<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE FL_Course SYSTEM "https://www.flane.de/dtd/fl_course095.dtd"><?xml-stylesheet type="text/xsl" href="https://portal.flane.ch/css/xml-course.xsl"?><course productid="12377" language="en" source="https://portal.flane.ch/swisscom/en/xml-course/amazon-awsso" lastchanged="2026-03-16T13:33:51+01:00" parent="https://portal.flane.ch/swisscom/en/xml-courses"><title>Security Engineering on AWS</title><productcode>AWSSO</productcode><vendorcode>AW</vendorcode><vendorname>Amazon Web Services</vendorname><fullproductcode>AW-AWSSO</fullproductcode><version>3.0.0</version><objective>&lt;p&gt;In this course, you will:
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;State an understanding of AWS cloud security based on the CIA triad.&lt;/li&gt;&lt;li&gt;Create and analyze authentication and authorizations with IAM.&lt;/li&gt;&lt;li&gt;Manage and provision accounts on AWS with appropriate AWS services.&lt;/li&gt;&lt;li&gt;Identify how to manage secrets using AWS services.&lt;/li&gt;&lt;li&gt;Monitor sensitive information and protect data via encryption and access controls.&lt;/li&gt;&lt;li&gt;Identify AWS services that address attacks from external sources.&lt;/li&gt;&lt;li&gt;Monitor, generate, and collect logs.&lt;/li&gt;&lt;li&gt;Identify indicators of security incidents.&lt;/li&gt;&lt;li&gt;Identify how to investigate threats and mitigate using AWS services.&lt;/li&gt;&lt;/ul&gt;</objective><essentials>&lt;p&gt;We recommend that attendees of this course have:
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Completed the following courses:&lt;ul&gt;
&lt;li&gt;&lt;span class=&quot;cms-link-marked&quot;&gt;&lt;a class=&quot;fl-href-prod&quot; href=&quot;/swisscom/en/course/amazon-sec-ess&quot;&gt;&lt;svg role=&quot;img&quot; aria-hidden=&quot;true&quot; focusable=&quot;false&quot; data-nosnippet class=&quot;cms-linkmark&quot;&gt;&lt;use xlink:href=&quot;/css/img/icnset-linkmarks.svg#linkmark&quot;&gt;&lt;/use&gt;&lt;/svg&gt;AWS Security Essentials &lt;span class=&quot;fl-prod-pcode&quot;&gt;(SEC-ESS)&lt;/span&gt;&lt;/a&gt;&lt;/span&gt; or&lt;/li&gt;&lt;li&gt;AWS Security Fundamentals (Second Edition) (digital) and&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;cms-link-marked&quot;&gt;&lt;a class=&quot;fl-href-prod&quot; href=&quot;/swisscom/en/course/amazon-awsa&quot;&gt;&lt;svg role=&quot;img&quot; aria-hidden=&quot;true&quot; focusable=&quot;false&quot; data-nosnippet class=&quot;cms-linkmark&quot;&gt;&lt;use xlink:href=&quot;/css/img/icnset-linkmarks.svg#linkmark&quot;&gt;&lt;/use&gt;&lt;/svg&gt;Architecting on AWS &lt;span class=&quot;fl-prod-pcode&quot;&gt;(AWSA)&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;li&gt;Working knowledge of IT security practices and infrastructure concepts.&lt;/li&gt;&lt;li&gt;Familiarity with the AWS Cloud.&lt;/li&gt;&lt;/ul&gt;</essentials><audience>&lt;p&gt;This course is intended for:
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Security engineers&lt;/li&gt;&lt;li&gt;Security architects&lt;/li&gt;&lt;li&gt;Cloud architects&lt;/li&gt;&lt;li&gt;Cloud operators working across all global segments.&lt;/li&gt;&lt;/ul&gt;</audience><contents>&lt;p&gt;&lt;strong&gt;Day 1&lt;/strong&gt;&lt;/p&gt;
&lt;h5&gt;Module 1: Security Overview and Review&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Explain Security in the AWS Cloud.&lt;/li&gt;&lt;li&gt;Explain AWS Shared Responsibility Model.&lt;/li&gt;&lt;li&gt;Summarize IAM, Data Protection, and Threat Detection and Response.&lt;/li&gt;&lt;li&gt;State the different ways to interact with AWS using the console, CLI, and SDKs.&lt;/li&gt;&lt;li&gt;Describe how to use MFA for extra protection.&lt;/li&gt;&lt;li&gt;State how to protect the root user account and access keys.&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Module 2: Securing Entry Points on AWS&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Describe how to use multi-factor authentication (MFA) for extra protection.&lt;/li&gt;&lt;li&gt;Describe how to protect the root user account and access keys.&lt;/li&gt;&lt;li&gt;Describe IAM policies, roles, policy components, and permission boundaries.&lt;/li&gt;&lt;li&gt;Explain how API requests can be logged and viewed using AWS CloudTrail and how to view and analyze access history.