AWS Security Essentials [GK3337]
computer En ligne: VIRTUAL TRAINING CENTER 22 jan. 2026 |
computer En ligne: VIRTUAL TRAINING CENTER 9 fév. 2026 |
place1-Mechelen (Battelsesteenweg 455-B) 24 fév. 2026 |
computer En ligne: VIRTUAL TRAINING CENTRE 24 fév. 2026 |
computer En ligne: VIRTUAL TRAINING CENTER 6 mar. 2026 |
computer En ligne: VIRTUAL TRAINING CENTER 7 avr. 2026 |
computer En ligne: VIRTUAL TRAINING CENTER 1 mai 2026 |
place1-Mechelen (Battelsesteenweg 455-B) 29 mai 2026 |
computer En ligne: VIRTUAL TRAINING CENTRE 29 mai 2026 |
computer En ligne: VIRTUAL TRAINING CENTER 4 juin 2026 |
computer En ligne: VIRTUAL TRAINING CENTER 12 juin 2026 |
computer En ligne: VIRTUAL TRAINING CENTER 7 août 2026 |
place1-Mechelen (Battelsesteenweg 455-B) 13 août 2026 |
computer En ligne: VIRTUAL TRAINING CENTRE 13 août 2026 |
computer En ligne: VIRTUAL TRAINING CENTER 25 sept. 2026 |
computer En ligne: VIRTUAL TRAINING CENTER 9 oct. 2026 |
place1-Mechelen (Battelsesteenweg 455-B) 13 nov. 2026 |
computer En ligne: VIRTUAL TRAINING CENTRE 13 nov. 2026 |
computer En ligne: VIRTUAL TRAINING CENTER 24 déc. 2026 |
Vrijwel iedere training die op een onze locaties worden getoond zijn ook te volgen vanaf huis via Virtual Classroom training. Dit kunt u bij uw inschrijving erbij vermelden dat u hiervoor kiest.
OVERVIEW
Il n'y a pour le moment aucune question fréquente sur ce produit. Si vous avez besoin d'aide ou une question, contactez notre équipe support.
Vrijwel iedere training die op een onze locaties worden getoond zijn ook te volgen vanaf huis via Virtual Classroom training. Dit kunt u bij uw inschrijving erbij vermelden dat u hiervoor kiest.
OVERVIEW
OBJECTIVES
This course is designed to teach you how to:
- Identify security benefits and responsibilities when using the AWS Cloud
- Describe the access control and management features of AWS
- Understand the different data encryption methods to secure sensitive data
- Describe how to secure network access to your AWS resources
- Determine which AWS services can be used for security logging and monitoring
AUDIENCE
This course is intended for:
- IT business-level professionals interested in cloud security practices
- Security professionals with minimal working knowledge of AWS
CONTENT
Module 1: Exploring the Security Pillar
- AWS Well-Architected Framework: Security Pillar
Module 2: Security of the Cloud
- Shared responsibility model
- AWS Global Infrastructure
- Compliance and governance
Module 3: Identity and Access Management
- Identity and access management
- Data access and protection essentials
- Lab 1: Introduction to Security Policies
Module 4: Protecting Infrastructure and Data
- Protecting your network infrastructure
- Edge Security
- DDoS Mitigation
- Protecting compute resources
- Lab 2: Securing VPC Resources with Security Groups
Module 5: Detection and Response
- Monitoring and detective controls
- Incident response essentials
Module 6: Course Wrap-Up
- Course review
Il n'y a pour le moment aucune question fréquente sur ce produit. Si vous avez besoin d'aide ou une question, contactez notre équipe support.

