The AWS Certified Security – Specialty course is designed for security professionals to enhance their skills in securing AWS environments. It covers the AWS shared security responsibility model, advanced encryption, and automated security checks. Participants will gain practical experience in configuring secure authentication, analyzing logs, and responding to incidents, preparing them for the AWS Certified Security – Specialty exam.
Instructor
AWS Certified Security - Specialty Training Course
Curriculum
Boost your cloud security skills with AWS Certified Security - Specialty Training. Gain expertise in securing AWS environments & advance your career. Enroll now!
The AWS Certified Security – Specialty course is designed for professionals seeking to advance their knowledge and skills in securing AWS environments. It is aimed at security engineers, architects, and IT security professionals who want to deepen their expertise in AWS security practices.
Course Objectives:
Understand the AWS Shared Security Responsibility Model: Learn how security responsibilities are shared between AWS and customers.
Design Secure Architectures: Create robust security infrastructures to defend against common threats.
Implement Advanced Encryption: Protect data with encryption methods for both data at rest and in transit.
Utilize Automated Security Tools: Employ automated security checks to maintain consistent protection across AWS resources.
Configure Secure Authentication: Set up strong authentication mechanisms to secure access.
Analyze Security Logs: Monitor and interpret logs to identify and respond to security events.
Respond to Security Incidents: Develop strategies for managing and mitigating security incidents.
Course Prerequisites:
To ensure a successful learning experience, participants should have:
Basic Understanding of AWS: Familiarity with AWS Cloud Practitioner essentials or equivalent.
Foundational Knowledge in AWS Security: Understanding of AWS Security fundamentals.
IT Security Practices: Working knowledge of IT security concepts and practices.
Cloud Computing Concepts: Familiarity with cloud computing principles.
Target Audience:
This course is ideal for:
Security Engineers and Architects
Information Security Professionals
Cloud Security Specialists
IT Security Analysts
Cloud Architects and Engineers focused on security
Systems Administrators with security responsibilities
Network Security Professionals
DevOps/DevSecOps Engineers
Security Consultants and Compliance Officers
Cybersecurity Analysts and Technical Auditors
Incident Response Teams in AWS environments
Learning Outcomes:
Upon completion, participants will be able to:
Apply the AWS Shared Security Responsibility Model: Clearly delineate security responsibilities between AWS and the user.
Design Secure AWS Infrastructures: Build security measures into AWS application infrastructures to combat common threats.
Encrypt Data Effectively: Use advanced encryption techniques for data protection.
Automate Security Checks: Implement automated tools for continuous security monitoring and vulnerability management.
Configure Authentication Mechanisms: Set up secure authentication processes to control access to AWS resources.
Monitor and Analyze Logs: Gain insights from logs to understand operational and security events.
Mitigate Security Risks: Identify and address potential security threats to applications and data.
Conduct Security Assessments: Evaluate vulnerabilities and ensure adherence to security best practices.
The AWS Certified Security – Specialty course is designed for professionals seeking to advance their knowledge and skills in securing AWS environments. It is aimed at security engineers, architects, and IT security professionals who want to deepen their expertise in AWS security practices.
Course Objectives:
Understand the AWS Shared Security Responsibility Model: Learn how security responsibilities are shared between AWS and customers.
Design Secure Architectures: Create robust security infrastructures to defend against common threats.
Implement Advanced Encryption: Protect data with encryption methods for both data at rest and in transit.
Utilize Automated Security Tools: Employ automated security checks to maintain consistent protection across AWS resources.
Configure Secure Authentication: Set up strong authentication mechanisms to secure access.
Analyze Security Logs: Monitor and interpret logs to identify and respond to security events.
Respond to Security Incidents: Develop strategies for managing and mitigating security incidents.
Course Prerequisites:
To ensure a successful learning experience, participants should have:
Basic Understanding of AWS: Familiarity with AWS Cloud Practitioner essentials or equivalent.
Foundational Knowledge in AWS Security: Understanding of AWS Security fundamentals.
IT Security Practices: Working knowledge of IT security concepts and practices.
Cloud Computing Concepts: Familiarity with cloud computing principles.
Target Audience:
This course is ideal for:
Security Engineers and Architects
Information Security Professionals
Cloud Security Specialists
IT Security Analysts
Cloud Architects and Engineers focused on security
Systems Administrators with security responsibilities
Network Security Professionals
DevOps/DevSecOps Engineers
Security Consultants and Compliance Officers
Cybersecurity Analysts and Technical Auditors
Incident Response Teams in AWS environments
Learning Outcomes:
Upon completion, participants will be able to:
Apply the AWS Shared Security Responsibility Model: Clearly delineate security responsibilities between AWS and the user.