&lt;/li&gt;&lt;li&gt;Hands-On Lab: Using Identity and Resource Based Policies.&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Module 3: Account Management and Provisioning on AWS&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Explain how to manage multiple AWS accounts using AWS Organizations and AWS Control Tower.&lt;/li&gt;&lt;li&gt;Explain how to implement multi-account environments with AWS Control Tower.&lt;/li&gt;&lt;li&gt;Demonstrate the ability to use identity providers and brokers to acquire access to AWS services.&lt;/li&gt;&lt;li&gt;Explain the use of AWS IAM Identity Center (successor to AWS Single Sign-On) and AWS Directory Service.&lt;/li&gt;&lt;li&gt;Demonstrate the ability to manage domain user access with Directory Service and IAM Identity Center.&lt;/li&gt;&lt;li&gt;Hands-On Lab: Managing Domain User Access with AWS Directory Service&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Day 2&lt;/strong&gt;&lt;/p&gt;
&lt;h5&gt;Module 4: Secrets Management on AWS&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Describe and list the features of AWS KMS, CloudHSM, AWS Certificate Manager (ACM), and AWS Secrets Manager.&lt;/li&gt;&lt;li&gt;Demonstrate how to create a multi-Region AWS KMS key.&lt;/li&gt;&lt;li&gt;Demonstrate how to encrypt a Secrets Manager secret with an AWS KMS key.&lt;/li&gt;&lt;li&gt;Demonstrate how to use an encrypted secret to connect to an Amazon Relational Database Service (Amazon RDS) database in multiple AWS Regions&lt;/li&gt;&lt;li&gt;Hands-on lab: Lab 3: Using AWS KMS to Encrypt Secrets in Secrets Manager&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Module 5: Data Security&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Monitor data for sensitive information with Amazon Macie.&lt;/li&gt;&lt;li&gt;Describe how to protect data at rest through encryption and access controls.&lt;/li&gt;&lt;li&gt;Identify AWS services used to replicate data for protection.&lt;/li&gt;&lt;li&gt;Determine how to protect data after it has been archived.&lt;/li&gt;&lt;li&gt;Hands-on lab: Lab 4: Data Security in Amazon S3&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Module 6: Infrastructure Edge Protection&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Describe the AWS features used to build secure infrastructure.&lt;/li&gt;&lt;li&gt;Describe the AWS services used to create resiliency during an attack.&lt;/li&gt;&lt;li&gt;Identify the AWS services used to protect workloads from external threats.&lt;/li&gt;&lt;li&gt;Compare the features of AWS Shield and AWS Shield Advanced.&lt;/li&gt;&lt;li&gt;Explain how centralized deployment for AWS Firewall Manager can enhance security.&lt;/li&gt;&lt;li&gt;Hands-on lab: Lab 5: Using AWS WAF to Mitigate Malicious Traffic&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Day 3&lt;/strong&gt;&lt;/p&gt;
&lt;h5&gt;Module 7: Monitoring and Collecting Logs on AWS&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Identify the value of generating and collecting logs.&lt;/li&gt;&lt;li&gt;Use Amazon Virtual Private Cloud (Amazon VPC) Flow Logs to monitor for security events.&lt;/li&gt;&lt;li&gt;Explain how to monitor for baseline deviations.&lt;/li&gt;&lt;li&gt;Describe Amazon EventBridge events.&lt;/li&gt;&lt;li&gt;Describe Amazon CloudWatch metrics and alarms.&lt;/li&gt;&lt;li&gt;List log analysis options and available techniques.&lt;/li&gt;&lt;li&gt;Identify use cases for using virtual private cloud (VPC) Traffic Mirroring.&lt;/li&gt;&lt;li&gt;Hands-on lab: Lab 6: Monitoring for and Responding to Security Incidents&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Module 8: Responding to Threats&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Classify incident types in incident response.&lt;/li&gt;&lt;li&gt;Understand incident response workflows.&lt;/li&gt;&lt;li&gt;Discover sources of information for incident response using AWS services.&lt;/li&gt;&lt;li&gt;Understand how to prepare for incidents.&lt;/li&gt;&lt;li&gt;Detect threats using AWS services.&lt;/li&gt;&lt;li&gt;Analyze and respond to security findings.&lt;/li&gt;&lt;li&gt;Hands-on lab: Lab 7: Incident Response&lt;/li&gt;&lt;/ul&gt;</contents><objective_plain>In this course, you will:



