AWS Foundations: Securing Your AWS Cloud

Go to class
Write Review

AWS Foundations: Securing Your AWS Cloud provided by AWS Skill Builder is a comprehensive online course, which lasts for Less than 1 hour of material. Upon completion of the course, you can receive an e-certificate from AWS Skill Builder. The course is taught in Englishand is Free Certificate. Visit the course page at AWS Skill Builder for detailed price information.

Overview
  • Whether you are thinking of migrating to the AWS Cloud or already have a workload running on AWS, securing your data and resources should be at the top of the list. This course introduces several AWS services that you can use to improve your current security posture. The course covers the different security design principles that will help you to plan your security approach in the AWS Cloud and provides information on resources you can use to further your knowledge around security on AWS.

    • Course level: Fundamental
    • Delivery method: Presentation
    • Duration: 50 minutes


    Course objectives

    In this course, you will learn to:

    • Identify security benefits and responsibilities of using the AWS Cloud
    • Describe the different design principles for security in the cloud
    • Determine which AWS services you can use to improve your security posture


    Intended audience

    This course is intended for:

    • IT business-level professionals interested in cloud security practices
    • Security professionals with minimal working knowledge of AWS


    Prerequisites

    We recommend that attendees of this course have:

    • Working knowledge of IT security practices and infrastructure concepts
    • Familiarity with cloud computing concepts


    Course outline

    Section 1: Security Design Principles

    • Security design principles in the AWS Cloud
    • AWS shared responsibility model


    Section 2: Your Security Posture

    • Authentication
    • Authorization
    • Monitoring
    • Auditing
    • Encryption
    • Data path security


    Section 3: Next Steps

    • Recommendations for other security training
    • Information on the security Ramp-Up Guide