<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE FL_Course SYSTEM "https://www.flane.de/dtd/fl_course095.dtd"><?xml-stylesheet type="text/xsl" href="https://portal.flane.nl/css/xml-course.xsl"?><course productid="12377" language="en" source="https://portal.flane.nl/uu-its-smycl/en/xml-course/amazon-awsso" lastchanged="2026-03-16T13:33:51+01:00" parent="https://portal.flane.nl/uu-its-smycl/en/xml-courses"><title>Security Engineering on AWS</title><productcode>AWSSO</productcode><vendorcode>AW</vendorcode><vendorname>Amazon Web Services</vendorname><fullproductcode>AW-AWSSO</fullproductcode><version>3.0.0</version><objective>&lt;p&gt;This course is designed to teach you how to: 
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Use the AWS shared security responsibility model&lt;/li&gt;&lt;li&gt;Architect and build AWS application infrastructures that are protected against the most common security threats&lt;/li&gt;&lt;li&gt;Use encryption to protect data at rest and in transit&lt;/li&gt;&lt;li&gt;Apply security checks and analyses in an automated and reproducible way&lt;/li&gt;&lt;li&gt;Configure authentication for resources and applications in the AWS Cloud&lt;/li&gt;&lt;li&gt;Gain insight into events by capturing, monitoring, processing, and analyzing logs&lt;/li&gt;&lt;li&gt;Identify and mitigate incoming threats against applications and data&lt;/li&gt;&lt;li&gt;Perform security assessments to ensure that common vulnerabilities are patched and security best practices are applied&lt;/li&gt;&lt;/ul&gt;</objective><essentials>&lt;p&gt;We recommend that attendees of this course have: 
&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Working knowledge of IT security practices and infrastructure concepts&lt;/li&gt;&lt;li&gt;Familiarity with cloud computing concepts&lt;/li&gt;&lt;li&gt;Completed &lt;span class=&quot;cms-link-marked&quot;&gt;&lt;a class=&quot;fl-href-prod&quot; href=&quot;/uu-its-smycl/en/course/amazon-cp-ess&quot;&gt;&lt;svg role=&quot;img&quot; aria-hidden=&quot;true&quot; focusable=&quot;false&quot; data-nosnippet class=&quot;cms-linkmark&quot;&gt;&lt;use xlink:href=&quot;/css/img/icnset-linkmarks.svg#linkmark&quot;&gt;&lt;/use&gt;&lt;/svg&gt;AWS Cloud Practitioner Essentials &lt;span class=&quot;fl-prod-pcode&quot;&gt;(CP-ESS)&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;, AWS Security Fundamentals digital training, and &lt;span class=&quot;cms-link-marked&quot;&gt;&lt;a class=&quot;fl-href-prod&quot; href=&quot;/uu-its-smycl/en/course/amazon-awsa&quot;&gt;&lt;svg role=&quot;img&quot; aria-hidden=&quot;true&quot; focusable=&quot;false&quot; data-nosnippet class=&quot;cms-linkmark&quot;&gt;&lt;use xlink:href=&quot;/css/img/icnset-linkmarks.svg#linkmark&quot;&gt;&lt;/use&gt;&lt;/svg&gt;Architecting on AWS &lt;span class=&quot;fl-prod-pcode&quot;&gt;(AWSA)&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;</essentials><audience>&lt;p&gt;This course is intended for: 
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Security Engineers&lt;/li&gt;&lt;li&gt;Security Architects&lt;/li&gt;&lt;li&gt;Information Security professionals&lt;/li&gt;&lt;/ul&gt;</audience><outline>&lt;p&gt;&lt;em&gt;Day One &lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Module 0: Course introduction &lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Security in the AWS Cloud&lt;/li&gt;&lt;li&gt;AWS Shared Responsibility Model&lt;/li&gt;&lt;li&gt;Incident response overview&lt;/li&gt;&lt;li&gt;DevOps with security engineering&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Module 1: Identifying entry points on AWS &lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Identify the different ways to access the AWS platform&lt;/li&gt;&lt;li&gt;Understanding IAM policies&lt;/li&gt;&lt;li&gt;IAM permissions boundary&lt;/li&gt;&lt;li&gt;Multi-factor authentication&lt;/li&gt;&lt;li&gt;AWS CloudTrail&lt;/li&gt;&lt;li&gt;Hands-on lab 1: Cross-account access&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Module 2: Security considerations: web application environments &lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Threats in a three-tier architecture&lt;/li&gt;&lt;li&gt;Common threats: User access&lt;/li&gt;&lt;li&gt;Common threats: Data access&lt;/li&gt;&lt;li&gt;AWS Trusted Advisor&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Module 3: Application security &lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Dedicated Amazon EC2 instances and hosts&lt;/li&gt;&lt;li&gt;Amazon