS Shared Responsibility Model
Incident response overview
DevOps with Security Engineering
2 Module 2: Identifying Entry Points on AWS Identify the different ways to access the AWS platform
Understanding IAM policies
IAM Permissions Boundary
IAM Access Analyzer
Multi-factor authentication
AWS CloudTrail
Lab 01: Cross-account access
3 Module 3: Security Considerations: Web Application Environments Threats in a three-tier architecture
Common threats: user access
Common threats: data access
AWS Trusted Advisor
4 Module 4: Application Security Amazon Machine Images
Amazon Inspector
AWS Systems Manager
Lab 02: Using AWS Systems Manager and Amazon Inspector
5 Module 5: Data Security Data protection strategies
Encryption on AWS
Protecting data at rest with Amazon S3, Amazon RDS, Amazon DynamoDB
Protecting archived data with Amazon S3 Glacier
Amazon S3 Access Analyzer
Amazon S3 Access Points
6 Module 6: Securing Network Communications Amazon VPC security considerations
Amazon VPC Traffic Mirroring
Responding to compromised instances
Elastic Load Balancing
AWS Certificate Manager
7 Module 7: Monitoring and Collecting Logs on AWS Amazon CloudWatch and CloudWatch Logs
AWS Config
Amazon Macie
Amazon VPC Flow Logs
Amazon S3 Server Access Logs
ELB Access Logs
Lab 3: Monitor and Respond with AWS Config
8 Module 8: Processing Logs on AWS Amazon Kinesis
Amazon Athena
Lab 4: Web Server Log Analysis
9 Module 9: Security Considerations: Hybrid Environments AWS Site-to-Site and Client VPN connections
AWS Direct Connect
AWS Transit Gateway
10 Module 10: Out-Of-Region Protection Amazon Route 53
AWS WAF
Amazon CloudFront
AWS Shield
AWS Firewall Manager
DDoS mitigation on AWS
11 Module 11: Security Considerations: Serverless Environments Amazon Cognito
Amazon API Gateway
AWS Lambda
12 Module 12: Threat Detection and Investigation Amazon GuardDuty
AWS Security Hub
Amazon Detective
13 Module 13: Secrets Management on AWS AWS KMS
AWS CloudHSM
AWS Secrets Manager
Lab 05: Using AWS KMS
14 Module 14: Automation and Security by Design AWS CloudFormation
AWS Service Catalog
Lab 06: Security automation on AWS with AWS Service Catalog
15 Module 15: Account Management and Provisioning on AWS AWS Organizations
AWS Control Tower
AWS SSO
AWS Directory Service
Lab 07: Federated Access with ADFS
Self-Paced

Free

Enroll icon
This course includes: :
Full lifetime access