SlideShare a Scribd company logo
1 of 7
Download to read offline
AWS Certified Security-
Specialty Certification
Certified By AWS.
2 A Great Place For Education | Vepsun.in
Let’s Learn!
Technology doesn’t innovate. People do. That is the reason we put individuals first, so we
can engage them to arrive at their maximum capacity with innovation.
The fast pace of innovation and business today requests a learning approach that fits the
necessities of both the individual and the organization. We built a learning system to
reflect that need. Adapting today requires a guided methodology through the intricate
number of formal and casual learning alternatives. It requires a methodology that
envelops the top learning techniques utilized today and adjusts them to help hierarchical
results.
Our learning ecosystem is designed to support how learning is done today and evolves to
meet advances in technology and individual learning needs. Integrating the world’s largest
collection of proprietary and IT partner content, resources, and expertise with a global
instructor pool of more than 300 real-world experts, Vepsun Technologies delivers custom
learning to global organizations no matter where their workforce is located to drive
quantifiable results..
3 A Great Place For Education | Vepsun.in
Executive Program in AWS Certified Security-Specialty Certified by Amazon Web
Services(AWS).
4 A Great Place For Education | Vepsun.in
Cloud Security Introduction
 Cloud Security fundamentals
 AWS security model
 Shared Responsibility
 Exam Outline
02 Learning Path
Incident Response
 Given an AWS abuse notice, evaluate the
suspected compromised instance or
exposed access keys.
 Preparation stages for incident response
 Mitigation steps to perform Incident
response steps
 Verify that the Incident Response plan
includes relevant AWS services.
 Dealing with exposed access keys
 Evaluated suspected compromised EC2
Instances
 Evaluate the configuration of automated
alerting, and execute possible remediation
of security-related incidents and emerging
issues.
 AWS Guard duty
 Penetration testing
01 Learning Path
5 A Great Place For Education | Vepsun.in
03 Learning Path
Logging and Monitoring (VPC)
 Design and implement security monitoring
and alerting.
 Design and implement a logging solution.
 Continuous Security Monitoring
 Introduction to Vulnerability Assessment
 AWS Inspector
 AWS Inspector Assessment targets
 AWS EC2 systems manager
 AWS Config
 Understanding CloudWatch
 VPC Flow Logs
 CloudWatch Events
 AWS Cloud Trail
 AWS Macie
 AWS Detective
 AWS Security Hub
 S3 Event notifications
 Trusted advisor recommendations
 Troubleshoot security monitoring and alerting.
 Troubleshoot logging solutions.
04 Learning Path
 Infrastructure Security
 Design edge security on AWS.
 Design and implement a secure network
infrastructure.
 AWS Organizations
 Managing OUs
 CloudFront
 AWS CloudFront Custom SSL
 Firewalls
 Security groups
 Network ACLs
 IPS/IDS concepts in cloud
 AWS Web Application Firewall (WAF)
 AWS Shield concepts
 DDoS Mitigation
 Network Segmentation
 Bastion Hosts
 Virtual Private Cloud (VPC)
 VPC Endpoints
 EC2 Tenancy
 Compliance Frameworks
 AWS lambda fundamentals
 AWS Simple Email Service
 AWS Route53 DNS
 Troubleshoot a secure network infrastructure
 Design and implement host-based security
6 A Great Place For Education | Vepsun.in
05 Learning Path
Identity and Access Management
 Design and implement a scalable authorization and authentication system to access AWS
resources.
 Understand the Principle of Least Privilege
 IAM Policies
 IAM JSON Policy Elements
 IAM Roles
 IAM Permission boundaries
 Evaluating effective permissions
 Understanding Delegation
 Cross account policies & roles
 Understanding Federation
 AWS Directory services
 AWS Organizations
 Single Sign-On
 SAML Overview Concepts
 S3 Security
 Cross Account S3 access
 S3 Versioning
 S3 MFA delete
 AWS License manager
 Troubleshoot an authorization and authentication system to access AWS resources.
06 Learning Path
Data Protection
 Design and implement key management and
use
 Cryptography fundamentals
 Cryptography fundamentals
 Cloud Hardware Security Module (HSM)
 AWS Key Management Service (KMS)
 Envelope Encryption
 KMS Authentication and Access Control
 CloudTrail and Encryption
 EBS Architecture and Secure Data Wiping
 S3 Encryption
 AWS Certificate Manager
 ELB- ALB and NLB
 Docker and container security fundamentals
 AWS Glacier
 Troubleshoot key management.
 Design and implement a data encryption
solution for data at rest and data in transit.
7 A Great Place For Education | Vepsun.in
Enroll Now
INR. 39,990*
AWS Advanced
* Inclusive of all Taxes
COMPANY INFORMATION
Vepsun Technologies Pvt . Ldt.
1st Floor, 104, S R Arcade, 6th
Cross, Marathahalli, Bangalore -
560037.
Mail: - info@vepsun.com
Contact No. : 090 36363 007 / 090 35353 007
Website: https://vepsun.in/
AWS Security
INR. 39,990*
* Inclusive of all Taxes
Enroll Now

