Career Path
Becoming a Cloud Solution Architectand Cloud Security Engineer Training
Begin Cloud Solution Architect Career as an Absolute Beginner with knowledge in | Architecting Fundamentals | AWS Networking | Compute | Storage | Database Services | Monitoring and Logging | Automation | Containers | Serverless Architecture | Backup and Recovery
100% Live Session
Hands-on Trainings
Career Path Overview
Who should Participate
- Anybody who wants to Learn Cloud Solutions Architecture
- IT Professionals
- Software Architects
- System Administrators
- DevOps Engineers
- Business and IT
- Managers
- Cloud Enthusiasts
- Students and Graduates
- Experienced Cloud Professionals
- Certification Seekers
- Career changers with some computer background
- Career changers with no computer knowledge
What You Will Learn
Identify AWS architecting best practices
Summarize the fundamentals of account security
Identify strategies to build a secure virtual network that includes private and public subnets
Practice building a multi-tier architecture in AWS
Develop skills to architect secure virtual networks with private and public subnets
Learn to choose the right compute resources for different business needs
Explore AWS backup, recovery solutions, and best practices to ensure resiliency and business continuity
Gain Skills
This course would equip you with a range of skills and competencies needed to become a proficient Cloud Architecture Professional
Prepare for Jobs
This training journey will equip you with the skills needed for diverse roles in becoming a Cloud Architecture Professional
Key Skills
- Cloud Platform Expertise
- Infrastructure as Code (IaC)
- Security Best Practices
- Scalability and Performance Optimization
- Resilience and High Availability
- Networking in the Cloud
- Application Integration
- Cost Management
- Monitoring and Troubleshooting
- Compliance and Governance
- Documentation and Diagramming
- Soft Skills
- Certification Preparation
Job Roles
- Cloud Solutions Architect
- Cloud Engineers
- Cloud Security Architect
- Cloud Security Engineer
- Cloud Consultant
- DevOps Architect
- DevOps Engineer
- System Integrator
- Technical Account Manager
- AWS Trainer or Educator
- Cloud Security Expert
- Infrastructure Architect
- Cloud Sales and Purchase Manager
Prerequisites
- Basic Computer Knowledge
- Desire to master Cloud Architecture
- Access to Stable Internet
- Access to AWS Account
Courses Included In This Career Path
- Class Preparation
- Course overview
- AWS services
- AWS infrastructure
- AWS Well-Architected Framework
- Explore and interact with the AWS Management Console and AWS Command Line Interface
- Principals and identities
- Access policies and Permission on AWS
- IP addressing
- VPC fundamentals
- VPC traffic security
- Compute services
- EC2 instances
- Storage for EC2 instances
- Amazon EC2 pricing options
- AWS Lambda
- Build your Amazon VPC infrastructure
- Storage services
- Elastic Block Storage
- Amazon S3
- Shared file systems
- Data migration tools
- Database services
- Amazon RDS
- Amazon DynamoDB
- Amazon Aurora
- Database caching
- Database migration tools
- Create a database layer in your Amazon VPC infrastructure
- Monitoring
- Alarms and events
- Load balancing
- Auto scaling
- Configure high availability in your Amazon VPC
- AWS CloudFormation
- AWS Boto3
- Microservices
- Containers
- Container services
- VPC endpoints
- VPC peering
- Hybrid Connectivity
- AWS Client VPN
- Site-to-site VPN
- AWS Direct Connect
- AWS Organization
- Managing multiple accounts
- Multiple-account Strategies
- AWS Identity Center Management(SSO)
- AWS Control Tower
- AWS Transit Gateway
- AWS Resource Access Manager
- AWS PrivateLink
- Configuring AWS Transit Gateway
- AWS VPC Endpoint Connectivities
- What is serverless?
