Curriculum
- 8 Sections
- 70 Lessons
- 8 Weeks
Expand all sectionsCollapse all sections
- Week 1Introduction to AWS Security & Incident Response9
- 1.1Overview of AWS Security & Compliance60 Minutes
- 1.2AWS Shared Responsibility Model
- 1.3AWS Security Best Practices
- 1.4Incident Response Strategy
- 1.5Roles and Responsibilities in Incident Response
- 1.6AWS Security Incident Response Guide
- 1.7AWS Security Hub and Centralized Security Findings
- 1.8AWS Services for Threat Detection (GuardDuty, Macie, Detective)
- 1.9Use Case: Credential Compromise & EC2 Instance Compromise
- Week 2Threat Detection and Automated Incident Response9
- 2.1AWS Security Threat Intelligence & Logging60 Minutes
- 2.2AWS CloudTrail & AWS Config for Security Auditing
- 2.3Visualizing and Detecting Anomalies using AWS Security Services
- 2.4Log Analysis and Correlation Techniques
- 2.5Automating Security Responses with AWS Lambda
- 2.6AWS EventBridge for Security Automation
- 2.7Implementing Security Dashboards & Metrics
- 2.8Investigating Security Events using AWS Logs
- 2.9Capturing and Analyzing Forensic Data in AWS
- Week 3Security Logging & Monitoring in AWS9
- 3.1AWS Monitoring and Logging Best Practices60 Minutes
- 3.2AWS CloudWatch for Security Monitoring
- 3.3Setting Up Alerts & Notifications
- 3.4Application Logging and Visibility Challenges
- 3.5AWS Security Audits & Compliance Monitoring
- 3.6IAM Access Analyzer for Security Risk Mitigation
- 3.7Log Storage, Retention, and Management
- 3.8AWS Config Rules & Compliance Reporting
- 3.9Troubleshooting Logging Issues in AWS
- Week 4AWS Infrastructure Security & Network Protection9
- 4.1AWS Edge Security & DDoS Protection (AWS Shield & WAF)
- 4.2VPC Security (Security Groups, NACLs, and Network ACLs)
- 4.3Network Traffic Mirroring & VPC Flow Logs
- 4.4VPN, Direct Connect & Secure AWS Interconnectivity
- 4.5AWS Transit Gateway & Inter-VPC Communication Security
- 4.6Implementing Network Segmentation in AWS
- 4.7AWS Firewall and Security Controls for Compute Workloads
- 4.8Secure Deployment and Patch Management
- 4.9Troubleshooting Network Security Issues
- Week 5Identity and Access Management (IAM) Security9
- 5.1Introduction to IAM Policies and Authentication in AWS
- 5.2AWS IAM Roles, Policies & Permission Models
- 5.3AWS Identity Federation & SSO (AWS IAM Identity Center, Cognito)
- 5.4MFA, Conditional Access, and Temporary Security Credentials
- 5.5IAM Least Privilege Access & Role-Based Access Control (RBAC)
- 5.6Analyzing and Mitigating IAM Policy Misconfigurations
- 5.7ABAC (Attribute-Based Access Control) in AWS
- 5.8Securing API Access and Authorization in AWS
- 5.9Troubleshooting IAM Authentication & Authorization Issues
- Week 6Data Protection and Encryption in AWS9
- 6.1Data Protection Strategies in AWS
- 6.2AWS Encryption Services (KMS, CloudHSM, Secrets Manager)
- 6.3Encrypting Data at Rest & Data in Transit (S3, RDS, DynamoDB, EBS)
- 6.4AWS Resource Policies for Data Security
- 6.5AWS Backup & Lifecycle Policies for Data Retention
- 6.6Secure Key Management & Secrets Rotation Strategies
- 6.7AWS Cross-Region Data Replication Security
- 6.8Data Classification & Security Compliance in AWS
- 6.9Troubleshooting Data Protection and Encryption Issues
- Week 7Security Governance, Compliance & Cost Optimization8
- 7.1AWS Multi-Account Strategies with AWS Organizations
- 7.2Implementing SCPs (Service Control Policies) for Governance
- 7.3AWS Config for Security Compliance Auditing
- 7.4AWS Audit Manager & AWS Security Compliance Frameworks
- 7.5AWS Cost Analysis & Security Optimization
- 7.6AWS Well-Architected Framework & Security Best Practices
- 7.7Securing AWS Root Account & Privileged Access Management
- 7.8Conducting a Security Review for AWS Workloads
- Week 8Risk Response and Treatment8
- 8.1Risk Treatment / Risk Response Options (Avoid, Mitigate, Transfer, Accept)Copy
- 8.2Risk and Control Ownership in OrganizationsCopy
- 8.3Implementing Security Controls Based on Risk FindingsCopy
- 8.4Cost-Benefit Analysis of Risk TreatmentsCopy
- 8.5Third-Party Risk ManagementCopy
- 8.6Security Testing for Risk MitigationCopy
- 8.7Risk Control Documentation and ReportingCopy
- 8.8Business Continuity Planning and Risk ResponseCopy