Instructor Guide
Instructor Guide
Instructor Guide
Version 1.0.2
100-ACSECF-10-EN-IG
© 2024, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Contents
Introduction 4
Bridging to Certification 32
© 2024, Amazon Web Services, Inc. or its affiliates. All rights reserved. 3
AWS Training and Certification Introduction
Welcome
Module timing estimates
Time estimates are as follows:
Estimated duration
Content
in minutes
Lecture (total for all slide sections) 40
Activity: AWS Documentation Scavenger Hunt 20
Total content delivery time 60
Module objectives
The purpose of this module is to introduce students to the AWS Academy Cloud Security Foundations
(ACSF) course prerequisites and objectives and provide an overview of what the course will cover.
© 2024, Amazon Web Services, Inc. or its affiliates. All rights reserved. 4
AWS Training and Certification Introduction
Course overview
This section introduces the modules that make up the course. Students are introduced to the content of
each module along with any activities, demonstrations, and labs that are contained in each module.
Course scenario
Slide 13 (Course scenario) prompts you to show the video that introduces the cloud migration journey
of a fictional bank, AnyBank. This scenario is used to introduce each module in this course in the context
of a series of meetings between the bank's Chief Technology Officer, María Garcia, and their Chief
Information Officer, John. The scenario provides a way to explore topics of cloud-computing security in
the context of relatable business needs. This scenario is intended to provide an example of real-world
applicability of the technical concepts that students will learn in this course.
You can find this video within this module’s section of the course materials.
© 2024, Amazon Web Services, Inc. or its affiliates. All rights reserved. 5
AWS Training and Certification Introduction
4. Where can you find links to learn how active AWS customers are using AWS within their
organizations?
A. On the main documentation page, go to the General Resources section.
B. Choose the Case Studies link.
C. On the Customer Success Stories page, scroll down to the cards section. Here you can
apply filters to find case studies based on location, industry, use case, and other
characteristics.
5. How might you navigate to the technical guide titled AWS Security Incident Response Guide?
There are multiple ways to find this guide, but the following are two options:
• Option 1
A. On the main documentation page, go to the General Resources section, and choose
the AWS Whitepapers link.
B. On the AWS Whitepapers & Guides page, in the filters, under Content Types, select
Technical Guide.
C. Under Technology Categories, select Security, Identity, & Compliance.
D. The AWS Security Incident Response Guide is one of the listed resources.
• Option 2
A. On the main documentation page, go to the Additional Resources section, and
choose the AWS Security Documentation link.
B. On the AWS Security Documentation page, go to the More Security Information
section, and choose the Security Resources link.
C. On the Security Learning page, in the filters, under Content Type, select Technical
Guide.
D. The AWS Security Incident Response Guide is one of the listed resources.
Additional resources
This module contains the following resource links:
• AWS Certified Security – Specialty Exam Guide
• AWS Certified Security – Specialty
• AWS Documentation
© 2024, Amazon Web Services, Inc. or its affiliates. All rights reserved. 6
AWS Training and Certification Introduction to Security on AWS
Estimated duration
Content
in minutes
Lecture (total for all slide sections) 55
Activity: Shared Responsibility Model 20
Sample exam question activity 5
Knowledge check 20
Total content delivery time 100
Module objectives
The purpose of this module is to introduce students to how to provide security in the AWS Cloud. The
second section introduces the concept of security, and the triad of confidentiality, integrity, and
availability, or CIA. The second section also recalls the benefits of cloud computing and introduces the
security models that are used in the cloud. The security principles section is based on the design
principles mentioned in the Security Pillar: AWS Well-Architected whitepaper. These principles provide
guidance and best practices on how to strengthen the security posture of the customer’s cloud
environment. This module also covers the AWS shared responsibility model, and identifies customer and
AWS responsibilities.
At the end of this module, students should be able to do the following:
• Identify security features and benefits of cloud computing.
• Identify the security principles that the AWS Cloud is structured around.
