Module 1: Exploring the Security Pillar
Module 2: Security of the Cloud
Module 3: Identity and Access Management
Module 4: Protecting Infrastructure and Data
Module 5: Detection and Response
Module 6: Course Wrap-Up
This course is designed to teach you how to:
We recommend that attendees of this course have:
This course is intended for:
- IT business-level professionals interested in cloud security practices
- Security professionals with minimal working knowledge of AWS
NOK 10.000
COURSE CONTENT: Module 1: Course Overview โข Logistics โข Student resources โข Agenda โข Introductions Module 2: Building a Web Application on AWS โข Discuss the architecture of the…
COURSE CONTENT: Day 1 Module 1: Data Warehouse Concepts โข Modern data architecture โข Introduction to the course story โข Data warehousing with Amazon Redshift โข Amazon Redshift Serverless…
COURSE CONTENT: Introducing Red Hat Ceph Storage Architecture Describe Red Hat Ceph Storage architecture, including data organization, distribution and client access methods. Deploying Red Hat Ceph Storage Deploy a…