- Amazon API Gateway
- Amazon SQS
- Amazon SNS
- Amazon Kinesis
- AWS Step Functions
- Build a serverless architecture
- Edge fundamentals
- Amazon Route 53
- Amazon CloudFront
- High Availability and DDoS protection
- AWS WAF
- AWS Shield Advanced
- AWS Firewall
- Configure an Amazon CloudFront distribution with an Amazon S3 origin
- Disaster planning
- AWS Backup
- Recovery strategies
- Migration process
- Migration tools
- Migrating databases
- Migrating an on-premises NFS share using AWS DataSync and Storage Gateway
- Cloud cost management
- Cost management tools
- Cost optimization
- CI/CD
- Code services
- Deployment models
- AWS CloudFormation StackSets
- Build an AWS Multi-Tier architecture.
- Participants deploy a highly available architecture.
Career Path Overview
The surge in cyber threats and data breaches has put industry professionals on high alert. An increase in cyberattacks and data leaks remains top of mind for most industry personnel. This Security Engineering on AWS course addresses these concerns by helping you better understand how to interact and build with Amazon Web Services (AWS) in a secure way. In this course, you will learn about managing identities and roles, networking and infrastructure security, managing and provisioning accounts, protecting resources and services using aws tools and best practice, and monitoring API activity for anomalies. You will also learn about how to protect data stored on AWS. The course explores how you can generate, collect, and monitor logs to help identify security incidents. Finally, you will review detecting and investigating security incidents with AWS services.
Who should Participate
- Anybody who wants to Learn Cloud Solutions Architecture
- IT Professionals
- Security Engineers
- Security Architect
- Cloud Architects
- Software Architects
- System Administrators
- DevOps Engineers
- Business and IT
- Managers
- Cloud Enthusiasts
- Students and Graduates
- Experienced Cloud Professionals
- Certification Seekers
- Career changers with some computer background
- Career changers with no computer knowledge
What You Will Learn
Establish an understanding of AWS cloud security based on the CIA triad.
Create and analyze authentication and authorizations with IAM
Manage and provision accounts on AWS with appropriate AWS services.
Identify how to manage secrets using AWS services.
Monitor sensitive information and protect data via encryption and access controls.
Identify AWS services that address attacks from external sources.
Monitor, generate, and collect logs.
Identify indicators of security incidents.
Design and implement a secure network infrastructure
Identify how to investigate threats and mitigate using AWS services
Design and implement compute security
Design and implement a logging solution
Gain Skills
This course would equip you with a range of skills and competencies needed to become a proficient Cloud Architecture Professional
Prepare for Jobs
This training journey will equip you with the skills needed for diverse roles in becoming a Cloud Architecture Professional
Key Skills
- Cloud Platform Expertise
- Infrastructure as Code (IaC)
- Security Best Practices
- Scalability and Performance Optimization
- Resilience and High Availability
- Networking in the Cloud
- Application Integration
- Cost Management
- Monitoring and Troubleshooting
- Compliance and Governance
- Documentation and Diagramming
- Soft Skills
- Certification Preparation
Job Roles
- Cloud Solutions Architect
- Cloud Engineers
- Cloud Security Architect
- Cloud Security Engineer
- Cloud Consultant
- DevOps Architect
- DevOps Engineer
- System Integrator
- Technical Account Manager
- AWS Trainer or Educator
- Cloud Security Expert
- Infrastructure Architect
- Cloud Sales and Purchase Manager
Prerequisites
- Basic Computer Knowledge
- Desire to master Cloud Architecture
- Access to Stable Internet
- Access to AWS Account
Modules Included In This Career Path
- Security Fundamental
- Security in the Cloud
- Share Responsibility Model
- Security in the Cloud CategorizationÂ
- Security Framework
- Industry Framework and Security Standards
- Understand Well Architected Framework
- Ways to Interact with AWS
- AWS Identity and Access Management Fundamentals
- Securing the Root User Account
- Implementing Multi-Factor Authentication(MFA)
- Understanding IAM Policies and Permission Boundaries
- Use IAM roles with temporary access credentials
- Use IAM roles for Cross-Account Access
- Analyze policies and use least privileges
- Delegating and Constraining Permissions
- Detecting Anomaly IAM entity behavior with CloudtrailÂ
- Develop Visibility for IAM Access
- Managing Multiple AWS Accounts Individually
- Managing Multiple AWS Account with AWS Organization
- Managing Multiple AWS Account with Landing Zone and Control Tower
- Managing users and Permission with Federated Identity and IAM Identity Centers
- Amazon Cognito and Web Identity Providers
- Implement identity providers and brokers to grant access to AWS services.