- State an understanding of AWS cloud security based on the CIA triad.
- Create and analyze authentication and authorizations with IAM.
- Manage and provision accounts on AWS with appropriate AWS services.
- Identify how to manage secrets using AWS services.
- Monitor sensitive information and protect data via encryption and access controls.
- Identify AWS services that address attacks from external sources.
- Monitor, generate, and collect logs.
- Identify indicators of security incidents.
- Identify how to investigate threats and mitigate using AWS services.</objective_plain><essentials_plain>We recommend that attendees of this course have:



- Completed the following courses:
- AWS Security Essentials (SEC-ESS) or
- AWS Security Fundamentals (Second Edition) (digital) and
- Architecting on AWS (AWSA)
- Working knowledge of IT security practices and infrastructure concepts.
- Familiarity with the AWS Cloud.</essentials_plain><audience_plain>This course is intended for:



- Security engineers
- Security architects
- Cloud architects
- Cloud operators working across all global segments.</audience_plain><contents_plain>Day 1

Module 1: Security Overview and Review


- Explain Security in the AWS Cloud.
- Explain AWS Shared Responsibility Model.
- Summarize IAM, Data Protection, and Threat Detection and Response.
- State the different ways to interact with AWS using the console, CLI, and SDKs.
- Describe how to use MFA for extra protection.
- State how to protect the root user account and access keys.
Module 2: Securing Entry Points on AWS


- Describe how to use multi-factor authentication (MFA) for extra protection.
- Describe how to protect the root user account and access keys.
- Describe IAM policies, roles, policy components, and permission boundaries.
- Explain how API requests can be logged and viewed using AWS CloudTrail and how to view and analyze access history.
- Hands-On Lab: Using Identity and Resource Based Policies.
Module 3: Account Management and Provisioning on AWS


- Explain how to manage multiple AWS accounts using AWS Organizations and AWS Control Tower.
- Explain how to implement multi-account environments with AWS Control Tower.
- Demonstrate the ability to use identity providers and brokers to acquire access to AWS services.
- Explain the use of AWS IAM Identity Center (successor to AWS Single Sign-On) and AWS Directory Service.
- Demonstrate the ability to manage domain user access with Directory Service and IAM Identity Center.
- Hands-On Lab: Managing Domain User Access with AWS Directory Service
Day 2

Module 4: Secrets Management on AWS


- Describe and list the features of AWS KMS, CloudHSM, AWS Certificate Manager (ACM), and AWS Secrets Manager.
- Demonstrate how to create a multi-Region AWS KMS key.
- Demonstrate how to encrypt a Secrets Manager secret with an AWS KMS key.
- Demonstrate how to use an encrypted secret to connect to an Amazon Relational Database Service (Amazon RDS) database in multiple AWS Regions
- Hands-on lab: Lab 3: Using AWS KMS to Encrypt Secrets in Secrets Manager
Module 5: Data Security