• Identify which part of an application the user is responsible to secure in the cloud.
Introduction
Slides 5–7 (Bank business scenario) introduce the business scenario that is used throughout the course,
framed within the context of the content that this module covers.
© 2024, Amazon Web Services, Inc. or its affiliates. All rights reserved. 7
AWS Training and Certification Introduction to Security on AWS
example, AWS CloudFormation can be used for the automation and agility elements. Later in the course,
when you discuss an AWS service, you can refer back to these elements.
© 2024, Amazon Web Services, Inc. or its affiliates. All rights reserved. 8
AWS Training and Certification Introduction to Security on AWS
© 2024, Amazon Web Services, Inc. or its affiliates. All rights reserved. 9
AWS Training and Certification Introduction to Security on AWS
Slide 28 (Shared responsibility example) focuses on the customer portion of the shared responsibility
model. It’s important for students to understand the role that they will play in their company’s security
infrastructure and what to expect from AWS.
Slide 29 (Security in the cloud) guides the students on how to put practices in place that influence
security. Customers maintain complete control over their content and are responsible for managing
critical security requirements. Customers control what security they choose to implement to protect
their own data, platform, applications, identity and access management, and operating system. This
means that the shared responsibility model changes depending on the AWS services that the customer
uses.
Slides 30–34 (Activity: Shared Responsibility Model) provide an activity to examine customer and AWS
responsibilities in the AWS shared responsibility model. Slides 31 and 33 contain architecture diagrams
with different AWS services and resources. For each scenario, lead the class in a conversation about who
is responsible for each component listed on the slide: AWS or the customer. Slides 32 and 34 provide
the answers.
It is always important to emphasize the “security in the cloud”, which is responsibility of the customer,
and the “security of the cloud”, which falls under AWS responsibility.
Slide 35 (Managed services organization) and slide 36 (MSO responsibility model) introduce the
students to the centralized governance model. Emphasize that this centralized team can be internal to
the organization (typically called a managed services organization, or MSO) or a third party (typically
called a managed service provider, or MSP). In either case, the primary roles and responsibilities of this
team are similar.
Module wrap-up
Knowledge check
After you present the Module summary slide, ask students to complete the knowledge check.
Sample exam question
Slide 39 (Sample exam question) displays the following question. The keywords have been underlined
for you here:
According to the shared responsibility model, who is responsible for configuring security group
rules to determine which ports are open to an EC2 Linux instance?
© 2024, Amazon Web Services, Inc. or its affiliates. All rights reserved. 10
AWS Training and Certification Introduction to Security on AWS
Prompt students to identify the keywords, and then discuss the plausibility of each answer.
Explanations of each answer choice:
• A: AWS maintains the configuration of its infrastructure devices, but the customer is responsible
for configuring their own guest operating systems (including networking traffic protection),
databases, and applications.
• B: The customer is responsible for controlling network access to EC2 instances, and security
group rules control access to EC2 instances. [correct answer]
• C: Security group rules filter traffic based on protocols and port numbers, and the customer is
responsible for configuring the networking traffic protection.
• D: AWS maintains the configuration of its infrastructure devices, but the customer is responsible
for configuring their own guest operating systems (including networking traffic protection),
databases, and applications.
Slide 42 (Sample exam question answer) displays the keywords. Click once to reveal the letter of the
correct answer.
The correct answer is B.
Additional resources
This module contains the following resource links:
• What Is Cloud Computing?
• Security Pillar: AWS Well-Architected Framework
• Shared Responsibility Model
• AWS Managed Service Provider (MSP) Program
© 2024, Amazon Web Services, Inc. or its affiliates. All rights reserved. 11
AWS Training and Certification Securing Access to Cloud Resources
Estimated duration
Content
in minutes
Lecture (total for all slide sections) 90
Demonstration: Amazon S3 Cross-Account Resource-Based Policy 15
Lab: Using Resource-Based Policies to Secure an S3 Bucket 60
Sample exam question activity 5
Knowledge check 20
Total content delivery time 190
Module objectives
The purpose of this module is to introduce the AWS Identity and Access Management (IAM) service, and
to present some of the key terms and elements of the service. This module explains how IAM provides
authentication and authorization. The module examines how IAM integrates with other AWS services.
