Share your details for best career advice.
01 Mar 2025 | 24 | 06:00 PM - 09:00 PM | Sat, Sun | |
02 Mar 2025 | 24 | 06:00 PM - 09:00 PM | Sat, Sun | |
08 Mar 2025 | 24 | 06:00 PM - 09:00 PM | Sat, Sun | |
09 Mar 2025 | 24 | 06:00 PM - 09:00 PM | Sat, Sun |
Course Price At
01 Mar 2025 | 24 | 06:00 PM - 09:00 PM | Sat, Sun | |
02 Mar 2025 | 24 | 06:00 PM - 09:00 PM | Sat, Sun | |
08 Mar 2025 | 24 | 06:00 PM - 09:00 PM | Sat, Sun | |
09 Mar 2025 | 24 | 06:00 PM - 09:00 PM | Sat, Sun |
Course Price At
Online Self Learning Courses are designed for self-directed training, allowing participants to begin at their convenience with structured training and review exercises to reinforce learning. You’ll learn through videos, PPTs and complete assignments, projects and other activities designed to enhance learning outcomes, all at times that are most convenient to you.
Course Price At
AWS Certified Security - Specialty is an advanced certification for IT professionals focusing on securing AWS environments. It validates expertise in data protection, identity and access management, infrastructure security, and threat detection on AWS. Ideal for cloud security roles, it demonstrates an in-depth understanding of AWS’s security best practices, enabling professionals to safeguard cloud applications and data effectively.
1.1 Design and implement an incident response plan
1.2 Detect security threats and anomalies by using AWS services
1.3 Respond to compromised resources and workloads
2.1 Design and Implement monitoring and alerting to address security events
2.2 Troubleshoot security monitoring and alerting
2.3 Design and implement a logging solution
2.4 Troubleshoot logging solutions
2.5 Design a log analysis solution
3.1 Design and implement security controls for edge services
3.2 Design and implement network security controls
3.3 Design and implement security controls for compute workloads
4.1 Design, implement and troubleshoot authentication for AWS resources
4.2 Design, implement and troubleshoot authorization for AWS resources
5.1 Design and implement controls that provide confidentiality and integrity for data in transit
5.2 Design and implement controls that provide confidentiality and integrity for data at rest
5.3 Design and implement controls to manage the data lifecycle at rest
5.4 Design and implement controls to protect credentials, secrets, and cryptographic key materials
You’ll learn about data encryption, IAM, incident response, threat detection, compliance, and secure network design in AWS.