Featured resource
pluralsight tech forecast
2025 Tech Forecast

Which technologies will dominate in 2025? And what skills do you need to keep up?

Check it out
Hamburger Icon

AWS Authorized Training Course - AWS Security Essentials

Course Summary

This course covers fundamental Amazon Web Services (AWS) security concepts, including AWS access control, data encryption methods, and how to secure network access to your AWS infrastructure. Based on the AWS Shared Responsibility Model, you learn your responsibilities related to implementing security in the AWS Cloud and which security-oriented services are available to you. You also learn why and how the security services help meet the security needs of your organization.

Prerequisites:

Working knowledge of IT security practices and infrastructure concepts, familiarity with cloud computing concepts

THIS COURSE IS NOT ELIGIBLE FOR TRAINING BUNDLES.

Purpose
To demonstrate the fundamental AWS cloud security concepts.
Audience
Security IT business-level professionals interested in cloud security practices and Security professionals with minimal working knowledge of AWS
Role
Software Developer - Technical Manager
Skill Level
Introduction
Style
Presentations | Hands-on Labs
Duration
1 Day
Related Technologies
Cloud Computing Training | AWS

 

Productivity Objectives
  • Identify security benefits and responsibilities of using the AWS Cloud
  • Describe the access control and management features of AWS
  • Explain the available methods for encrypting data at rest and in transit.
  • Describe how to secure network access to your AWS resources
  • Determine which AWS services can be used for monitoring and incident response

What You'll Learn:

In the AWS Authorized Training Course - AWS Security Essentials, you'll learn:

Course Introduction

  • Module 1: Exploring the Security Pillar    
    • AWS Well-Architected Framework: Security Pillar
  • Module 2: Security of the Cloud
    • Shared responsibility model
    • AWS Global Infrastructure
    • Compliance and governance
  • Module 3: Identity and Access Management
    • Identity and access management
    • Data access and protection essentials
    • Lab 1: Introduction to Security Policies
  • Module 4: Protecting Infrastructure and Data
    • Protecting your network infrastructure
    • Edge Security
    • DDoS Mitigation
    • Protecting compute resources
    • Lab 2: Securing VPC Resources with Security Groups
  • Module 5: Detection and Response
    • Monitoring and detective controls
    • Incident response essentials
  • Module 6: Course Wrap-Up
    • Course review
“I appreciated the instructor's technique of writing live code examples rather than using fixed slide decks to present the material.”

VMware

Dive in and learn more

When transforming your workforce, it's important to have expert advice and tailored solutions. We can help. Tell us your unique needs and we'll explore ways to address them.

Let's chat

By filling out this form and clicking submit, you acknowledge our privacy policy.