This module also covers how to use AWS Organizations to manage identities in a hierarchical and
effective manner.
At the end of this module, students should be able to do the following:
• Authorize access to AWS services by using IAM users, groups, and roles.
• Differentiate between different types of security credentials in IAM.
• Authorize access to AWS services by using identity-based and resource-based policies.
• Identity other AWS services that provide authentication and access management services.
• Centrally manage and enforce policies for multiple AWS accounts.
Introduction
Slides 5–7 (Bank business scenario) introduce the business scenario that is used throughout the course,
framed within the context of the content that this module covers.
Slide 8 (Shared responsibility model) reveals the section of the shared responsibility model that is
relevant to the content in this module and its accompanying lab.
IAM fundamentals
This section introduces the IAM service; provides a brief overview of users, groups, roles, and policies;
and discusses the terminology used in the service. This section describes how requests work within IAM
and then explains how IAM provides the key aspects of the service—authentication and authorization—
to customers. The section ends with an introduction to service endpoints, explaining what they are and
how they control and monitor access to the cloud and AWS resources. These resources include the AWS
© 2024, Amazon Web Services, Inc. or its affiliates. All rights reserved. 12
AWS Training and Certification Securing Access to Cloud Resources
Management Console, AWS Command Line Interface (AWS CLI), AWS Software Development Kits (SDKs),
and other AWS services.
Slide 10 (AWS Identity and Access Management [IAM]) introduces the students to the IAM service. The
slide describes the functions of the service and its general benefits, including the capabilities that it
provides to AWS administrators.
Slide 11 (What IAM provides) describes the two key purposes of using IAM: to provide authentication
and authorization to AWS resources. This slide explains the differences between authentication and
authorization. Authentication describes who is allowed access to the resources, while authorization
describes what they are allowed access to.
Slide 12 (IAM overview) and slide 13 (IAM terminology) provide an introduction to the basic elements
and terminology of the IAM service. Students are introduced to the manner in which IAM groups and
manages assets, as well as how those assets are used to provide access to AWS resources.
Slide 15 (Service endpoints) explains that the AWS SDKs and AWS CLI access AWS services by using
service endpoints. A service endpoint is a URL that is defined for each service based on the AWS Region.
© 2024, Amazon Web Services, Inc. or its affiliates. All rights reserved. 13
AWS Training and Certification Securing Access to Cloud Resources
© 2024, Amazon Web Services, Inc. or its affiliates. All rights reserved. 14
AWS Training and Certification Securing Access to Cloud Resources
Module wrap-up
Knowledge check
After you present the Module summary slide, ask students to complete the knowledge check.
Sample exam question
Slide 52 (Sample exam question) displays the following question. The keywords have been underlined
for you here:
How would a system administrator add an additional layer of login security to protect a user's
access to the AWS Management Console?
Prompt students to identify the keywords, and then discuss the plausibility of each answer.
Explanations of each answer choice:
• A: Using Cloud Directory would not add any additional layers of login security to the AWS
Management Console.
• B: An audit of IAM roles will show you the IAM users that currently have roles assigned, but this
does not add any additional security.
• C: MFA is a simple best practice that adds an extra layer of protection on top of a user name and
password. [correct answer]
• D: With CloudTrail, you can log the date, time, and identity of users accessing your directory
data. However, this does not provide additional login security.
Slide 53 (Sample exam question answer) displays the keywords. Click once to reveal the letter of the
correct answer.
The correct answer is C.
Additional resources
This module contains the following resource links:
• What Is IAM?
