Security Engineering on AWS

Course DateStart TimeEnd TimeTime ZoneLocationDaysPrice
Jun 25, 202412:0008:00EDTLive Virtual Class3$2,025 USDPurchase
Jul 17, 202409:0005:00EDTLive Virtual Class3$2,025 USDPurchase
Aug 7, 202409:0005:00EDTLive Virtual Class3$2,025 USDPurchase
Aug 14, 202409:0005:00EDTLive Virtual Class3$2,025 USDPurchase
Aug 26, 202412:0008:00EDTLive Virtual Class3$2,025 USDPurchase
Sep 18, 202409:0005:00EDTLive Virtual Class3$2,025 USDPurchase
Oct 9, 202409:0005:00EDTLive Virtual Class3$2,025 USDPurchase
Oct 16, 202412:0008:00EDTLive Virtual Class3$2,025 USDPurchase
Oct 23, 202412:0008:00EDTLive Virtual Class3$2,025 USDPurchase
Nov 6, 202409:0005:00ESTLive Virtual Class3$2,025 USDPurchase
Nov 20, 202409:0005:00ESTLive Virtual Class3$2,025 USDPurchase
Dec 4, 202412:0008:00ESTLive Virtual Class3$2,025 USDPurchase
Dec 17, 202409:0005:00ESTLive Virtual Class3$2,025 USDPurchase


Security Engineering on AWS

This course demonstrates how to efficiently use AWS security services to stay secure in the AWS Cloud and focuses on best practices that AWS recommends for enhancing the security of your data and systems in the cloud. The course highlights the security features of AWS key services, including compute, storage, networking, and database services. You will also learn how to leverage AWS services and tools for automation, continuous monitoring and logging, and responding to security incidents. You will receive AWS training to build infrastructures protected against common security threats, use the Shared Responsibility Model, encrypt data, reproduce and automate security checks, and identify and eliminate potential threats. Additionally, you will examine use cases for running regulated workloads on AWS across different verticals, globally.

Duration: 3 Days


  • Working knowledge of IT security practices and infrastructure concepts
  • Familiarity with cloud computing concepts
  • Attended either Architecting on AWS or Systems Operations on AWS


  • Security Engineers
  • Security Architects
  • Security Operations
  • Information Security

Learning Objectives

  • Assimilate and leverage the AWS shared security responsibility model
  • Architect and build AWS application infrastructures that are protected against the most common security threats
  • Protect data at rest and in transit with encryption
  • Apply security checks and analyses in an automated and reproducible manner
  • Configure authentication for resources and applications in the AWS Cloud
  • Gain insight into events by capturing, monitoring, processing, and analyzing logs
  • Identify and mitigate incoming threats against applications and data
  • Perform security assessments to ensure that common vulnerabilities are patched and security best practices are applied


  • Identifying Entry Points on AWS
  • Security Considerations: Web Application, Hybrid, and Serverless Environments
  • Application Security
  • Securing Networking Communications
  • Data Security
  • Monitoring and Collecting Logs on AWS
  • Processing Logs on AWS
  • Out-Of-Region Protection
  • Account Management on AWS
  • Secrets Management on AWS
  • Automating Security on AWS
  • Threat Detection and Sensitive Data Monitoring
Right Menu IconMENU