- Implement AWS IAM Identity Center (successor to AWS Single Sign-On) and AWS Directory Service.
- Managing Domain User Access with AWS Directory Service and Okta
- Key Management on AWS Cloud
- Envelope encryption on AWS cloud
- Amazon EBS encryption with AWS KMS key
- Protecting Encryption Keys on AWS Cloud
- Import Key Material in AWS KMS
- Key Rotation, Multi-Region Keys and Multi-Factor Authentication
- CloudHSM
- AWS KMS custom Key stores with CloudHSM
- Custom Key Stores
- Protecting data in transit with certificate manager
- Understanding AWS Private Certificate Authority
- Understanding AWS Secret Manager
- Data Protection Strategies
- Data Protection in Amazon S3 and Amazon s3 security best practices
- Data Encryption for Amazon S3
- Access Control for Amazon S3
- Detect unintended access with Access Analyzer for Amazon S3
- Data resiliency for Amazon S3
- Monitor Sensitive data with Amazon Macie
- Integrates Macie with AWS organizations and AWS Security Hub
- Protection of Data at rest and in transit on Amazon RDS Databases
- Use Network isolation technique Amazon RDS
- Control Access to Amazon RDS services
- Cross-Region replication of Amazon RDS data
- Protection of Data at rest and in transit on Amazon DynamoDB Databases
- Cross-Region replication of Amazon DynamoDB data
- Protecting Data on EBS Volumes
- Protecting Archival Data in Amazon S3 Glacier
- Protecting Infrastructure inside the VPC
- Understand the different between security group and Network ACLs
- Understand the use of AWS Network Firewall
- Manage traffic flow in AWS
- Understand the use of AWS VPC endpoints
- Ensure reliability and availability of access to your resource
- Use cloudfront to prevent or restrict access to the origin source of your resources
- Connect request to your resources running on AWS with Route53
- Protect your resources on AWS from external threats with AWS WAF
- Setup AWS WAF rules and configures security groups across multiple accounts and resources
- Protect your resources against DDoS attacks
- Importance of security monitoring
- Monitor your AWS resources and network to identify threats
- Creating a Baseline with Amazon Detective
- Monitor misconfiguration and discover resources with AWS Config
- Building centralized logging strategy for AWS Cloud
- Understand the use of SIEM tools to get insight and analyze your security event logs
- Get more logs with VPC flow logs
- Capture details information about request sent to your Load Balancer with ELB Access Logs
- Tracking access to your s3 bucket with S3 Server access Logs
- Logging API activity with AWS CloudTrails
- Get visibility and alarms with AWS CloudWatch Logs
- Analyze the Logs capture with Amazon Kinesis
- Use Amazon Security Lake to centrally manage your security data from your entire organization.
- What is the incident response?
- Common types of security incidents
- Foundation of incident response
- Incident response preparation
- Incident response in the cloud
- Incident indicators
- Incident response workflows
- AWS Support for Incident response
- Understand the Security Incident response Simulations(SIRS) in AWSÂ
- Key Simulation Elements
- Why Perform SIRS?
- When to Contact AWS for Security Incidents response
- AWS Services that do not need Prior Approval for Penetration testings or scanning
- Using AWS Security Hub to gather and prioritize incident information
- Automated responses with Amazon EventBridgeÂ
- Use AWS Guard Duty to detect threats in the cloud
- Use AWS Inspector to detect Vulnerabilities in the cloud
- Use AWS Detective to Investigate the threat detected in AWS Cloud
- Respond to incident in the:
- Service Domain
- Infrastructure Domain
AWS Cloud Career Registration Form
Cloud Solutions Architect and Security Engineer Training
January 2024 Batch Demo:Â Dec 16, 2023, 9.00 am to 11.00 am CST
Class Starts:Â Â January 06, 2024 – April 27, 2024
Session: Wednesday 7:00 PM – to 9:00 PM, Saturday 9.00 AM – to 12:00 PM and Sunday 3.00 PM to 6.00 PM CST