Experience expert-led training delivered privately to your team either at your location or in an interactive virtual classroom. Our On-Site/Private Training options—including Virtual Team Training—is both cost-effective and convenient for your team of six or more. Get a no-obligation quote and details about how easy it is to give your team a private training experience. Call our Learning & Coaching Advocates at 929.777.8102, or email [email protected].
- Home
- Security Engineering on AWS

Upskilling Your Whole Team? Groups Always Save with Coveros!
Learn more about the value of private team training or contact us for group pricing on our regularly-scheduled Live Virtual and Public Classroom options.
Security Engineering on AWS
Part of the AWS Certified Security–Specialty certification path
Learn to efficiently use AWS security services to stay secure in the AWS Cloud. The course focuses on the recommended practices for enhancing the security of your data and systems in the cloud.
Upcoming Classes
Save on Private Training for Your Team
This course demonstrates how to efficiently use AWS security services to stay secure in the AWS Cloud. The course focuses on the security practices that AWS recommends for enhancing the security of your data and systems in the cloud. The course highlights the security features of AWS key services including compute, storage, networking, and database services. You will also learn how to leverage AWS services and tools for automation, continuous monitoring and logging, and responding to security incidents.
In this course, you will learn how to:
- Assimilate and leverage the AWS shared security responsibility model
- Architect and build AWS application infrastructures that are protected against the most common security threats
- Protect data at rest and in transit with encryption
- Apply security checks and analyses in an automated and reproducible manner
- Configure authentication for resources and applications in the AWS Cloud
- Gain insight into events by capturing, monitoring, processing, and analyzing logs
- Identify and mitigate incoming threats against applications and data
- Perform security assessments to ensure that common vulnerabilities are patched and security best practices are applied
Who Should Attend?
This course is intended for:
- Security engineers
- Security architects
- Information security professionals
Prerequisites
We recommend that attendees of this course have the following prerequisites:
- AWS Cloud Practitioner
- AWS Security Fundamentals
- Architecting on AWS
- Working knowledge of IT security practices and infrastructure concepts
- Familiarity with cloud computing concepts
Delivery Method
This course is delivered through a mix of:
- Classroom training
- Hands-on labs
- Group exercises
Hands-on Activity
This course allows you to test new skills and apply knowledge to your working environment through a variety of practical exercises.
Day 1
- Entry points on AWS
- Security considerations for Web Application environments
- Securing network communications inside the Amazon VPC
- Application security with incident response
Day 2
- Data security with incident response
- Security considerations for a hybrid environment
- AWS monitoring and log collecting
- Processing logs on AWS
- Protecting against threats outside of the Amazon VPC
Day 3
- Account management on AWS
- Security considerations for a serverless environment
- Secrets management on AWS
- Automating security and incident response on AWS
- Threat detection and sensitive data monitoring
Get hands-on experience with Chef, Vagrant, automation scripts, and more, in this one-day, follow-on course to...Learn more
Learn the most common DevOps patterns to develop, deploy, and maintain applications on the AWS platform, and explore the core principles of the...Learn more
Designed for systems administrator or DevOps roles, this course covers the specific AWS features and tools related to configuration and...Learn more
Don't see a date that fits your schedule? Contact us for scheduling options at 929.777.8102
This course demonstrates how to efficiently use AWS security services to stay secure in the AWS Cloud. The course focuses on the security practices that AWS recommends for enhancing the security of your data and systems in the cloud. The course highlights the security features of AWS key services including compute, storage, networking, and database services. You will also learn how to leverage AWS services and tools for automation, continuous monitoring and logging, and responding to security incidents.
In this course, you will learn how to:
- Assimilate and leverage the AWS shared security responsibility model
- Architect and build AWS application infrastructures that are protected against the most common security threats
- Protect data at rest and in transit with encryption
- Apply security checks and analyses in an automated and reproducible manner
- Configure authentication for resources and applications in the AWS Cloud
- Gain insight into events by capturing, monitoring, processing, and analyzing logs
- Identify and mitigate incoming threats against applications and data
- Perform security assessments to ensure that common vulnerabilities are patched and security best practices are applied
Who Should Attend?