More Related Content

What's hot

A Tale of Security & Ops Teamwork for Rapid Security Incident Resolution
A Tale of Security & Ops Teamwork for Rapid Security Incident ResolutionA Tale of Security & Ops Teamwork for Rapid Security Incident Resolution
A Tale of Security & Ops Teamwork for Rapid Security Incident ResolutionAmazon Web Services
 
Security Best Practices - Transformation Day Public Sector London 2017
Security Best Practices - Transformation Day Public Sector London 2017Security Best Practices - Transformation Day Public Sector London 2017
Security Best Practices - Transformation Day Public Sector London 2017Amazon Web Services
 
Cloud assessments by :- Aakash Goel
Cloud assessments  by :- Aakash GoelCloud assessments  by :- Aakash Goel
Cloud assessments by :- Aakash GoelOWASP Delhi
 
Security Threats, the Cloud and Your Responsibilities - Evident.io @AWS Pop-u...
Security Threats, the Cloud and Your Responsibilities - Evident.io @AWS Pop-u...Security Threats, the Cloud and Your Responsibilities - Evident.io @AWS Pop-u...
Security Threats, the Cloud and Your Responsibilities - Evident.io @AWS Pop-u...Evident.io
 
Stop Wasting Your Time: Focus on Security Practices that Actually Matter
Stop Wasting Your Time: Focus on Security Practices that Actually MatterStop Wasting Your Time: Focus on Security Practices that Actually Matter
Stop Wasting Your Time: Focus on Security Practices that Actually MatterAmazon Web Services
 
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019 AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019 Amazon Web Services
 
Security Spotlight: The Coca Cola Company - CSS ATX 2017
Security Spotlight: The Coca Cola Company - CSS ATX 2017Security Spotlight: The Coca Cola Company - CSS ATX 2017
Security Spotlight: The Coca Cola Company - CSS ATX 2017Alert Logic
 
Velocity 2015-tim-prendergast-continuous-security-the-devops-way
Velocity 2015-tim-prendergast-continuous-security-the-devops-wayVelocity 2015-tim-prendergast-continuous-security-the-devops-way
Velocity 2015-tim-prendergast-continuous-security-the-devops-wayEvident.io
 
AWS re:Inforce 2021 re:Cap 1
AWS re:Inforce 2021 re:Cap 1 AWS re:Inforce 2021 re:Cap 1
AWS re:Inforce 2021 re:Cap 1 Hayato Kiriyama
 
2016 AWS Healthcare Days | Nashville, TN – May 3,2016
2016 AWS Healthcare Days | Nashville, TN – May 3,20162016 AWS Healthcare Days | Nashville, TN – May 3,2016
2016 AWS Healthcare Days | Nashville, TN – May 3,2016Amazon Web Services
 
Top Security Myths Dispelled - AWS Summit Sydney 2018
Top Security Myths Dispelled - AWS Summit Sydney 2018 Top Security Myths Dispelled - AWS Summit Sydney 2018
Top Security Myths Dispelled - AWS Summit Sydney 2018 Amazon Web Services
 