Design Secure AWS Infrastructures: Build security measures into AWS application infrastructures to combat common threats.
Encrypt Data Effectively: Use advanced encryption techniques for data protection.
Automate Security Checks: Implement automated tools for continuous security monitoring and vulnerability management.
Configure Authentication Mechanisms: Set up secure authentication processes to control access to AWS resources.
Monitor and Analyze Logs: Gain insights from logs to understand operational and security events.
Mitigate Security Risks: Identify and address potential security threats to applications and data.
Conduct Security Assessments: Evaluate vulnerabilities and ensure adherence to security best practices.
Summarize IAM, Data Protection, and Threat Detection and Response
State the different ways to interact with AWS using the console, CLI, and SDKs
Describe how to use MFA for extra protection
State how to protect the root user account and access keys
Module 2: Securing Entry Points on AWS
Describe how to use multi-factor authentication (MFA) for extra protection
Describe how to protect the root user account and access keys
Describe IAM policies, roles, policy components, and permission boundaries
Explain how API requests can be logged and viewed using AWS CloudTrail and how to view and analyze access history
Hands-On Lab: Using Identity and Resource-Based Policies
Module 3: Account Management and Provisioning on AWS
Explain how to manage multiple AWS accounts using AWS Organizations and AWS Control Tower
Explain how to implement multi-account environments with AWS Control Tower
Demonstrate the ability to use identity providers and brokers to acquire access to AWS services
Explain the use of AWS IAM Identity Center (successor to AWS Single Sign-On) and AWS Directory Service
Demonstrate the ability to manage domain user access with Directory Service and IAM Identity Center
Hands-On Lab: Managing Domain User Access with AWS Directory Service
Day 2
Module 4: Secrets Management on AWS
Describe and list the features of AWS KMS, CloudHSM, AWS Certificate Manager (ACM), and AWS Secrets Manager
Demonstrate how to create a multi-Region AWS KMS key
Demonstrate how to encrypt a Secrets Manager secret with an AWS KMS key
Demonstrate how to use an encrypted secret to connect to an Amazon RDS database in multiple AWS Regions
Hands-On Lab: Using AWS KMS to Encrypt Secrets in Secrets Manager
Module 5: Data Security
Monitor data for sensitive information with Amazon Macie
Describe how to protect data at rest through encryption and access controls
Identify AWS services used to replicate data for protection
Determine how to protect data after it has been archived
Hands-On Lab: Data Security in Amazon S3
Module 6: Infrastructure Edge Protection
Describe the AWS features used to build secure infrastructure
Describe the AWS services used to create resiliency during an attack
Identify the AWS services used to protect workloads from external threats
Compare the features of AWS Shield and AWS Shield Advanced
Explain how centralized deployment for AWS Firewall Manager can enhance security
Hands-On Lab: Using AWS WAF to Mitigate Malicious Traffic
Day 3
Module 7: Monitoring and Collecting Logs on AWS
Identify the value of generating and collecting logs
Use Amazon VPC Flow Logs to monitor for security events
Explain how to monitor for baseline deviations
Describe Amazon EventBridge events
Describe Amazon CloudWatch metrics and alarms
List log analysis options and available techniques
Identify use cases for using VPC Traffic Mirroring
Hands-On Lab: Monitoring for and Responding to Security Incidents
Module 8: Responding to Threats
Classify incident types in incident response
Understand incident response workflows
Discover sources of information for incident response using AWS services
Understand how to prepare for incidents
Detect threats using AWS services
Analyze and respond to security findings
Hands-On Lab: Incident Response
SpireTec solutions is the latest technology enabled I.Tmanagement training company specialized in offering 1500+ courses with the state of art training facilities backed by a team of industry experts in various domains with assuring best quality services.
Since SpireTec provides 24X7 training and support for your training needs is very adaptable to your time availabilities and offers customized training programs according to your availability and time zones of your contingent.
Because SpireTec aims for the personal & professional growth of you as individual & corporate as a whole, providing training on the latest and updated versions in the designated domains.
It is preferable but not mandatory to have domain experience in the area of your interest in which you want to opt training, supported by good English communication skills, a good Wi-Fi and computer or laptop system in case you want remote training.
Spire Tec aims and ensure to offer finest and world-class training to the participants by giving them a proper counselling and a guided career path by our industry experts which leads guaranteed success for you in the corporate world.
We offer online training (1-1, Group training), Classroom training, Onsite training with state of art facilities.
We use cookies
Some cookies are essential for this site to function and cannot be turned off. Others are set to help us
understand how our service performs and is used, and to support our marketing efforts.
Learn more in our
Terms &
Privacy Policy.