AWS Certified Security – Specialty ( Security Engineering on AWS )/SCS-C01


AWS Certified Security – Specialty ( Security Engineering on AWS ) Certification Training Course Overview

The Security Engineering on AWS training course will give a detailed overview of using AWS security services to stay secure in the AWS Cloud. During the training you will learn about AWS recommended security practices, security features of AWS key services including compute, storage, networking, and database services. You will also learn how to leverage AWS services and tools for automation, continuous monitoring and logging, and responding to security incidents.

Who should do Security Engineering on AWS training?

  • Security engineers
  • Security architects

AWS exam can be taken from home.
This course prepares you for Exam SCS-C01. Download Course Contents Test your current knowledge Qubits

AWS Certified Security – Specialty ( Security Engineering on AWS ) Course schedule & Prices

Schedule & Prices
Course Details Schedule
Live Virtual Classroom (Instructor-Led)
Duration : 3 Days (6 Days for 4 Hours/Day)
Fee : USD 1,300 (Includes Taxes)



June

8 Hours/Day
01-03
07-09
08-10
14-16
22-24
01-08
07-13
08-15
14-20
22-29
July

8 Hours/Day
06-08
12-14
13-15
19-21
27-29
06-13
12-18
13-20
19-25
27-03
August

8 Hours/Day
03-05
09-11
10-12
16-18
24-26
03-10
09-15
10-17
16-22
24-31
Fly-Me-a-Trainer
Duration : 3 Days
Fee : On Request
Client's Location
As per mutual convenience
Classroom Training (Available: London, Dubai, India, Sydney, Vancouver)
Duration : 3 Days
Fee : On Request
On Request

Enquire Now




Input symbols

Course Prerequisites

  • AWS Cloud Practitioner
  • AWS Security Fundamentals
  • Architecting on AWS


Upon completion of this training, you will know:

  • AWS shared security responsibility model
  • Architect and build AWS application infrastructures protected against security threats
  • Protecting data at rest and in transit with encryption
  • Apply security checks and analyses in an automated and reproducible manner
  • Configure authentication for resources and applications in the AWS Cloud
  • Gain insight into events by capturing, monitoring, processing, and analyzing logs
  • Identify and mitigate incoming threats against applications and data
  • Perform security assessments to ensure that common vulnerabilities are patched and security best practices are applied