• AWS Services that Work with IAM
• Security Best Practices in IAM
• AWS Security Credentials
• Policies and Permissions in IAM
• Identity-Based Policies and Resource-Based Policies
• Managed Policies and Inline Policies
• Testing IAM Policies with the IAM Policy Simulator
• Permissions Boundaries for IAM Entities
• Identity Federation in AWS
• What Is AWS Single Sign-On?
• AWS Directory Service: Managed Microsoft Active Directory in AWS
• What Is Amazon Cognito?
• What Is AWS Organizations?
• Service Control Policies (SCPs)
© 2024, Amazon Web Services, Inc. or its affiliates. All rights reserved. 15
AWS Training and Certification Securing Your Infrastructure
Estimated duration
Content
in minutes
Lecture (total for all slide sections) 90
Lab: Securing VPC Resources by Using Security Groups 90
Sample exam question activity 5
Knowledge check 20
Total content delivery time 205
Module objectives
The purpose of this module is to introduce how to secure your infrastructure. This module explains how
to use a virtual private cloud (VPC), and describes VPC components and security features. The module
examines how to use security groups, network access control lists (ACLs), and subnets to make networks
more secure and efficient. The module also describes how internet gateways, NAT gateways, and route
tables control where network traffic is directed. Finally, the module describes how Elastic Load
Balancing (ELB) automatically distributes incoming application traffic and scales resources to meet traffic
demands.
At the end of this module, students should be able to do the following:
• Define the components of a VPC.
• Recognize account boundaries.
• Describe Amazon Web Services (AWS) services that are available to protect their network and
resources.
Introduction
Slides 5–7 (Bank business scenario) introduce the business scenario that is used throughout the course,
framed within the context of the content that this module covers.
Slide 8 (Shared responsibility model) reveals the section of the shared responsibility model that is
relevant to the content in this module and its accompanying lab.
© 2024, Amazon Web Services, Inc. or its affiliates. All rights reserved. 16
AWS Training and Certification Securing Your Infrastructure
Using a VPC
In this section, students will learn about the Amazon Virtual Private Cloud (Amazon VPC) service,
including benefits, components, and security features.
Slide 12 (Amazon Virtual Private Cloud [Amazon VPC]) focuses on Amazon VPC providing a logically
isolated section of the AWS Cloud where you can launch resources in a virtual network that you define.
After an explanation of VPC benefits, students dive deeper into VPCs and subnets.
© 2024, Amazon Web Services, Inc. or its affiliates. All rights reserved. 17
AWS Training and Certification Securing Your Infrastructure
© 2024, Amazon Web Services, Inc. or its affiliates. All rights reserved. 18
AWS Training and Certification Securing Your Infrastructure
Module wrap-up
Knowledge check
After you present the Module summary slide, ask students to complete the knowledge check.
Sample exam question
Slide 56 (Sample exam question) displays the following question. The keywords have been underlined
for you here:
A system administrator created a single EC2 instance, and set up network ACLs and the
appropriate subnet routing. However, they want to provide an extra layer of security by applying
a firewall to control access to and from the EC2 instance. Which action should the system
administrator take?
Prompt students to identify the keywords, and then discuss the plausibility of each answer.
Explanations of each answer choice:
• A: A network ACL acts as a firewall for associated subnets to control inbound and outbound
traffic, but it operates at the subnet level.
• B: A security group acts as a virtual firewall for your EC2 instances to control inbound and
outbound traffic. [correct answer]
• C: A route table is used to control where network traffic is directed. It does not function as a
firewall.
• D: A load balancer automatically distributes incoming application traffic and scales resources to
meet traffic demands. It does not function as a firewall.
Slide 57 (Sample exam question answer) displays the keywords. Click once to reveal the letter of the
correct answer.
The correct answer is B.
Additional resources
This module contains the following resource links:
• What Is Amazon VPC?
