Full course description
About this course
Course Snapshot
After completing this course you will be able to:
- Explain the basics of cloud security based on the CIA triad (Module 1)
- Differentiate between security of the cloud and security in the cloud based on the AWS Shared Responsibility Model (Module 1)
- Identify AWS services for access control, data protection, and network isolation to protect your resources on the cloud (Modules 3, 4, & 5)
- Explain how to identify, investigate, and mitigate cybersecurity threats using AWS services (Lab Activities in Modules 3, 4, & 5)
- Identify AWS services for responding to and managing a cyber incident (Module 6)
- Understand how to prepare for the AWS Certified Cloud Operations – Associate exam (Module 7)
- Introduction to Security on AWS
- Securing Access to Cloud Resources
- Securing your Infrastructure
- Protecting Data in your Application
- Logging and Monitoring
- Responding to and Managing an Incident
- Bridging to Certification
This course is suitable for IT graduates and professionals looking to start their career in cloud computing
This course requires a strong foundation in IT concepts and skills. To ensure success in this course, you should have the following:
- Completed the AWS Academy Cloud Operations course OR
- Completed the AWS Academy Cloud Architecting course OR
- Have equivalent professional experience
It is also assumed that learners have general IT technical knowledge. Learners must have some foundational computer literacy skills to be successful in this course. These skills include a knowledge of basic computer concepts, file management, and a good understanding of the internet.
Learners should also have general IT business knowledge, which includes insights into how businesses and other organizations use information technology.
This course is self-paced allowing you to complete the modules around your preferred study schedule. You can access the materials 24/7 during your delivery period.
Professor Ernest Foo
Professor, School of Information and Communication Technology
Dr. Mukhtar Hussain
Research Fellow, School of Information and Communication Technology