AWS Cloud Security Training
Level
IntermediateDuration
16h / 2 daysDate
Individually arrangedPrice
Individually arrangedAWS Cloud Security Training
Secure management in the AWS cloud is an intensive two-day training aimed at individuals who want to gain practical skills in protecting resources in Amazon Web Services. The training program is 80% practical workshops, during which participants will implement best practices, configure security policies, and monitor their cloud environments securely. The remaining sessions are theoretical, providing solid foundations and context for effectively applying the acquired knowledge in practice. Basic knowledge of the AWS platform and general cybersecurity principles is recommended.
What You Will Learn
- How to implement security policies in AWS according to best practices
- How to effectively monitor and respond to threats in a cloud environment
- How to encrypt data and manage access to critical resources
- How to design and manage secure networks and applications in AWS
Training Program
-
Introduction to AWS Cloud Security
- Overview of AWS Cloud Security concepts
- Shared Responsibility Model
- AWS responsibilities
- Customer responsibilities
- Introduction to AWS Security Hub
- Introduction to AWS Identity and Access Management (IAM)
-
Secure Identity and Access Management
- Creating and managing IAM users and groups
- IAM policies and permissions
- Role-based access control
- Best practices for multi-factor authentication (MFA)
-
Monitoring and Incident Response
- Logging and monitoring with AWS CloudTrail
- Monitoring metrics and logs with Amazon CloudWatch
- Analyzing security events and alerts
- Automating event responses using:
- AWS Lambda
- AWS Step Functions
-
Data Protection in the Cloud
- Data encryption concepts in AWS
- Using AWS Key Management Service (KMS)
- Managing encryption keys
- Backups and data recovery strategies
- Disaster recovery scenarios
-
Network and Application Security
- Implementing firewall rules with:
- AWS Security Groups
- AWS Web Application Firewall (WAF)
- Monitoring network traffic with AWS VPC Flow Logs
- Securing applications hosted on AWS
-
Practical Workshop: Building a Secure AWS Environment
- Threat simulation exercises
- System response analysis
- Creating custom security policy rules
- Applying AWS security best practices in real scenarios