• Connect to the Internet Using an Internet Gateway
• NAT Gateways
• NAT Instances
• Compare NAT Gateways and NAT Instances
• VPC Sizing
• Public IPv4 Addresses
• Associate Elastic IP Addresses with Resources in Your VPC
• Configure Route Tables
• Control Traffic to Resources Using Security Groups
• Control Traffic to Subnets Using Network ACLs
• Logging IP Traffic Using VPC Flow Logs
• What is Elastic Load Balancing?
• Data Protection in Elastic Load Balancing
• Amazon Inspector
© 2024, Amazon Web Services, Inc. or its affiliates. All rights reserved. 19
AWS Training and Certification Protecting Data in Your Application
Estimated duration
Content
in minutes
Lecture (total for all slide sections) 90
Lab: Encrypting Data at Rest by Using AWS KMS 75
Sample exam question activity 5
Knowledge check 20
Total content delivery time 190
Module objectives
The purpose of this module is to introduce how to protect data at rest and data in transit. The module
begins with an overview of why it’s important to protect data at rest. Then, the module introduces
protection features in Amazon Simple Storage Service (Amazon S3). Next is an overview of client-side
and server-side encryption, and the types of encryption that Amazon S3 supports. After that, the
module discusses how to protect data in transit, best practices for protecting data in Amazon S3, and
additional data protection services.
At the end of this module, students should be able to do the following:
• Describe how to protect data at rest and in transit.
• Identify Amazon S3 protection features.
• Encrypt data in Amazon S3.
• Differentiate between client-side encryption (CSE) and server-side encryption (SSE).
• Identify Amazon Web Services (AWS) services that help protect their data.
Introduction
Slides 5–8 (Bank business scenario) introduce the business scenario that is used throughout the course,
framed within the context of the content that this module covers.
Slide 9 (Shared responsibility model) reveals the section of the shared responsibility model that is
relevant to the content in this module and its accompanying lab.
© 2024, Amazon Web Services, Inc. or its affiliates. All rights reserved. 20
AWS Training and Certification Protecting Data in Your Application
Slide 13 (Granting permissions) defines the difference between an identity-based policy and a resource-
based policy.
© 2024, Amazon Web Services, Inc. or its affiliates. All rights reserved. 21
AWS Training and Certification Protecting Data in Your Application
Module wrap-up
Knowledge check
After you present the Module summary slide, ask students to complete the knowledge check.
© 2024, Amazon Web Services, Inc. or its affiliates. All rights reserved. 22
AWS Training and Certification Protecting Data in Your Application
Additional resources
This module contains the following resource links:
• Using Versioning in S3 Buckets
• How S3 Object Lock Works
• Blocking Public Access to Your Amazon S3 Storage
• Protecting Data Using Encryption
• Protecting Data Using Server-Side Encryption
• AWS Key Management Service (AWS KMS)
• How AWS Services Use AWS KMS
• Generating a Presigned URL to Upload an Object
• How to Securely Provide Database Credentials to Lambda Functions by Using AWS Secrets
Manager
© 2024, Amazon Web Services, Inc. or its affiliates. All rights reserved. 23
AWS Training and Certification Module 6: Logging and Monitoring
Estimated duration
Content
in minutes
Lecture (total for all slide sections) 90
Demonstration: Security Hub 15
Lab: Monitoring and Alerting with CloudTrail and CloudWatch 75
Sample exam question activity 5
Knowledge check 20
Total content delivery time 225
Module objectives
The purpose of this module is to introduce logging and monitoring in the AWS environment. This
module explains the concepts of logging and monitoring, and gives students insight into the information
that is contained within log files. The module examines how that information is used in a monitoring
environment to enhance security throughout the AWS environment. This module also covers best
practices for logging and monitoring, and introduces additional AWS services that can be used to
improve the overall security posture of an AWS environment.
At the end of this module, students should be able to do the following:
• Log and monitor access and control to help identify security threats.
• Read and interpret log reports to identify security threats.
• Monitor and report on your AWS resources and applications.
• Recognize when to use Amazon CloudWatch and when to use AWS CloudTrail.
