Product Image

How to Build a Threat Detection Strategy in AWS

Joseph Holbrook, an AWS Subject Matter Expert(SME) will provide insight into “How to Build a Threat Detection Strategy in AWS” that every AWS Cloud administrator should know. Having a well implemented Threat Detection Strategy will enable your enterprise to prevent common exploits but also secure your AWS resources so that your minimizing the impact of any potential breaches that do occur as well.

Self-Paced

Modality

Amazon Web Services

Provider

Beginner

Difficulty

1 Hour

Duration

Course Info

Download PDF

Certificate

See Sample

tab
About Individual Course:
  • Individual course plan gives you access to this course
$99.00
/ Each
When you subscribe, you get:
learn Subscription plan gives you access to this course and over 167 other popular courses
On Sale!
Now Only $29.00 Regular Price $89.00
Now Only $29.00 Regular Price $89.00
/ Month

You have already taken demo for this course.

If you want to get access to demo again, feel free to contact our support at (855) 800-8240
Joseph Holbrook, an AWS Subject Matter Expert(SME) will provide insight into “How to Build a Threat Detection Strategy in AWS” that every AWS Cloud administrator should know. Having a well implemented Threat Detection Strategy will enable your enterprise to prevent common exploits but also secure your AWS resources so that your minimizing the impact of any potential breaches that do occur as well.

Course Information

About this course:

In this webinar Joseph Holbrook, an AWS Subject Matter Expert(SME) will provide insight into  “How to Build a Threat Detection Strategy in AWS”  that every AWS Cloud administrator should know.  Having a well implemented Threat Detection Strategy will enable your enterprise to prevent common exploits but also secure your AWS resources so that your minimizing the impact of any potential breaches that do occur as well.  In this webinar we will review several common Intrusion Detection Systems, Advanced Threat Detection Systems and other security tools that enable a proactive response to threats. Also, covered will be Amazon GuardDuty, which is a threat detection service that continuously monitors for malicious activity and unauthorized behavior to protect your AWS accounts and workloads. We will review how it can  immediately provide value by consuming multiple metadata streams at enterprise scale from numerous sources such as AWS CloudTrail, VPC Flow Logs, and DNS logs.

As an added bonus—We will discuss how AWS Lambda can be used to automate actions such as changing security groups, isolating instances, or rotating credentials to ease administrative burden.

Did you know?

AWS has direct and concise Cloud Adoption Framework (CAF) Security Perspective Controls that most enterprise could follow immediately to reduce their threat footprint.
That most security incidents actually occur because of credential theft (according to the 2018 Verizon Data Breach Investigations Report) not sophisticated zero-day attacks against cloud providers themselves.
In less than three months AWS has added twelve more anomaly detections of which nine are CloudTrail-based anomaly detections that identify highly suspicious activity in your accounts.
VPC Flow log entries can be scanned by GuardDuty to detect both specific and anomalous attack patterns.

Course Objective:

By the end of this Course you should be able to understand

  • Shared Security Model
  • Introduction to Threat Detection
  • Intrusion Detection Systems, Advanced Threat Detection Systems and other security tools that enable a proactive response to threats.
  • Building a Threat Reduction Strategy
  • Cloud Adoption Framework (CAF) Security Perspective Controls
  • AWS GuardDuty Monitoring (Demo)
  • AWS Security Specialty Certification
  • Course Summary

Audience:

  • Security practitioners (Security Analysts, Security Architects, Senior Security Engineers, etc.), Cloud Security Architects, and the office of the CISO.

Prerequisite:

  • There are no prerequisites required for this course

Career & Salary Insight

Outline

More Information

More Information
Manufacturer Amazon Web Services
Subjects Cloud Computing
Lab Access No
Technology AWS
Modality Self-Paced Learning
Learning Type Course
Difficulty Beginner
Duration 1 Hour
Language English

Acclaim Badge

Reviews

Write Your Own Review
Only registered users can write reviews. Please Sign in or create an account

Course Expert:

Author

Paul Jackson

 

Paul has over 2 decades of of technical experience as a senior engineer, operations manager & project lead.
He has had hands-on impact within internal IT infrastructure, as well as in hundreds of unique customer environments that resulted in an in-depth knowledge of a wide range of security, identity, cloud, and infrastructure products & features; and a breadth of knowledge in associated network devices and applications.

His specialties include:

Identity, AD, Azure AD, Azure AD Connect, Azure MFA, ADFS, WAP, e-Gap, IAG, UAG, Firewalls, DirectAccess, Load balancers, PKI, Troubleshooting application and network issues, quickly learning new applications/technologies, building and leading tech teams, project management, creating scalable processes.

click here