Classroom image for Class C-20107 - Security Engineering on AWS in Virtual on 5/20/2025

Training Class

Security Engineering on AWS
(AWS-SEC-ENG)

Register Now
Security Engineering on AWS

Course Overview

Do you want to further your knowledge about security engineering on AWS? This course demonstrates how to efficiently use AWS security services to stay secure in the AWS Cloud and focuses on best practices that AWS recommends for enhancing the security of your data and systems in the cloud. The course highlights the security features of AWS key services, including compute, storage, networking, and database services. You will also learn how to leverage AWS services and tools for automation, continuous monitoring and logging, and responding to security incidents.

Our in-class and online AWS courses help you improve your digital security. You will receive AWS training to build infrastructures protected against common security threats, use the shared security model, encrypt data, reproduce and automate security checks, and identify and eliminate potential threats. Additionally, you will examine use cases for running regulated workloads on AWS across different verticals, globally. Students who take an in-class or online training course should already have a knowledge of IT security practices and infrastructure familiarity. They should also have experience with cloud computing concepts and have taken either Architecting on AWS or Systems Operations on AWS. The course gives you three days of thorough instruction. It includes a mixture of classroom training, group exercises, and hands-on activities that let you apply your IT training to real-world situations. Enroll today to take advantage of our virtual training sessions!

ExitCertified is an AWS Advanced Training Partner, the highest level of training partnership awarded by AWS. ExitCertified provides vendor-approved training and has the largest team of instructors delivering advanced AWS classes in North America, and the deepest bench of instructors delivering the entire authorized AWS catalog. AWS designates its highest status to only those few training partners that have consistently delivered the highest quality experience for learners.

This course demonstrates how to efficiently use AWS security services to stay secure in the AWS Cloud. The course focuses on the security practices that AWS recommends for enhancing the security of your data and systems in the cloud. The course highlights the security features of AWS key services including compute, storage, networking, and database services. You will also learn how to leverage AWS services and tools for automation, continuous monitoring and logging, and responding to security incidents.

Skills Gained

This course teaches you how to:

  • Assimilate and leverage the AWS shared security responsibility model
  • Architect and build AWS application infrastructures that are protected against the most common security threats
  • Protect data at rest and in transit with encryption
  • Apply security checks and analyses in an automated and reproducible manner
  • Configure authentication for resources and applications in the AWS Cloud
  • Gain insight into events by capturing, monitoring, processing, and analyzing logs
  • Identify and mitigate incoming threats against applications and data
  • Perform security assessments to ensure that common vulnerabilities are patched and security best practices are applied

Who Can Benefit

This course is intended for:

  • Security engineers
  • Security architects
  • Security operations
  • Information security

Delivery Method

This course is delivered through a mix of:

  • Classroom training
  • Hands-on labs
  • Group exercises

Hands-on Activity

This course allows you to test new skills and apply knowledge to your working environment through a variety of practical exercises.

Day 1

  • Identifying Entry Points on AWS
  • Security Considerations: Web Application Environments
  • Application Security
  • Securing Networking Communications – Part 1

Day 2

  • Data Security
  • Security Considerations: Hybrid Environments
  • Monitoring and Collecting Logs on AWS
  • Processing Logs on AWS
  • Securing Networking Communications – Part 2
  • Out-Of-Region Protection

Day 3

  • Account Management on AWS
  • Security Considerations: Serverless Environments
  • Secrets Management on AWS
  • Automating Security on AWS
  • Threat Detection and Sensitive Data Monitoring

Prerequisites

We recommend that attendees of this course have the following prerequisites:

  • Working knowledge of IT security practices and infrastructure concepts
  • Familiarity with cloud computing concepts
  • Architecting on AWS
  • Systems Operations on AWS

 

Upcoming Classes

Class Number
Begins
Ends
Time Zone
Begin Time
End Time
Instructor
Location

C-19834

12/17/202412/19/2024Eastern Time (US)9:00 am5:00 pmAWS-TBDVirtualRegister

C-20033

1/14/20251/16/2025Eastern Time (US)9:00 am5:00 pmAWS-TBDVirtualRegister

C-20050

2/4/20252/6/2025Eastern Time (US)12:00 pm8:00 pmAWS-TBDVirtualRegister

C-20059

2/25/20252/27/2025Eastern Time (US)9:00 am5:00 pmAWS-TBDVirtualRegister

C-20072

3/18/20253/20/2025Eastern Time (US)9:00 am5:00 pmAWS-TBDVirtualRegister

C-20082

4/8/20254/10/2025Eastern Time (US)12:00 pm8:00 pmAWS-TBDVirtualRegister

C-20097

4/29/20255/1/2025Eastern Time (US)9:00 am5:00 pmAWS-TBDVirtualRegister

C-20107

5/20/20255/22/2025Eastern Time (US)9:00 am5:00 pmAWS-TBDVirtualRegister

C-20122

6/10/20256/12/2025Eastern Time (US)12:00 pm8:00 pmAWS-TBDVirtualRegister
Stony Point yellow icon

Want to Talk with Us About Training?

Submit this form, or call us at: +1 (844) 978-6697