logo-img
default image

Security Operations on AWS

Best price in just 2 steps

Requesting more information and/or the current price of this training is easy. We'll take any current promotions, subsidies, or customer discounts into account.

Description

Outline

Security Operations on AWS demonstrates how to efficiently use AWS security services to stay secure and compliant in the AWS cloud. The course focuses on the AWS-recommended security best practices that you can implement to enhance the security of your data and systems in the cloud. The course highlights the security features of AWS key services including compute, storage, networking, and database services. This course also refers to the common security control objectives and regulatory compliance standards and examines use cases for running regulated workloads on AWS across different verticals, globally. You will also learn how to leverage AWS services and tools for automation and continuous monitoring—taking your security operations to the next level. This course is intended for: Security engineers Security architects Security analysts Security auditors Individuals who are responsible for governing, auditing, and testing an organization's IT infrastructure, and ensuring conformity of the infrastructure to security, risk, and compliance guidelines

Prerequisite

  • Attended AWS Security Fundamentals
  • Experience with governance, risk, and compliance regulations and control objectives
  • Working knowledge of IT security practices
  • Working knowledge of IT infrastructure concepts
  • Familiarity with cloud computing concepts

Delegates will learn how to

This course is designed to teach you how to:

  • Implement better security controls for your resources in the AWS cloud.
  • Assimilate and leverage the AWS shared compliance responsibility model.
  • Manage user identity and access management in the AWS cloud.
  • Perform security incident management, cloud resiliency, and business continuity in the AWS cloud.
  • Manage and audit your AWS resources from a security perspective.
  • Monitor and log access and usage of AWS compute, storage, networking, and database services.
  • Assimilate and leverage the AWS shared security responsibility model.
  • Use AWS security services such as AWS Identity and Access Management, Amazon Virtual Private Cloud, AWS Config, AWS CloudTrail, AWS Key Management Service, AWS CloudHSM, and AWS Trusted Advisor.
  • Identify AWS services and tools to help automate, monitor, and manage security operations on AWS.

Course Duration

3 days

Grow as a professional in IT, security and privacy.

1

Applicant Information

2

Billing Information

shape
Proudly rated 8.9 by our students

Jan

19/12/2025

ISACA

CRISC

image not found

Training van een wereldwijd specialist met een tas vol praktijkvoorbeelden

Jeffrey

08/12/2025

Security Tactisch/Strategisch

Information Security Foundation

image not found

Hele goede en duidelijk uitgelegde training!

Maurits

13/11/2025

Privacy

CIPM

image not found

Goede training, met sterker trainer

Edwin

11/11/2025

EC-Council

CCISO

image not found

Een zeer waardevolle training waarin theorie en praktijk op inspirerende wijze samenkwamen.

Stephan Dolman

28/10/2025

Security Technisch

PEN-100

image not found

Erg interessante cursus

Grow as a professional in IT, security and privacy.

1

Applicant Information

2

Billing Information

Why people choose TSTC to gain their knowledge

Train smarter, not harder. TSTC’s unique method ensures you actually master the skills—and pass with confidence.

Learn more about TSTC
Toucan Rhino