Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Amazon Web Services

Getting Started with AWS Security, Identity, and Compliance

Amazon Web Services and Amazon via AWS Skill Builder

Overview

This course provides an overview of AWS security technology, use cases, benefits, and services. The course introduces various services in the AWS Security, Identity, and Compliance service category. By the end of this course, you will gain an understanding about the importance of security in the cloud and be able to identify AWS services that you can use to secure your data.

  • Course level: Fundamental
  • Duration: 3 hours


Activities

This course includes presentations, videos, interactive elements, and an assessment.


Course objectives

In this course, you will learn to:

  • Describe security and its importance to AWS
  • Describe the differences between AWS and on premises when it comes to security
  • Define the five areas of the security pillar from the AWS Well-Architected framework
  • Identify and describe AWS services used in identity and access management
  • Identify and describe AWS services used for detective controls
  • Identify and describe AWS services used in infrastructure protection
  • Identify and describe AWS services used in data protection
  • Describe how incident response is carried out on AWS


Intended audience

This course is intended for:

  • IT business-level professionals interested in cloud security practices
  • Security professionals with minimal working knowledge of AWS
  • People new to AWS who want to develop an understanding of basic security concepts and services in the cloud


Prerequisites

None 


Course outline

Section 1: Course Introduction

  • Overview
  • On Premises and the AWS Cloud
  • Security in the AWS Cloud
  • AWS Well-Architected Framework

Section 2: Identity and Access Management

  • Authentication vs. Authorization
  • AWS Identity and Access Management (IAM) for Access Management
  • Amazon Cognito for Mobile Authentication
  • AWS Directory Service for User Federation

Section 3: Detective Controls

  • Monitoring Overview
  • Amazon GuardDuty for Threat Detection
  • AWS Security Hub for Prioritizing Findings
  • Amazon Macie for Data Monitoring

Section 4: Infrastructure Protection

  • Securing Your Compute Resources
  • AWS WAF for Traffic Filtering
  • AWS Shield for DDoS Protection

Section 5: Data Protection

  • Encryption on AWS
  • AWS Key Management Service (AWS KMS) for Key Management
  • AWS Certificate Manager (ACM) for Securing Communications
  • AWS Secrets Manager for Credentials Management

Section 6: Incident Response

  • Rethinking Incident Response
  • AWS Config for Responding to Incidents

Section 7: What’s Next

  • AWS Well-Architected Tool
  • Next Steps
  • Course Assessment

Reviews

Start your review of Getting Started with AWS Security, Identity, and Compliance

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.