machine images (AMIs)&lt;/li&gt;&lt;li&gt;Amazon Inspector&lt;/li&gt;&lt;li&gt;AWS Systems Manager&lt;/li&gt;&lt;li&gt;Hands-on lab 2: Using AWS Systems Manager and Amazon Inspector&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Module 4: Securing network communications &amp;ndash; part 1 &lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Amazon VPC security considerations&lt;/li&gt;&lt;li&gt;Responding to compromised instances&lt;/li&gt;&lt;li&gt;Elastic Load Balancing&lt;/li&gt;&lt;li&gt;AWS Certificate Manager (ACM)&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;em&gt;Day Two &lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Module 5: Data security &lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Data protection strategies&lt;/li&gt;&lt;li&gt;Encryption on AWS&lt;/li&gt;&lt;li&gt;Protecting data at rest with Amazon S3, Amazon RDS, and Amazon DynamoDB&lt;/li&gt;&lt;li&gt;Protecting archived data with Amazon S3 Glacier&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Module 6: Security considerations: hybrid environments &lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;AWS site-to-site and client VPN connections&lt;/li&gt;&lt;li&gt;AWS Direct Connect (DX)&lt;/li&gt;&lt;li&gt;AWS Transit Gateway&lt;/li&gt;&lt;li&gt;AWS Storage Gateway&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Module 7: Monitoring and collecting logs on AWS &lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Amazon CloudWatch and CloudWatch Logs&lt;/li&gt;&lt;li&gt;AWS Config&lt;/li&gt;&lt;li&gt;Amazon CloudWatch logs&lt;/li&gt;&lt;li&gt;Amazon VPC Flow logs&lt;/li&gt;&lt;li&gt;Amazon S3 server access logs&lt;/li&gt;&lt;li&gt;ELB access logs&lt;/li&gt;&lt;li&gt;Hands-on lab 3 part 1: Server log analysis &amp;ndash; log collection&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Module 8: Processing Logs on AWS&lt;/strong&gt; 
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Amazon Kinesis for log processing&lt;/li&gt;&lt;li&gt;Amazon Athena for log processing&lt;/li&gt;&lt;li&gt;Hands-on lab 3 part 2: Server log analysis &amp;ndash; log analysis&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Module 9: Securing network communications &amp;ndash; part 2 &lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Amazon VPC peering&lt;/li&gt;&lt;li&gt;Amazon VPC endpoints&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Module 10: Out-of-region protection &lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Denial of service threats overview&lt;/li&gt;&lt;li&gt;Amazon Route 53&lt;/li&gt;&lt;li&gt;AWS WAF&lt;/li&gt;&lt;li&gt;Amazon CloudFront&lt;/li&gt;&lt;li&gt;AWS Shield&lt;/li&gt;&lt;li&gt;AWS Firewall Manager&lt;/li&gt;&lt;li&gt;DDoS mitigation on AWS&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;em&gt;Day Three &lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Module 11: Account management on AWS &lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;AWS Organizations&lt;/li&gt;&lt;li&gt;AWS Control Tower&lt;/li&gt;&lt;li&gt;AWS Single Sign-On (AWS SSO)&lt;/li&gt;&lt;li&gt;AWS Directory Service&lt;/li&gt;&lt;li&gt;Hands-on lab 4: Federated access with ADFS&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Module 12: Security considerations: serverless environments&lt;/strong&gt; 
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Amazon Cognito&lt;/li&gt;&lt;li&gt;Amazon API Gateway&lt;/li&gt;&lt;li&gt;Secure messaging with Amazon SQS and Amazon SNS&lt;/li&gt;&lt;li&gt;AWS Lambda&lt;/li&gt;&lt;li&gt;Hands-on lab 5: Monitor and respond with AWS Lambda and AWS Config&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Module 13: Secrets Management on AWS &lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;AWS Key Management Service (AWS KMS)&lt;/li&gt;&lt;li&gt;AWS CloudHSM&lt;/li&gt;&lt;li&gt;AWS Secrets Manager&lt;/li&gt;&lt;li&gt;Hands-on lab 6: Using AWS KMS&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Module 14: Automating security on AWS &lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;AWS CloudFormation&lt;/li&gt;&lt;li&gt;AWS Service Catalog&lt;/li&gt;&lt;li&gt;Hands-on lab 7: Security automation on AWS with AWS Service Catalog&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Module 15: Threat detection and sensitive data monitoring &lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Amazon GuardDuty&lt;/li&gt;&lt;li&gt;Amazon Macie&lt;/li&gt;&lt;/ul&gt;</outline><objective_plain>This course is designed to teach you how to: 