GDPR - Top 10 AWS Security and Compliance Best Practices
GDPR - Top 10 AWS Security and Compliance Best PracticesGDPR - Top 10 AWS Security and Compliance Best Practices
GDPR - Top 10 AWS Security and Compliance Best PracticesAhmad Khan
 
Pariveda Solutions - Thawing the Frozen Middle
Pariveda Solutions - Thawing the Frozen MiddlePariveda Solutions - Thawing the Frozen Middle
Pariveda Solutions - Thawing the Frozen MiddleAlert Logic
 
Threat detection and mitigation at AWS
Threat detection and mitigation at AWSThreat detection and mitigation at AWS
Threat detection and mitigation at AWSNathan Case
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Incident Response - Finding a Needle in a Stack of Needles
Incident Response - Finding a Needle in a Stack of NeedlesIncident Response - Finding a Needle in a Stack of Needles
Incident Response - Finding a Needle in a Stack of NeedlesAmazon Web Services
 
CSS17: Atlanta - Realities of Security in the Cloud
CSS17: Atlanta - Realities of Security in the CloudCSS17: Atlanta - Realities of Security in the Cloud
CSS17: Atlanta - Realities of Security in the CloudAlert Logic
 
Top Cloud Security Myths Dispelled
Top Cloud Security Myths DispelledTop Cloud Security Myths Dispelled
Top Cloud Security Myths DispelledAmazon Web Services
 
Cloud Security Training Crash Course
Cloud Security Training Crash CourseCloud Security Training Crash Course
Cloud Security Training Crash CourseBryan Len
 

What's hot (20)

A Tale of Security & Ops Teamwork for Rapid Security Incident Resolution
A Tale of Security & Ops Teamwork for Rapid Security Incident ResolutionA Tale of Security & Ops Teamwork for Rapid Security Incident Resolution
A Tale of Security & Ops Teamwork for Rapid Security Incident Resolution
 
Security Best Practices - Transformation Day Public Sector London 2017
Security Best Practices - Transformation Day Public Sector London 2017Security Best Practices - Transformation Day Public Sector London 2017
Security Best Practices - Transformation Day Public Sector London 2017
 
Cloud assessments by :- Aakash Goel
Cloud assessments  by :- Aakash GoelCloud assessments  by :- Aakash Goel
Cloud assessments by :- Aakash Goel
 
Security Threats, the Cloud and Your Responsibilities - Evident.io @AWS Pop-u...
Security Threats, the Cloud and Your Responsibilities - Evident.io @AWS Pop-u...Security Threats, the Cloud and Your Responsibilities - Evident.io @AWS Pop-u...
Security Threats, the Cloud and Your Responsibilities - Evident.io @AWS Pop-u...
 
Stop Wasting Your Time: Focus on Security Practices that Actually Matter
Stop Wasting Your Time: Focus on Security Practices that Actually MatterStop Wasting Your Time: Focus on Security Practices that Actually Matter
Stop Wasting Your Time: Focus on Security Practices that Actually Matter
 
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019 AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
 
Security Spotlight: The Coca Cola Company - CSS ATX 2017
Security Spotlight: The Coca Cola Company - CSS ATX 2017Security Spotlight: The Coca Cola Company - CSS ATX 2017
Security Spotlight: The Coca Cola Company - CSS ATX 2017
 
Velocity 2015-tim-prendergast-continuous-security-the-devops-way
Velocity 2015-tim-prendergast-continuous-security-the-devops-wayVelocity 2015-tim-prendergast-continuous-security-the-devops-way
Velocity 2015-tim-prendergast-continuous-security-the-devops-way
 
AWS re:Inforce 2021 re:Cap 1
AWS re:Inforce 2021 re:Cap 1 AWS re:Inforce 2021 re:Cap 1
AWS re:Inforce 2021 re:Cap 1
 
Security in the cloud
Security in the cloudSecurity in the cloud
Security in the cloud
 
2016 AWS Healthcare Days | Nashville, TN – May 3,2016
2016 AWS Healthcare Days | Nashville, TN – May 3,20162016 AWS Healthcare Days | Nashville, TN – May 3,2016
2016 AWS Healthcare Days | Nashville, TN – May 3,2016
 