Introduction
Slides 5–8 (Bank business scenario) introduce the business scenario that is used throughout the course,
framed within the context of the content that this module covers.
© 2024, Amazon Web Services, Inc. or its affiliates. All rights reserved. 24
AWS Training and Certification Module 6: Logging and Monitoring
The discussion continues on to explain why logging is important for organizations, and identifies some
common legal requirements, such as the United States Health Insurance Portability and Accountability
Act (HIPAA), the European Union's General Data Protection Regulation (GDPR), and Brazil's General Data
Privacy Law (LGPD), which organizations might be subject to depending on their roles and locations.
Slide 13 (What is monitoring?) introduces students to two of the AWS monitoring services that the
module will discuss, CloudTrail and CloudWatch, with a brief description of each service.
© 2024, Amazon Web Services, Inc. or its affiliates. All rights reserved. 25
AWS Training and Certification Module 6: Logging and Monitoring
Module wrap-up
Knowledge check
After you present the Module summary slide, ask students to complete the knowledge check.
© 2024, Amazon Web Services, Inc. or its affiliates. All rights reserved. 26
AWS Training and Certification Module 6: Logging and Monitoring
Additional resources
This module contains the following resource links:
• AWS CloudTrail
• Logging Requests Using Server Access Logging
• Logging IP Traffic with VPC Flow Logs
• Access Logs for Your Application Load Balancer
• Amazon CloudWatch
• AWS Trusted Advisor
• Amazon EventBridge User Guide
• AWS Security Hub
• AWS Config
© 2024, Amazon Web Services, Inc. or its affiliates. All rights reserved. 27
AWS Training and Certification Responding to and Managing an Incident
Estimated duration
Content
in minutes
Lecture (total for all slide sections) 90
Lab: Remediating an Incident by Using AWS Config and Lambda 75
Sample exam question activity 5
Knowledge check 20
Total content delivery time 190
Module objectives
The purpose of this module is to help you respond to and manage an incident. The module describes the
phases of incident response and the AWS services that support each phase. The module also provides
best practices for handling an incident.
At the end of this module, students should be able to do the following:
• Identify an incident.
• Describe AWS services that are used for incident recognition and remediation.
• Identify best practices for incident response.
Introduction
Slides 5–7 (Bank business scenario) introduce the business scenario that is used throughout the course,
framed within the context of the content that this module covers.
Identifying an incident
This section covers how to identify an incident.
Slide 10 (Incident recognition and response) breaks down incident response as a set of information
security policies and procedures that can be used to identify, contain, and eliminate cyberattacks.
The goal of incident response is to enable an organization to quickly detect and halt attacks, which helps
to minimize damage and prevent future attacks of the same type.
Slide 11 (Recognizing incidents) provides examples of incidents that might not require immediate
analysis and remediation.
Slide 12 (Phase 1: Discovery and recognition) outlines phase 1 of incident response, including incident
identification, logging, and categorization; incident notification and escalation; and investigation and
diagnosis.
Slide 13 (Phase 2: Resolution and recovery) outlines phase 2 of incident response, including forensic
isolation, staging a fix, deploying the fix, and incident closure.
© 2024, Amazon Web Services, Inc. or its affiliates. All rights reserved. 28
AWS Training and Certification Responding to and Managing an Incident
© 2024, Amazon Web Services, Inc. or its affiliates. All rights reserved. 29
AWS Training and Certification Responding to and Managing an Incident
Slide 29 (Amazon Simple Notification Service [Amazon SNS]) describes how Amazon SNS is an event-
driven web service that provides the ability for applications, end users, and devices to instantly send and
receive notifications from the cloud.
Slide 30 (AWS Step Functions) describes how Step Functions is a low-code, visual workflow service that
developers use to build distributed applications, automate IT and business processes, and build data and
machine learning pipelines using AWS services.
