Image

AWS Security Essentials (SEC-ESS)

Cloud Computing - AWS
AWS Security Essentials covers fundamental AWS Cloud security concepts, including AWS access control, data encryption methods, and how network access to your AWS infrastructure can be secured. Based on the AWS Shared Security Model, this course teaches where in the AWS Cloud you are responsible for implementing security. You’ll also learn what security-oriented services are available to you, as well as why and how the security services can help meet the security needs of your organization.

AWS Security Essentials (SEC-ESS) Objectives

  • This course is designed to teach you how to:
  • Identify security benefits and responsibilities of using the AWS Cloud.
  • Describe the access control and management features of AWS.
  • Explain the available methods for encrypting data at rest and in transit.
  • Describe how to secure network access to your AWS resources.
  • Determine which AWS services can be used for monitoring and incident response.

Need Assistance Finding the Right Training Solution

Our Consultants are here to assist you

Key Point of Training Programs

  • AWS Security Essentials (SEC-ESS) Prerequisites

    Who should attend
    This course is intended for:

    IT business-level professionals interested in cloud security practices
    Security professionals with minimal working knowledge of AWS
    Certifications
    This course is part of the following Certifications:

    AWS Certified Security – Specialty
    Prerequisites
    What experience you'll need:

    Working knowledge of IT security practices and infrastructure concepts
    Familiarity with cloud computing concepts

  • AWS Security Essentials (SEC-ESS) Delivery Format

    In-Person

    Online

  • AWS Security Essentials (SEC-ESS) Outline

    Detailed Course Outline
    Module 1: Exploring the Security Pillar

    AWS Well-Architected Framework: Security Pillar
    Module 2: Security of the Cloud

    Shared responsibility model
    AWS Global Infrastructure
    Compliance and Governance
    Module 3: Identity and Access Management

    Identity and Access Management
    Data access and protection essentials
    Lab 1 – Introduction to Security Policies
    Module 4: Protecting Infrastructure and Data

    Protecting your network infrastructure
    Edge Security
    DDoS mitigation
    Protecting compute resources
    Lab 2 – Securing VPC Resources with Security Groups
    Module 5: Detection and Response

    Monitoring and detective controls
    Incident response essentials
    Module 6: Course Wrap Up

    Course review

    Have a Question About This Course?