Top Security Myths Dispelled - AWS Summit Sydney 2018
Top Security Myths Dispelled - AWS Summit Sydney 2018 Top Security Myths Dispelled - AWS Summit Sydney 2018
Top Security Myths Dispelled - AWS Summit Sydney 2018
 
GDPR - Top 10 AWS Security and Compliance Best Practices
GDPR - Top 10 AWS Security and Compliance Best PracticesGDPR - Top 10 AWS Security and Compliance Best Practices
GDPR - Top 10 AWS Security and Compliance Best Practices
 
Pariveda Solutions - Thawing the Frozen Middle
Pariveda Solutions - Thawing the Frozen MiddlePariveda Solutions - Thawing the Frozen Middle
Pariveda Solutions - Thawing the Frozen Middle
 
Threat detection and mitigation at AWS
Threat detection and mitigation at AWSThreat detection and mitigation at AWS
Threat detection and mitigation at AWS
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Incident Response - Finding a Needle in a Stack of Needles
Incident Response - Finding a Needle in a Stack of NeedlesIncident Response - Finding a Needle in a Stack of Needles
Incident Response - Finding a Needle in a Stack of Needles
 
CSS17: Atlanta - Realities of Security in the Cloud
CSS17: Atlanta - Realities of Security in the CloudCSS17: Atlanta - Realities of Security in the Cloud
CSS17: Atlanta - Realities of Security in the Cloud
 
Top Cloud Security Myths Dispelled
Top Cloud Security Myths DispelledTop Cloud Security Myths Dispelled
Top Cloud Security Myths Dispelled
 
Cloud Security Training Crash Course
Cloud Security Training Crash CourseCloud Security Training Crash Course
Cloud Security Training Crash Course
 

Similar to Aws certified-security

All About AWS Security Course
All About AWS Security CourseAll About AWS Security Course
All About AWS Security Courseinfosec train
 
(SEC303) Architecting for End-To-End Security in the Enterprise
(SEC303) Architecting for End-To-End Security in the Enterprise(SEC303) Architecting for End-To-End Security in the Enterprise
(SEC303) Architecting for End-To-End Security in the EnterpriseAmazon Web Services
 
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS BuildersAWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS BuildersJames Strong
 
Top learnings from AWS Security.pdf
Top learnings from AWS Security.pdfTop learnings from AWS Security.pdf
Top learnings from AWS Security.pdfinfosec train
 
Frequently Asked Questions in the AWS Security Interview.pptx
Frequently Asked Questions in the AWS Security Interview.pptxFrequently Asked Questions in the AWS Security Interview.pptx
Frequently Asked Questions in the AWS Security Interview.pptxInfosectrain3
 
Frequently Asked Questions in the AWS Security Interview.pptx
Frequently Asked Questions in the AWS Security Interview.pptxFrequently Asked Questions in the AWS Security Interview.pptx
Frequently Asked Questions in the AWS Security Interview.pptxinfosec train
 
Top 15 aws security interview questions
Top 15 aws security interview questionsTop 15 aws security interview questions
Top 15 aws security interview questionsShivamSharma909
 
Sicurezza e Compliance nel Cloud
Sicurezza e Compliance nel CloudSicurezza e Compliance nel Cloud
Sicurezza e Compliance nel CloudAmazon Web Services
 
Aws security-pillar
Aws security-pillarAws security-pillar
Aws security-pillarsaifam
 
Managing Security with AWS | AWS Public Sector Summit 2017
Managing Security with AWS | AWS Public Sector Summit 2017Managing Security with AWS | AWS Public Sector Summit 2017
Managing Security with AWS | AWS Public Sector Summit 2017Amazon Web Services
 
Journey Through the Cloud - Security Best Practices on AWS
Journey Through the Cloud - Security Best Practices on AWSJourney Through the Cloud - Security Best Practices on AWS
Journey Through the Cloud - Security Best Practices on AWSAmazon Web Services
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS SecurityAmazon Web Services
 
AWS Certification Guide
AWS Certification GuideAWS Certification Guide
AWS Certification Guideinfosec train
 

Similar to Aws certified-security (20)