Slide 31 (AWS Lambda) describes how Lambda is serverless, event-driven compute service that provides
the ability to run code on demand without provisioning or managing servers.
Slide 32 (Lambda for incident response) provides an example of an event-driven system for incident
response. In this example, a detective mechanism invokes a responsive mechanism to automatically
remediate an event.
Slide 33 (Working together for incident response) provides an example of how to respond to a
compromised instance by using Step Functions, Lambda, CloudFormation, and Amazon SNS.
Module wrap-up
Knowledge check
After you present the Module summary slide, ask students to complete the knowledge check.
Sample exam question
Slide 44 (Sample exam question) displays the following question. The keywords have been underlined
for you here:
An administrator would like to use a continuous monitoring and assessment service that
provides an inventory of AWS resources. Which AWS service would meet their need?
Prompt students to identify the keywords, and then discuss the plausibility of each answer.
© 2024, Amazon Web Services, Inc. or its affiliates. All rights reserved. 30
AWS Training and Certification Responding to and Managing an Incident
Additional resources
This module contains the following resource links:
• AWS Trusted Advisor
• Amazon CloudWatch User Guide
• Amazon Inspector User Guide
• Amazon GuardDuty User Guide
• AWS Shield
• AWS Config Developer Guide
• AWS Systems Manager User Guide
• AWS CloudFormation User Guide
• Amazon Simple Notification Service Developer Guide
• AWS Step Functions Developer Guide
• AWS Lambda Developer Guide
© 2024, Amazon Web Services, Inc. or its affiliates. All rights reserved. 31
AWS Training and Certification Bridging to Certification
Bridging to Certification
Module timing estimates
Time estimates are as follows:
Estimated duration
Content
in minutes
Lecture (total for all slide sections) 40
Total content delivery time 40
Module objectives
The purpose of this module is to familiarize students with resources that can help them prepare for the
AWS Certified Security – Specialty exam.
At the end of this module, students should be able to do the following:
• Identify the next steps to prepare for the AWS Certified Security – Specialty certification.
• Identify where to find resources.
© 2024, Amazon Web Services, Inc. or its affiliates. All rights reserved. 32
AWS Training and Certification Bridging to Certification
Slide 16 (Official practice question sets) provides a step-by-step guide to access the AWS Certification
official practice question sets, which are free and available through AWS Skill Builder.
Additional resources
This module contains the following resource links:
• AWS Certified Security – Specialty Exam Guide
• AWS Certified Security – Specialty Sample Exam Questions
• AWS Well-Architected
• AWS Whitepapers and Guides
• AWS FAQs
• Exam Readiness: AWS Certified Security – Specialty (Classroom)
• Exam Readiness: AWS Certified Security – Specialty (Digital)
• AWS Training and Certification portal
• AWS Skill Builder
• AWS Documentation
• Security Pillar: AWS Well-Architected Framework
• AWS Technical Essentials (Classroom)
• AWS Technical Essentials (Digital)
• AWS Security Fundamentals (Digital)
• Getting Started with AWS Security, Identity, and Compliance (Digital)
• Introduction to AWS Identity and Access Management (IAM) (Digital)
• Introduction to Amazon Virtual Private Cloud (VPC) (Digital)
• Securing and Protecting Your Data in Amazon Simple Storage Service (Amazon S3) (Digital)
• AWS Security Governance at Scale (Classroom)
• AWS Security Best Practices: Monitoring and Alerting (Digital)
• AWS Security Training
• Amazon Web Services: Overview of Security Processes
• Best Practices for Security, Identity, & Compliance
• Security Pillar: AWS Well-Architected Framework – Detection
• AWS Key Management Service Best Practices
• An Overview of the AWS Cloud Adoption Framework
• AWS Best Practices for DDoS Resiliency
• Building a Scalable and Secure Multi-VPC AWS Network Infrastructure
• Security & Compliance Quick Reference Guide
© 2024, Amazon Web Services, Inc. or its affiliates. All rights reserved. 33