- Use the AWS shared security responsibility model
- Architect and build AWS application infrastructures that are protected against the most common security threats
- Use encryption to protect data at rest and in transit
- Apply security checks and analyses in an automated and reproducible way
- Configure authentication for resources and applications in the AWS Cloud
- Gain insight into events by capturing, monitoring, processing, and analyzing logs
- Identify and mitigate incoming threats against applications and data
- Perform security assessments to ensure that common vulnerabilities are patched and security best practices are applied</objective_plain><essentials_plain>We recommend that attendees of this course have: 


- Working knowledge of IT security practices and infrastructure concepts
- Familiarity with cloud computing concepts
- Completed AWS Cloud Practitioner Essentials (CP-ESS), AWS Security Fundamentals digital training, and Architecting on AWS (AWSA)</essentials_plain><audience_plain>This course is intended for: 



- Security Engineers
- Security Architects
- Information Security professionals</audience_plain><outline_plain>Day One 

Module 0: Course introduction 



- Security in the AWS Cloud
- AWS Shared Responsibility Model
- Incident response overview
- DevOps with security engineering
Module 1: Identifying entry points on AWS 



- Identify the different ways to access the AWS platform
- Understanding IAM policies
- IAM permissions boundary
- Multi-factor authentication
- AWS CloudTrail
- Hands-on lab 1: Cross-account access
Module 2: Security considerations: web application environments 



- Threats in a three-tier architecture
- Common threats: User access
- Common threats: Data access
- AWS Trusted Advisor
Module 3: Application security 



- Dedicated Amazon EC2 instances and hosts
- Amazon machine images (AMIs)
- Amazon Inspector
- AWS Systems Manager
- Hands-on lab 2: Using AWS Systems Manager and Amazon Inspector
Module 4: Securing network communications – part 1 



- Amazon VPC security considerations
- Responding to compromised instances
- Elastic Load Balancing
- AWS Certificate Manager (ACM)
Day Two 

Module 5: Data security 



- Data protection strategies
- Encryption on AWS
- Protecting data at rest with Amazon S3, Amazon RDS, and Amazon DynamoDB
- Protecting archived data with Amazon S3 Glacier
Module 6: Security considerations: hybrid environments 



- AWS site-to-site and client VPN connections
- AWS Direct Connect (DX)
- AWS Transit Gateway
- AWS Storage Gateway
Module 7: Monitoring and collecting logs on AWS 



