Class Details

Price: $2,025*

Want to know our latest promotions or check if this course is GSA eligible? Just give us a call at 240-667-7757 or submit the More Info form above. 

An AWS Training Course at Phoenix TS Includes:

  • 24 Hours of Instructor-led training from our expert trainers
  • Hands-on labs to support key concepts and skills
  • In-class exercises
  • Courseware books, notepads, pens, highlighters and other materials
  • Full breakfast with variety of bagels, fruits, yogurt, doughnuts and juice
  • Tea, coffee, and soda available throughout the day
  • Freshly baked cookies every afternoon - *only at participating locations

 

Price Match Guarantee Phoenix TS


*The exam cost of $300 is not included in the total course price. This must be purchased separately.

Course Outline

Day 1

  • Identifying Entry Points on AWS
  • Security Considerations: Web Application Environments 
  • Application Security 
  • Securing Networking Communications – Part 1 

Day 2

  • Data Security 
  • Security Considerations: Hybrid Environments 
  • Monitoring and Collecting Logs on AWS 
  • Processing Logs on AWS 
  • Securing Networking Communications – Part 2 
  • Out-Of-Region Protection

Day 3

  • Account Management on AWS 
  • Security Considerations: Serverless Environments 
  • Secrets Management on AWS 
  • Automating Security on AWS 
  • Threat Detection and Sensitive Data Monitoring

Objectives

Upon course conclusion, students should have an understanding of:

  • Assimilate and leverage the AWS shared security responsibility model 
  • Architect and build AWS application infrastructures that are protected against the most common security threats
  • Protect data at rest and in transit with encryption 
  • Apply security checks and analyses in an automated and reproducible manner 
  • Configure authentication for resources and applications in the AWS Cloud 
  • Gain insight into events by capturing, monitoring, processing, and analyzing logs 
  • Identify and mitigate incoming threats against applications and data
  • Perform security assessments to ensure that common vulnerabilities are patched and security best practices are applied