-
This course covers fundamental Amazon Web Services (AWS) security concepts, including AWS access control, data encryption methods, and how to secure network access to your AWS infrastructure. Based on the AWS Shared Responsibility Model, you learn your responsibilities related to implementing security in the AWS Cloud and which security-oriented services are available to you. You also learn why and how the security services help meet the security needs of your organization.
-
Course Contents
-
- Module 1: Exploring the Security Pillar
- Module 2: Security of the Cloud
- Module 3: Identity and Access Management
- Module 4: Protecting Infrastructure and Data
- Module 5: Detection and Response
- Module 6: Course Wrap-Up
You have access to the labs for another 14 days after the course. This way you can repeat exercises or deepen them individually.
-
Target Group
-
- IT business-level professionals interested in cloud security practices
- Security professionals with minimal working knowledge of AWS
-
Knowledge Prerequisites
-
- Working knowledge of IT security practices and infrastructure concepts
- Familiarity with cloud computing concepts
Course Introduction |
Module 1: Exploring the Security Pillar |
AWS Well-Architected Framework: Security Pillar |
Module 2: Security of the Cloud |
Shared responsibility model |
AWS Global Infrastructure |
Compliance and governance |
Module 3: Identity and Access Management |
Identity and access management |
Data access and protection essentials |
Lab 1: Introduction to Security Policies |
Module 4: Protecting Infrastructure and Data |
Protecting your network infrastructure |
Edge Security |
DDoS Mitigation |
Protecting compute resources |
Lab 2: Securing VPC Resources with Security Groups |
Module 5: Detection and Response |
Monitoring and detective controls |
Incident response essentials |
Module 6: Course Wrap-Up |
Course review |
-
Classroom training
- Do you prefer the classic training method? A course in one of our Training Centers, with a competent trainer and the direct exchange between all course participants? Then you should book one of our classroom training dates!
-
Hybrid training
- Hybrid training means that online participants can additionally attend a classroom course. The dynamics of a real seminar are maintained, and the online participants are able to benefit from that. Online participants of a hybrid course use a collaboration platform, such as WebEx Training Center or Saba Meeting. To do this, a PC with browser and Internet access is required, as well as a headset and ideally a Web cam. In the seminar room, we use specially developed and customized audio- and video-technologies. This makes sure that the communication between all persons involved works in a convenient and fault-free way.
-
Online training
- You wish to attend a course in online mode? We offer you online course dates for this course topic. To attend these seminars, you need to have a PC with Internet access (minimum data rate 1Mbps), a headset when working via VoIP and optionally a camera. For further information and technical recommendations, please refer to.
-
Tailor-made courses
-
You need a special course for your team? In addition to our standard offer, we will also support you in creating your customized courses, which precisely meet your individual demands. We will be glad to consult you and create an individual offer for you.

-
This course covers fundamental Amazon Web Services (AWS) security concepts, including AWS access control, data encryption methods, and how to secure network access to your AWS infrastructure. Based on the AWS Shared Responsibility Model, you learn your responsibilities related to implementing security in the AWS Cloud and which security-oriented services are available to you. You also learn why and how the security services help meet the security needs of your organization.
-
Course Contents
-
- Module 1: Exploring the Security Pillar
- Module 2: Security of the Cloud
- Module 3: Identity and Access Management
- Module 4: Protecting Infrastructure and Data
- Module 5: Detection and Response
- Module 6: Course Wrap-Up
You have access to the labs for another 14 days after the course. This way you can repeat exercises or deepen them individually.
-
Target Group
-
- IT business-level professionals interested in cloud security practices
- Security professionals with minimal working knowledge of AWS
-
Knowledge Prerequisites
-
- Working knowledge of IT security practices and infrastructure concepts
- Familiarity with cloud computing concepts
Course Introduction |
Module 1: Exploring the Security Pillar |
AWS Well-Architected Framework: Security Pillar |
Module 2: Security of the Cloud |
Shared responsibility model |
AWS Global Infrastructure |
Compliance and governance |
Module 3: Identity and Access Management |
Identity and access management |
Data access and protection essentials |
Lab 1: Introduction to Security Policies |
Module 4: Protecting Infrastructure and Data |
Protecting your network infrastructure |
Edge Security |
DDoS Mitigation |
Protecting compute resources |
Lab 2: Securing VPC Resources with Security Groups |
Module 5: Detection and Response |
Monitoring and detective controls |
Incident response essentials |
Module 6: Course Wrap-Up |
Course review |
-
Classroom training
- Do you prefer the classic training method? A course in one of our Training Centers, with a competent trainer and the direct exchange between all course participants? Then you should book one of our classroom training dates!
-
Hybrid training
- Hybrid training means that online participants can additionally attend a classroom course. The dynamics of a real seminar are maintained, and the online participants are able to benefit from that. Online participants of a hybrid course use a collaboration platform, such as WebEx Training Center or Saba Meeting. To do this, a PC with browser and Internet access is required, as well as a headset and ideally a Web cam. In the seminar room, we use specially developed and customized audio- and video-technologies. This makes sure that the communication between all persons involved works in a convenient and fault-free way.
-
Online training
- You wish to attend a course in online mode? We offer you online course dates for this course topic. To attend these seminars, you need to have a PC with Internet access (minimum data rate 1Mbps), a headset when working via VoIP and optionally a camera. For further information and technical recommendations, please refer to.
-
Tailor-made courses
-
You need a special course for your team? In addition to our standard offer, we will also support you in creating your customized courses, which precisely meet your individual demands. We will be glad to consult you and create an individual offer for you.