- Monitor data for sensitive information with Amazon Macie.
- Describe how to protect data at rest through encryption and access controls.
- Identify AWS services used to replicate data for protection.
- Determine how to protect data after it has been archived.
- Hands-on lab: Lab 4: Data Security in Amazon S3
Module 6: Infrastructure Edge Protection


- Describe the AWS features used to build secure infrastructure.
- Describe the AWS services used to create resiliency during an attack.
- Identify the AWS services used to protect workloads from external threats.
- Compare the features of AWS Shield and AWS Shield Advanced.
- Explain how centralized deployment for AWS Firewall Manager can enhance security.
- Hands-on lab: Lab 5: Using AWS WAF to Mitigate Malicious Traffic
Day 3

Module 7: Monitoring and Collecting Logs on AWS


- Identify the value of generating and collecting logs.
- Use Amazon Virtual Private Cloud (Amazon VPC) Flow Logs to monitor for security events.
- Explain how to monitor for baseline deviations.
- Describe Amazon EventBridge events.
- Describe Amazon CloudWatch metrics and alarms.
- List log analysis options and available techniques.
- Identify use cases for using virtual private cloud (VPC) Traffic Mirroring.
- Hands-on lab: Lab 6: Monitoring for and Responding to Security Incidents
Module 8: Responding to Threats


- Classify incident types in incident response.
- Understand incident response workflows.
- Discover sources of information for incident response using AWS services.
- Understand how to prepare for incidents.
- Detect threats using AWS services.
- Analyze and respond to security findings.
- Hands-on lab: Lab 7: Incident Response</contents_plain><duration unit="d" days="3">3 days</duration><pricelist><price country="SI" currency="EUR">1995.00</price><price country="KZ" currency="USD">1500.00</price><price country="KE" currency="USD">1480.00</price><price country="KW" currency="USD">1480.00</price><price country="DZ" currency="USD">1480.00</price><price country="MA" currency="USD">1480.00</price><price country="TN" currency="USD">1480.00</price><price country="LB" currency="USD">1480.00</price><price country="JO" currency="USD">1480.00</price><price country="LR" currency="USD">1480.00</price><price country="AE" currency="USD">1750.00</price><price country="SA" currency="USD">1750.00</price><price country="OM" currency="USD">1750.00</price><price country="QA" currency="USD">1750.00</price><price country="ZA" currency="USD">1380.00</price><price country="AR" currency="USD">1395.00</price><price country="CL" currency="USD">1395.00</price><price country="PE" currency="USD">1395.00</price><price country="CO" currency="USD">1485.00</price><price country="MX" currency="USD">1485.00</price><price country="BR" currency="USD">1485.00</price><price country="P3" currency="USD">1395.00</price><price country="PA" currency="USD">1395.00</price><price country="CR" currency="USD">1485.00</price><price country="DE" currency="EUR">2685.00</price><price country="US" currency="USD">2025.00</price><price country="SE" currency="EUR">2685.00</price><price country="AT" currency="EUR">2685.00</price><price country="RU" currency="RUB">127500.00</price><price country="SG" currency="USD">1895.00</price><price country="IL" currency="ILS">9320.00</price><price country="GR" currency="EUR">1995.00</price><price country="MK" currency="EUR">1995.00</price><price country="BE" currency="EUR">2195.00</price><price country="HU" currency="EUR">1995.00</price><price country="IT" currency="EUR">1650.00</price><price country="FR" currency="EUR">2510.00</price><price country="PL" currency="PLN">5200.00</price><price country="GB" currency="GBP">2655.00</price><price country="CH" currency="CHF">2470.00</price><price country="CA" currency="CAD">2795.00</price><price country="NL" currency="EUR">2395.00</price></pricelist><miles/></course>