This course is intended for:
- Security engineers
- Security architects
- Information security professionals
Prerequisites
We recommend that attendees of this course have the following prerequisites:
- AWS Cloud Practitioner
- AWS Security Fundamentals
- Architecting on AWS
- Working knowledge of IT security practices and infrastructure concepts
- Familiarity with cloud computing concepts
Delivery Method
This course is delivered through a mix of:
- Classroom training
- Hands-on labs
- Group exercises
Hands-on Activity
This course allows you to test new skills and apply knowledge to your working environment through a variety of practical exercises.
Day 1
- Entry points on AWS
- Security considerations for Web Application environments
- Securing network communications inside the Amazon VPC
- Application security with incident response
Day 2
- Data security with incident response
- Security considerations for a hybrid environment
- AWS monitoring and log collecting
- Processing logs on AWS
- Protecting against threats outside of the Amazon VPC
Day 3
- Account management on AWS
- Security considerations for a serverless environment
- Secrets management on AWS
- Automating security and incident response on AWS
- Threat detection and sensitive data monitoring
- Easy course access: Attend training right from your computer. Easy and quick access fits today’s working style and eliminates expensive travel and long days in the classroom.
- Live, expert instruction: Instructors are sought-after practitioners, highly-experienced in the industry who deliver a professional learning experience in real-time.
- Rich virtual learning environment: A variety of tools are built in to the learning platform to engage learners through dynamic delivery and to facilitate a multi-directional flow of information.
- Hands-on exercises: An essential component to any learning experience is applying what you have learned. Using the latest technology, your instructor can provide hands-on exercises, group activities, and breakout sessions.
- Real-time communication: Communicate real-time directly with the instructor. Ask questions, provide comments, and participate in the class discussions.
Bring this course to your team at your site. Contact us to learn more at 929.777.8102.
Save on Private Training for Your Team
Experience expert-led training delivered privately to your team either at your location or in an interactive virtual classroom. Our On-Site/Private Training options—including Virtual Team Training—is both cost-effective and convenient for your team of six or more. Get a no-obligation quote and details about how easy it is to give your team a private training experience. Call our Learning & Coaching Advocates at 929.777.8102, or email [email protected].
This course demonstrates how to efficiently use AWS security services to stay secure in the AWS Cloud. The course focuses on the security practices that AWS recommends for enhancing the security of your data and systems in the cloud. The course highlights the security features of AWS key services including compute, storage, networking, and database services. You will also learn how to leverage AWS services and tools for automation, continuous monitoring and logging, and responding to security incidents.
In this course, you will learn how to:
- Assimilate and leverage the AWS shared security responsibility model
- Architect and build AWS application infrastructures that are protected against the most common security threats
- Protect data at rest and in transit with encryption
- Apply security checks and analyses in an automated and reproducible manner
- Configure authentication for resources and applications in the AWS Cloud
- Gain insight into events by capturing, monitoring, processing, and analyzing logs
- Identify and mitigate incoming threats against applications and data
- Perform security assessments to ensure that common vulnerabilities are patched and security best practices are applied
Who Should Attend?
This course is intended for:
- Security engineers
- Security architects
- Information security professionals
Prerequisites
We recommend that attendees of this course have the following prerequisites:
- AWS Cloud Practitioner
- AWS Security Fundamentals
- Architecting on AWS
- Working knowledge of IT security practices and infrastructure concepts
- Familiarity with cloud computing concepts
Delivery Method
This course is delivered through a mix of:
- Classroom training
- Hands-on labs
- Group exercises
Hands-on Activity
This course allows you to test new skills and apply knowledge to your working environment through a variety of practical exercises.
Day 1
- Entry points on AWS
- Security considerations for Web Application environments
- Securing network communications inside the Amazon VPC
- Application security with incident response
Day 2
- Data security with incident response
- Security considerations for a hybrid environment
- AWS monitoring and log collecting
- Processing logs on AWS
- Protecting against threats outside of the Amazon VPC
Day 3
- Account management on AWS
- Security considerations for a serverless environment
- Secrets management on AWS
- Automating security and incident response on AWS
- Threat detection and sensitive data monitoring
Questions?
On-Site/Private Training
Let us bring the learning to your team at your location or in an interactive virtual classroom!
Choose from more than 50 courses.
Combine World-Class Training and
Certification with a Conference
Maximize Your Learning Potential
Never Miss a Thing.
Sign up for our mailing list and stay up to date
on training opportunities.