Security engineering on AWS

Course Description

This course describes how to efficiently utilize AWS security services to stay protected in the AWS Cloud. The course emphasizes the security practices that AWS recommends for increasing the security of your data & systems in the cloud. It highlights the security components of AWS key services, including computing, storage, networking, & database services. Professionals will also learn how to leverage AWS services & tools for automation, continuous monitoring & logging, & responding to security incidents.

Prerequisites

We recommend that attendees of this course have-

Target Audience

This course is intended for security architects, security engineers, & information security professionals.

Course Objectives

  • Identify security benefits & responsibilities of using the AWS Cloud
  • Build secure application infrastructures
  • Protect applications & data from common security threats
  • Perform & automate security checks
  • Configure authentication & permissions for applications & resources
  • Monitor AWS resources & respond to incidents
  • Capture & process logs
  • Create & configure automated & repeatable deployments with tools such as AMIs & AWS CloudFormation

Content Outline

  • Security in the AWS cloud
  • AWS Shared Responsibility Model
  • Incident response overview
  • DevOps with Security Engineering
  • Recognize the different ways to access the AWS platform
  • Understanding IAM policies
  • IAM Permissions Boundary
  • IAM Access Analyzer
  • Multi-factor authentication
  • AWS CloudTrail
  • Lab 1- Cross-account access
  • Threats in a three-tier architecture
  • Common threats- user access
  • Common threats- data access
  • AWS Trusted Advisor
  • Amazon Machine Images
  • Amazon Inspector
  • AWS Systems Manager
  • Lab 2- Using AWS Systems Manager & Amazon Inspector
  • Data protection strategies
  • Encryption on AWS
  • Protecting data at rest with Amazon S3, Amazon RDS, Amazon DynamoDB
  • Protecting archived data with Amazon S3 Glacier
  • Amazon S3 Access Analyzer
  • Amazon S3 Access Points
  • Amazon VPC security considerations
  • Amazon VPC Traffic Mirroring
  • Responding to compromised instances
  • Elastic Load Balancing
  • AWS Certificate Manager
  • Amazon CloudWatch & CloudWatch Logs
  • AWS Config
  • Amazon Macie
  • Amazon VPC Flow Logs
  • Amazon S3 Server Access Logs
  • ELB Access Logs
  • Lab 3- Monitor & Respond with AWS Config
  • Amazon Kinesis
  • Amazon Athena
  • Lab 4- Web Server Log Analysis
  • AWS Site-to-Site & Client VPN connections
  • AWS Direct Connect
  • AWS Transit Gateway
  • Amazon Route 53
  • AWS WAF
  • Amazon CloudFront
  • AWS Shield
  • AWS Firewall Manager
  • DDoS mitigation on AWS
  • Amazon Cognito
  • Amazon API Gateway
  • AWS Lambda
  • Amazon GuardDuty
  • AWS Security Hub
  • Amazon Detective
  • AWS KMS
  • AWS CloudHSM
  • AWS Secrets Manager
  • Lab 5- Using AWS KMS
  • AWS CloudFormation
  • AWS Service Catalog
  • Lab 6- Security automation on AWS with AWS Service Catalog
  • AWS Organizations
  • AWS Control Tower
  • AWS SSO
  • AWS Directory Service
  • Lab 7- Federated Access with ADFS

FAQs

AWS provides security-specific tools & features across network security, configuration management, access control, & data encryption.

Scale Securely with Superior Visibility & Control. With AWS, you manage where your data is collected, who can access it, & what resources your organization is consuming at any given moment.

Automate & Reduce Risk with Deeply Integrated Services. ...

Build with the Highest Standards for Privacy & Data Security.

 

A data lake is a centralized & secured repository that collects all your data, both in its original form & prepared for analysis.

There are three methods of data storage, namely- –

  • Object storage
  • File storage
  • Block storage

EC2 is a service that enables business clients to run application programs in the computing environment.

AWS security provides opportunities to protect the data, check out security-related activity & receive automated responses.

Radiant believes in a practical & creative approach to training & development, which distinguishes it from other training & developmental platforms. Moreover, training courses are undertaken by some of the experts who have a vast range of experience in their domain.

Radiant team of experts will be available at e-mail support@radianttechlearning.com to answer your technical queries even after the training program.

Yes, Radiant will provide you most updated, high, value & relevant real-time projects & case studies in each training program.

Technical issues are unpredictable & might occur with us as well. Participants have to ensure that they have access to the required configuration with good internet speed.

Radiant Techlearning offers training programs on weekdays, weekends & combination of weekdays & weekends. We provide you with complete liberty to choose the schedule that suits your needs.

Send a Message.


  • Enroll