• Home
  • 9
  • AWS Cloud Security Expert ( SCS-C01 )

AWS Cloud Security Expert(SCS-C01)

The AWS Cloud Security (SCS-C01) course offers targeted training on securing Amazon Web Services (AWS) environments. Participants learn to design and implement security measures, manage identity and access, and ensure compliance within the AWS cloud. The course covers key topics such as risk assessment, data protection, and threat detection, providing hands-on experience with AWS security tools and best practices. It prepares professionals to effectively safeguard cloud resources and succeed in the SCS-C01 certification exam.

Training Calender

Start Date
End Date
Start-End Time
Batch Type
Training Mode
Batch Status
Start Learning
27th Sep 2024
25th Nov 2024
09:00 - 13:00 IST
Weekend
Online
(Open)
Enroll Now

Course Syllabus

Domain 1: (Threat Detection and Incident Response)

Design and implement an incident response plan

 

• Incident Response Strategy
• Roles and responsibilities in IR plan specific to cloud incidents.
• Use case 1: Credentials compromise.
• Use case 2: Compromised EC2 Instances
• Playbooks and Runbooks for IR
• AWS Specific services helpful in Incident Response
• Third-party integration concepts
• Centralize security finding with security hub

Detect security threats and anomalies by using AWS services

• Threat detection services specific to AWS
• Visualizing and Detecting anomalies and correlation techniques
• Evaluate finding from security services
• Performing queries for validating security events
• Create metrics filters and dashboards to detect Anomalous activity

Respond to compromised resources and workloads

• AWS Security IR Guide
• Automating remediation by using AWS services
• Compromised resource management.
• Investigating and analyzing to conduct Root cause and log analysis.
• Capturing relevant forensics data from a compromised resource
• Protecting and preserving forensic artifacts
• Post-incident recovery

Domain 2: (Security Logging and Monitoring)

Design and Implement monitoring and alerting to address security events

• Key AWS services for monitoring and alerting
• Monitoring metrics and baselines
• Analyzing environments and workloads to determine monitoring

requirements according to business and security requirements

• Setting up tools and scripts to perform regular audits
Troubleshoot security monitoring and alerting
• Configuring of monitoring services and collecting event data
• Application monitoring, alerting, and visibility challenges

Design and implement a logging solution

• Key logging services and attributes
• Log destinations, Ingestion points and lifecycle management
• Logging specific to services and applications

Troubleshoot logging solutions

• AWS services that provide data sources and logging capabilities
• Access permissions that are necessary for logging
• Identifying misconfigurations and remediations specific to logging
• Reasons for missing logs and performing remediation steps

Design a log analysis solution

• Services and tools to analyze captured logs
• Identifying patterns in logs to indicate anomalies and known threats
• Log analysis features for AWS services
• Log format and components
• Normalizing, parsing, and correlating logs

Domain 3: (Infrastructure Security)

Design and implement security controls for edge services

• Define edge security strategies and security features
• Select proper edge services based on anticipated threats and attacks
and define proper Protection mechanisms based on that
• Define layered Defense (Defense in Depth) mechanisms
• Applying restrictions based on different criteria
• Enable logging and monitoring across edge services to indicate attacks
• VPC security mechanisms including Security Groups, NACLs, and Network
firewall
• Traffic Mirroring and VPC Flow Logs

Design and implement network security controls

• VPC Security mechanisms and implement network segmentation based
on security requirements
• Network traffic management and segmentation
• Inter-VPC connectivity, Traffic isolation, and VPN concepts and deployment
• Peering and Transit Gateway
• AWS Point to Site and Site to Site VPN, Direct Connect
• Continuous optimization by identifying and removing unnecessary network access.

