Security is a concern for both customers in the cloud, and those considering cloud adoption. An increase in cyberattacks and data leaks remains top of mind for most industry personnel. The Security Engineering on AWS course addresses these concerns by helping you better understand how to interact and build with Amazon Web Services (AWS) in a secure way. In this course, you will learn about managing identities and roles, managing and provisioning accounts, and monitoring API activity for anomalies. You will also learn about how to protect data stored on AWS. The course explores how you can generate, collect, and monitor logs to help identify security incidents. Finally, you will review detecting and investigating security incidents with AWS services.
Day 1
Module 1: Security Overview and Review
Module 2: Securing Entry Points on AWS
Module 3: Account Management and Provisioning on AWS
Day 2
Module 4: Secrets Management on AWS
Module 5: Data Security
Module 6: Infrastructure Edge Protection
Day 3
Module 7: Monitoring and Collecting Logs on AWS
Module 8: Responding to Threats
Security is a concern for both customers in the cloud, and those considering cloud adoption. An increase in cyberattacks and data leaks remains top of mind for most industry personnel. The Security Engineering on AWS course addresses these concerns by helping you better understand how to interact and build with Amazon Web Services (AWS) in a secure way. In this course, you will learn about managing identities and roles, managing and provisioning accounts, and monitoring API activity for anomalies. You will also learn about how to protect data stored on AWS. The course explores how you can generate, collect, and monitor logs to help identify security incidents. Finally, you will review detecting and investigating security incidents with AWS services.
Day 1
Module 1: Security Overview and Review
Module 2: Securing Entry Points on AWS
Module 3: Account Management and Provisioning on AWS
Day 2
Module 4: Secrets Management on AWS
Module 5: Data Security
Module 6: Infrastructure Edge Protection
Day 3
Module 7: Monitoring and Collecting Logs on AWS
Module 8: Responding to Threats