AWS Security Essentials (SEC-ESS) Online
computer Online: Online Training 9. Mär 2026 |
computer Online: Online Training 30. Mär 2026 |
computer Online: Online Training 4. Mai 2026 |
computer Online: Online Training 22. Jun 2026 |
computer Online: Online Training 13. Jul 2026 |
computer Online: Online Training 3. Aug 2026 |
computer Online: Online Training 31. Aug 2026 |
computer Online: Online Training 28. Sep 2026 |
computer Online: Online Training 26. Okt 2026 |
computer Online: Online Training 16. Nov 2026 |
computer Online: Online Training 14. Dez 2026 |
Voraussetzungen
What experience you'll need:
- Working knowledge of IT security practices and infrastructure concepts
- Familiarity with cloud computing concepts
Zielgruppe
This course is intended for:
- IT business-level professionals interested in cloud security practices
- Security professionals with minimal working knowledge of AWS
Detaillierter Kursinhalt
Module 1: Exploring the Security Pillar
- AWS Well-Architected Framework: Security Pillar
Module 2: Security of the Cloud
- Shared responsibility model
- AWS Global Infrastructure
- Compliance and Governance
Module 3: Identity and Access Management
- Identity and Access Management
- Data access and protection essentials
- Lab 1 – Introduction …
Es wurden noch keine FAQ hinterlegt. Falls Sie Fragen haben oder Unterstützung benötigen, kontaktieren Sie unseren Kundenservice. Wir helfen gerne weiter!
Voraussetzungen
What experience you'll need:
- Working knowledge of IT security practices and infrastructure concepts
- Familiarity with cloud computing concepts
Zielgruppe
This course is intended for:
- IT business-level professionals interested in cloud security practices
- Security professionals with minimal working knowledge of AWS
Detaillierter Kursinhalt
Module 1: Exploring the Security Pillar
- AWS Well-Architected Framework: Security Pillar
Module 2: Security of the Cloud
- Shared responsibility model
- AWS Global Infrastructure
- Compliance and Governance
Module 3: Identity and Access Management
- Identity and Access Management
- Data access and protection essentials
- Lab 1 – Introduction to Security Policies
Module 4: Protecting Infrastructure and Data
- Protecting your network infrastructure
- Edge Security
- DDoS mitigation
- Protecting compute resources
- Lab 2 – Securing VPC Resources with Security Groups
Module 5: Detection and Response
- Monitoring and detective controls
- Incident response essentials
Module 6: Course Wrap Up
- Course review
Es wurden noch keine FAQ hinterlegt. Falls Sie Fragen haben oder Unterstützung benötigen, kontaktieren Sie unseren Kundenservice. Wir helfen gerne weiter!
