Cybersecurity

17 Free AWS Cybersecurity Courses You Can Take Right Now


Amazon Web Services (AWS) is the world’s largest and most widely used cloud platform, providing more than 200 services through global data centers. It serves millions of customers, ranging from startups to large enterprises and government organizations.

AWS has a core infrastructure that meets the stringent security needs of entities such as the military, international banks, and other organizations handling sensitive information. AWS complies with 143 security standards and certifications, and its 117 customer data storage services include encryption capabilities.

Here’s a collection of free AWS cybersecurity courses you can use to deepen your knowledge of the platform.

AWS Cybersecurity

AWS Security Fundamentals

120 minutes

In this course at your own pace, you will learn fundamental AWS cloud cybersecurity concepts, including AWS access control, data encryption methods, and how network access to your AWS infrastructure can be secured. You will learn about your responsibility for security in the AWS cloud and the different security-focused services available.

Getting started with AWS Security Hub

60 minutes

AWS Security Hub is a cloud-based security posture management service for performing security best practice audits, aggregating alerts, and automating remediation. This digital course lets you explore architecture, key features, pricing, and use cases.

AWS Security Best Practices: IT

120 minutes

This course focuses on understanding and implementing AWS security best practices for compute with in-depth analysis of compute security.

AWS Security Best Practices: Network Infrastructure

90 minutes

This course focuses on understanding and implementing AWS cybersecurity best practices regarding network infrastructure with in-depth analysis of securing network infrastructure.

AWS Security Best Practices: Monitoring and Alerting

120 minutes

This course focuses on understanding and implementing AWS cybersecurity best practices for monitoring and alerting. It provides information on logging network, user, and API traffic, log analysis, and auditing your AWS environment.

AWS Cybersecurity

AWS Backup Guide

70 minutes

This course introduces you to AWS Backup concepts and technologies, so you can quickly get started using AWS Backup in your environment. This course covers the features, benefits, use cases, and key elements of AWS Backup, focusing on AWS service integrations. You then review pricing and pricing options per AWS service. Finally, you will learn how to monitor and audit your AWS Backup implementation using AWS Backup Audit.

Securing and Protecting Data in Amazon S3

100 minutes

With Amazon S3, you can use a number of different approaches to manage data protection, including preventing buckets from being publicly accessible, implementing access controls, and encrypting data at rest and in transit. Amazon S3 makes it easy to protect your data from security incidents. In this courseYou will learn Amazon S3 security best practices to help you improve your security posture and methods to prevent unwanted access to your data or comply with business and regulatory obligations.

AWS IoT Security Series

600 minutes

This course provides you with an introduction to AWS IoT security and more detailed information on how to configure and maintain security within your AWS IoT solution. After completing this series, you will have gained in-depth knowledge and skills in AWS IoT security, as well as hands-on experience on a wide range of topics; such as writing AWS IoT policies, creating a custom authorizer, and scheduling audit checks of your AWS IoT settings. Additionally, by completing the AWS IoT Security series, you will be better prepared to secure your fleet’s authorization and authentication processes, monitor your fleet’s behavior, and respond effectively with mitigation actions.

AWS Cybersecurity

AWS Storage Data Protection Services Getting Started

35 minutes

In this course, you’ll learn about the service-native backup and snapshot services you can choose from to meet your organization’s backup requirements. You also learn about an AWS service designed to replicate your on-premises application servers to provide disaster recovery protection. Additionally, you’ll learn about the service’s native replication that you can use to protect your data or improve service availability across AWS Regions. You can choose from these different service offerings, apply them to your organization’s needs, and determine the possible paths you can take to arrive at the best storage solution.

Amazon Inspector: Getting Started

60 minutes

Amazon Inspector is an automated vulnerability management service that continuously scans AWS workloads for unintended software vulnerabilities and network exposures. In this course, you will learn the purpose, benefits, architecture, pricing philosophy, and common use cases of Amazon Inspector. The course also explores how the service is implemented in an AWS environment with a demonstration of basic configuration and usage of the service.

The cloud for CISOs

11 minutes

This course provides a high-level picture of cloud computing technology from a security perspective. Learners discover why they should consider the cloud and how to build a security and compliance program culture on AWS. They are also exploring ransomware mitigation.

Securing Data in Amazon EFS

55 minutes

Amazon Elastic File System (Amazon EFS) provides a serverless, set-it-and-forget-it elastic file system for use with AWS Cloud services and on-premises resources. It is designed to scale on demand to petabytes without disrupting applications, automatically scaling up and down as you add and remove files, eliminating the need to provision and manage capacity to accommodate growth .

Organizations face significant challenges when modernizing or moving their applications to the cloud when they need a shared persistent file system interface. In this EFS course, you learn how to secure Amazon EFS. Security starts with security controls and the shared responsibility model. You’ll then learn about IAM and account-level permissions, as well as network security and encryption controls. Additionally, this course explains how to create access points and perform audits with AWS CloudTrail.

AWS Cybersecurity

Automatically detect and mitigate account compromise issues

30 minutes

In this course, you will learn how to deploy a method for detecting and mitigating account compromise issues. The solution uses services such as AWS Personal Health Dashboard, AWS Lamba, and Amazon Simple Notification Service (Amazon SNS). The solution can be deployed to any customer and the course includes sample solution files.

AWS IAM: Troubleshooting

60 minutes

In this course, you will learn how to view configuration information, monitor processes, and collect diagnostic data on AWS Identity and Access Management (IAM). You’ll also learn how to use this information to help resolve common issues and provide effective details on your support case if you need to escalate an issue to AWS Support.

AWS Managed Services (AMS): Overview of Patch Management

600 minutes

AMS operates AWS on behalf of customers. AMS provides a secure and compliant AWS landing zone, a proven enterprise operating model, continuous cost optimization, and day-to-day infrastructure management. In this courseYou will learn the AMS patch management process and how to configure a patch maintenance window using tags.

AMS: access management

270 minutes

AMS operates AWS on behalf of its customers. AMS provides a secure and compliant AWS landing zone, a proven enterprise operating model, continuous cost optimization, and day-to-day infrastructure management. In this courseYou will learn how AMS interacts with your identity provider to grant you access to your resources in AMS.

AWS Cybersecurity

Advanced AMS: Disaster Recovery

15 minutes

Disaster preparedness is essential to any organization’s business continuity planning. AMS Advanced customers partner with AMS Advanced to design, implement and test a disaster recovery strategy tailored to their business operations. In this courseYou’ll learn the benefits of implementing disaster recovery with AMS Advanced and how to perform the most common disaster recovery tasks.

More resources:



Source link

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button