Awsdevops
AwsdevopsAwsdevops
Awsdevops
 
Awsdevops
AwsdevopsAwsdevops
Awsdevops
 
Awsdevops
AwsdevopsAwsdevops
Awsdevops
 
Awsdevops
AwsdevopsAwsdevops
Awsdevops
 
All About AWS Security Course
All About AWS Security CourseAll About AWS Security Course
All About AWS Security Course
 
(SEC303) Architecting for End-To-End Security in the Enterprise
(SEC303) Architecting for End-To-End Security in the Enterprise(SEC303) Architecting for End-To-End Security in the Enterprise
(SEC303) Architecting for End-To-End Security in the Enterprise
 
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS BuildersAWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
 
Top learnings from AWS Security.pdf
Top learnings from AWS Security.pdfTop learnings from AWS Security.pdf
Top learnings from AWS Security.pdf
 
Frequently Asked Questions in the AWS Security Interview.pptx
Frequently Asked Questions in the AWS Security Interview.pptxFrequently Asked Questions in the AWS Security Interview.pptx
Frequently Asked Questions in the AWS Security Interview.pptx
 
Frequently Asked Questions in the AWS Security Interview.pptx
Frequently Asked Questions in the AWS Security Interview.pptxFrequently Asked Questions in the AWS Security Interview.pptx
Frequently Asked Questions in the AWS Security Interview.pptx
 
Top 15 aws security interview questions
Top 15 aws security interview questionsTop 15 aws security interview questions
Top 15 aws security interview questions
 
Sicurezza e Compliance nel Cloud
Sicurezza e Compliance nel CloudSicurezza e Compliance nel Cloud
Sicurezza e Compliance nel Cloud
 
Aws security-pillar
Aws security-pillarAws security-pillar
Aws security-pillar
 
Aws security-pillar
Aws security-pillarAws security-pillar
Aws security-pillar
 
Managing Security with AWS | AWS Public Sector Summit 2017
Managing Security with AWS | AWS Public Sector Summit 2017Managing Security with AWS | AWS Public Sector Summit 2017
Managing Security with AWS | AWS Public Sector Summit 2017
 
Journey Through the Cloud - Security Best Practices on AWS
Journey Through the Cloud - Security Best Practices on AWSJourney Through the Cloud - Security Best Practices on AWS
Journey Through the Cloud - Security Best Practices on AWS
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
 
Aws certification guide
Aws certification guideAws certification guide
Aws certification guide
 
AWS Certification Guide
AWS Certification GuideAWS Certification Guide
AWS Certification Guide
 
Security & Compliance in AWS
Security & Compliance in AWSSecurity & Compliance in AWS
Security & Compliance in AWS
 

More from kartikaryan4

More from kartikaryan4 (7)

Ai
AiAi
Ai
 
Ai
AiAi
Ai
 
Ai
AiAi
Ai
 
Ai
AiAi
Ai
 
Ai
AiAi
Ai
 
Aws certified-security
Aws certified-securityAws certified-security
Aws certified-security
 
Artificial Intelligence Certification
Artificial Intelligence CertificationArtificial Intelligence Certification
Artificial Intelligence Certification
 

Recently uploaded

Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
Philosophy of china and it's charactistics
Philosophy of china and it's charactisticsPhilosophy of china and it's charactistics
Philosophy of china and it's charactisticshameyhk98
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 

Recently uploaded (20)

Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Philosophy of china and it's charactistics
Philosophy of china and it's charactisticsPhilosophy of china and it's charactistics
Philosophy of china and it's charactistics
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 

