Learn how to efficiently use AWS security services to stay secure and compliant in the AWS cloud. The course focuses on the AWS-recommended security best practices that you can implement to enhance the security of your data and systems in the cloud. The course highlights the security features of AWS key services including compute, storage, networking, and database services. This course also refers to the common security control objectives and regulatory compliance standards and examines use cases for running regulated workloads on AWS across different verticals, globally. You will also learn how to leverage AWS services and tools for automation and continuous monitoring?taking your security operations to the next level.Skills Gained Learn how to efficiently use AWS security services to stay secure and compliant in the AWS cloud. The course focuses on the AWS-recommended security best practices that you can implement to enhance the security of your data and systems in the cloud. The course highlights the security features of AWS key services including compute, storage, networking, and database services. This course also refers to the common security control objectives and regulatory compliance standards and examines use cases for running regulated workloads on AWS across different verticals, globally. You will also learn how to leverage AWS services and tools for automation and continuous monitoring?taking your security operations to the next level. Learn how to efficiently use AWS security services to stay secure and compliant in the AWS cloud. The course focuses on the AWS-recommended security best practices that you can implement to enhance the security of your data and systems in the cloud. The course highlights the security features of AWS key services including compute, storage, networking, and database services. This course also refers to the common security control objectives and regulatory compliance standards and examines use cases for running regulated workloads on AWS across different verticals, globally. You will also learn how to leverage AWS services and tools for automation and continuous monitoring?taking your security operations to the next level. Skills Gained
This course teaches you how to:
Assimilate and leverage the AWS shared security responsibility model. Assimilate and leverage the AWS shared security responsibility model.
Mange user identity and access management in the AWS cloud. Mange user identity and access management in the AWS cloud.
Use AWS security services such as AWS Identity and Access Management, Amazon Virtual Private Cloud, AWS Config, AWS CloudTrail, AWS Key Management Service, AWS CloudHSM, and AWS Trusted Advisor. Use AWS security services such as AWS Identity and Access Management, Amazon Virtual Private Cloud, AWS Config, AWS CloudTrail, AWS Key Management Service, AWS CloudHSM, and AWS Trusted Advisor.
Implement better security controls for your resources in the AWS cloud. Implement better security controls for your resources in the AWS cloud.
Manage and audit your AWS resources from a security perspective. Manage and audit your AWS resources from a security perspective.
Monitor and log access and usage of AWS compute, storage, networking, and database services. Monitor and log access and usage of AWS compute, storage, networking, and database services.
Assimilate and leverage the AWS shared compliance responsibility model. Assimilate and leverage the AWS shared compliance responsibility model.
Identify AWS services and tools to help automate, monitor, and manage security operations on AWS. Identify AWS services and tools to help automate, monitor, and manage security operations on AWS.
Perform security incident management in the AWS cloud. Perform security incident management in the AWS cloud. Who Can Benefit Who Can Benefit
This course is intended for:
Security engineers Security engineers
Security architects Security architects
Security analysts Security analysts
Security auditors Security auditors
Individuals who are responsible for governing, auditing, and testing an organization?s IT infrastructure, and ensuring conformity of the infrastructure to security, risk, and compliance guidelines Individuals who are responsible for governing, auditing, and testing an organization?s IT infrastructure, and ensuring conformity of the infrastructure to security, risk, and compliance guidelines