Design and implement security controls for compute workloads

• Provisioning and maintenance of EC2 instances
• Create hardened images and backups
• Applying instance and service roles for defining permissions
• Host-based security mechanisms
Vulnerability assessment using AWS Inspector
• Passing secrets and credentials security to computing workloads
Troubleshoot network security
Identifying, interpreting, and prioritizing network connectivity
and analyzing reachability
Analyse log sources to identify problems
Network traffic sampling using traffic mirroring
• Identity and Access Management
• Establish identity through an authentication system based on requirements.
• Managed Identities, Identity federation
• AWS Identity center, IAM and Cognito
• MFA, Conditional access, STS
• Troubleshoot authentication issues

Domain 4: (Identity and Access Management)

Design, implement and troubleshoot authentication for AWS resources
IAM policies and types

• Policy structure and troubleshooting
• Troubleshoot authorization issues
• ABAC and RBAC strategies
• Principle of least privilege and Separation of duties
• Investigate unintended permissions, authorization, or privileges

Domain 5: (Data Protection)

Design and implement controls that provide
confidentiality and integrity for data in transit

Design secure connectivity between AWS and on-premises networks

• Design mechanisms to require encryption when connecting to resources.
• Requiring DIT encryption for AWS API calls.
• Design mechanisms to forward traffic over secure connections.
• Designing cross-region networking

Design and implement controls that provide confidentiality and integrity for data at rest
Encryption and integrity concepts

• Resource policies
• Configure services to activate encryption for data at rest and to protect data
integrity by preventing Modifications.
• Cloud HSM and KMS

Design and implement controls to manage the data lifecycle at rest
Lifecycle policies and configurations

• Automated life cycle management
• Establishing schedules and retention for AWS backup across AWS services.

Design and implement controls to protect credentials, secrets,and cryptographic key materials
Designing management and rotation of secrets for workloads using a
secret manager

• Designing KMS key policies to limit key usage to authorized users.
• Establishing mechanisms to import and remove customer-provider key material

Domain 6: ( Management and Security Governance)

Design a strategy to centrally deploy and manage AWS accounts

• Multi account strategies using AWS organization and Control tower
• SCPs and Policy multi-account policy enforcement
• Centralized management of security services and aggregation of findings
• Securing root account access

Implement a secure and consistent deployment strategy for
cloud resources

• Deployment best practices with Infrastructure as a code
• Tagging and metadata
• Configure and deploy portfolios of approved AWS services.
• Securely sharing resources across AWS accounts
• Visibility and control over AWS infrastructure

Our Reviews

What Says Our Happy Clients

CyberHunt IT Solutions stands out as a premier institution for anyone aspiring to build a career in cybersecurity. From their comprehensive curriculum to hands-on training, they offer an unparalleled learning experience that equips students with both theoretical knowledge and practical skills.

Nikhil kannale

Cyberhunt IT solutions is one of the best institutes that I have seen. It is the perfect place if you want to prepare for Cybersecurity (SOC). They have well-maintained classes as well as highly managed labs. The support for placement is best they have.
Highly recommended.

Jitendra Mahto

One of the bestest institute to start your career in cyber security domain. I had a great learning experience here all thanks to Bhosle sir and team for all the support. His teaching Skills and efforts for placement of students are commendable. I highly recommend this institute to achive your goals.

Deepti Patil

Very Highly Hands on Experince on Cyber Security By Mr. Datta. and also have onsite Hands on Experince.
Very good enveroment and good staff and Highly recommended if any one is looking career in Cyber Security.

Ajay Bhosle

I had a great time doing Cyber Security course here and made me a great experience. They take a good care of students and regarding placements too. This institution helps the students to get a good opportunity to explore more.

Sowmya r

I had the best experience here. I had completed cyber security training here. They take a good care of students and regarding placements too. They keep evolving themselves to the new infrastructure. The credit system that this institute follows is very unique and students get a good opportunity to explore more.

Shubham

START LEARNING

Still Unsure ? Contact us  & we will get back to you.

Let’s Connect

Email Information

Trainings: trainings@cyberhuntit.com

Business : sales@cyberhuntit.com

Recruitment information / General – hr@cyberhuntit.com

Address

Meridian Plaza, office No-301A, 3rd floor, Ameerpet Rd, Greenlands, Begumpet, Hyderabad, Telangana 500016