- Amazon CloudWatch and CloudWatch Logs
- AWS Config
- Amazon CloudWatch logs
- Amazon VPC Flow logs
- Amazon S3 server access logs
- ELB access logs
- Hands-on lab 3 part 1: Server log analysis – log collection
Module 8: Processing Logs on AWS 



- Amazon Kinesis for log processing
- Amazon Athena for log processing
- Hands-on lab 3 part 2: Server log analysis – log analysis
Module 9: Securing network communications – part 2 



- Amazon VPC peering
- Amazon VPC endpoints
Module 10: Out-of-region protection 



- Denial of service threats overview
- Amazon Route 53
- AWS WAF
- Amazon CloudFront
- AWS Shield
- AWS Firewall Manager
- DDoS mitigation on AWS
Day Three 

Module 11: Account management on AWS 



- AWS Organizations
- AWS Control Tower
- AWS Single Sign-On (AWS SSO)
- AWS Directory Service
- Hands-on lab 4: Federated access with ADFS
Module 12: Security considerations: serverless environments 



- Amazon Cognito
- Amazon API Gateway
- Secure messaging with Amazon SQS and Amazon SNS
- AWS Lambda
- Hands-on lab 5: Monitor and respond with AWS Lambda and AWS Config
Module 13: Secrets Management on AWS 



- AWS Key Management Service (AWS KMS)
- AWS CloudHSM
- AWS Secrets Manager
- Hands-on lab 6: Using AWS KMS
Module 14: Automating security on AWS 



- AWS CloudFormation
- AWS Service Catalog
- Hands-on lab 7: Security automation on AWS with AWS Service Catalog
Module 15: Threat detection and sensitive data monitoring 



- Amazon GuardDuty
- Amazon Macie</outline_plain><duration unit="d" days="3">3 days</duration><pricelist><price country="SI" currency="EUR">1995.00</price><price country="KZ" currency="USD">1500.00</price><price country="KE" currency="USD">1480.00</price><price country="KW" currency="USD">1480.00</price><price country="DZ" currency="USD">1480.00</price><price country="MA" currency="USD">1480.00</price><price country="TN" currency="USD">1480.00</price><price country="LB" currency="USD">1480.00</price><price country="JO" currency="USD">1480.00</price><price country="LR" currency="USD">1480.00</price><price country="AE" currency="USD">1750.00</price><price country="SA" currency="USD">1750.00</price><price country="OM" currency="USD">1750.00</price><price country="QA" currency="USD">1750.00</price><price country="ZA" currency="USD">1380.00</price><price country="AR" currency="USD">1395.00</price><price country="CL" currency="USD">1395.00</price><price country="PE" currency="USD">1395.00</price><price country="CO" currency="USD">1485.00</price><price country="MX" currency="USD">1485.00</price><price country="BR" currency="USD">1485.00</price><price country="P3" currency="USD">1395.00</price><price country="PA" currency="USD">1395.00</price><price country="CR" currency="USD">1485.00</price><price country="DE" currency="EUR">2685.00</price><price country="US" currency="USD">2025.00</price><price country="SE" currency="EUR">2685.00</price><price country="AT" currency="EUR">2685.00</price><price country="RU" currency="RUB">127500.00</price><price country="SG" currency="USD">1895.00</price><price country="IL" currency="ILS">9320.00</price><price country="GR" currency="EUR">1995.00</price><price country="MK" currency="EUR">1995.00</price><price country="BE" currency="EUR">2195.00</price><price country="HU" currency="EUR">1995.00</price><price country="IT" currency="EUR">1650.00</price><price country="FR" currency="EUR">2510.00</price><price country="PL" currency="PLN">5200.00</price><price country="GB" currency="GBP">2655.00</price><price country="CH" currency="CHF">2470.00</price><price country="CA" currency="CAD">2795.00</price><price country="NL" currency="EUR">2395.00</price></pricelist><miles/></course>