Aws certified-security

  • 1. AWS Certified Security- Specialty Certification Certified By AWS.
  • 2. 2 A Great Place For Education | Vepsun.in Let’s Learn! Technology doesn’t innovate. People do. That is the reason we put individuals first, so we can engage them to arrive at their maximum capacity with innovation. The fast pace of innovation and business today requests a learning approach that fits the necessities of both the individual and the organization. We built a learning system to reflect that need. Adapting today requires a guided methodology through the intricate number of formal and casual learning alternatives. It requires a methodology that envelops the top learning techniques utilized today and adjusts them to help hierarchical results. Our learning ecosystem is designed to support how learning is done today and evolves to meet advances in technology and individual learning needs. Integrating the world’s largest collection of proprietary and IT partner content, resources, and expertise with a global instructor pool of more than 300 real-world experts, Vepsun Technologies delivers custom learning to global organizations no matter where their workforce is located to drive quantifiable results..
  • 3. 3 A Great Place For Education | Vepsun.in Executive Program in AWS Certified Security-Specialty Certified by Amazon Web Services(AWS).
  • 4. 4 A Great Place For Education | Vepsun.in Cloud Security Introduction  Cloud Security fundamentals  AWS security model  Shared Responsibility  Exam Outline 02 Learning Path Incident Response  Given an AWS abuse notice, evaluate the suspected compromised instance or exposed access keys.  Preparation stages for incident response  Mitigation steps to perform Incident response steps  Verify that the Incident Response plan includes relevant AWS services.  Dealing with exposed access keys  Evaluated suspected compromised EC2 Instances  Evaluate the configuration of automated alerting, and execute possible remediation of security-related incidents and emerging issues.  AWS Guard duty  Penetration testing 01 Learning Path
  • 5. 5 A Great Place For Education | Vepsun.in 03 Learning Path Logging and Monitoring (VPC)  Design and implement security monitoring and alerting.  Design and implement a logging solution.  Continuous Security Monitoring  Introduction to Vulnerability Assessment  AWS Inspector  AWS Inspector Assessment targets  AWS EC2 systems manager  AWS Config  Understanding CloudWatch  VPC Flow Logs  CloudWatch Events  AWS Cloud Trail  AWS Macie  AWS Detective  AWS Security Hub  S3 Event notifications  Trusted advisor recommendations  Troubleshoot security monitoring and alerting.  Troubleshoot logging solutions. 04 Learning Path  Infrastructure Security  Design edge security on AWS.  Design and implement a secure network infrastructure.  AWS Organizations  Managing OUs  CloudFront  AWS CloudFront Custom SSL  Firewalls  Security groups  Network ACLs  IPS/IDS concepts in cloud  AWS Web Application Firewall (WAF)  AWS Shield concepts  DDoS Mitigation  Network Segmentation  Bastion Hosts  Virtual Private Cloud (VPC)  VPC Endpoints  EC2 Tenancy  Compliance Frameworks  AWS lambda fundamentals  AWS Simple Email Service  AWS Route53 DNS  Troubleshoot a secure network infrastructure  Design and implement host-based security
  • 6. 6 A Great Place For Education | Vepsun.in 05 Learning Path Identity and Access Management  Design and implement a scalable authorization and authentication system to access AWS resources.  Understand the Principle of Least Privilege  IAM Policies  IAM JSON Policy Elements  IAM Roles  IAM Permission boundaries  Evaluating effective permissions  Understanding Delegation  Cross account policies & roles  Understanding Federation  AWS Directory services  AWS Organizations  Single Sign-On  SAML Overview Concepts  S3 Security  Cross Account S3 access  S3 Versioning  S3 MFA delete  AWS License manager  Troubleshoot an authorization and authentication system to access AWS resources. 06 Learning Path Data Protection  Design and implement key management and use  Cryptography fundamentals  Cryptography fundamentals  Cloud Hardware Security Module (HSM)  AWS Key Management Service (KMS)  Envelope Encryption  KMS Authentication and Access Control  CloudTrail and Encryption  EBS Architecture and Secure Data Wiping  S3 Encryption  AWS Certificate Manager  ELB- ALB and NLB  Docker and container security fundamentals  AWS Glacier  Troubleshoot key management.  Design and implement a data encryption solution for data at rest and data in transit.
  • 7. 7 A Great Place For Education | Vepsun.in Enroll Now INR. 39,990* AWS Advanced * Inclusive of all Taxes COMPANY INFORMATION Vepsun Technologies Pvt . Ldt. 1st Floor, 104, S R Arcade, 6th Cross, Marathahalli, Bangalore - 560037. Mail: - info@vepsun.com Contact No. : 090 36363 007 / 090 35353 007 Website: https://vepsun.in/ AWS Security INR. 39,990* * Inclusive of all Taxes Enroll Now