Intro
- 		Welcome and introductions
 - 		Introduction to Security on AWS
 
	Identifying entry points on AWS
- 		Ways to access the platform
 - 		IAM policies
 - 		Securing entry points
 - 		Incident response
 
	Lab - cross-account authentication
	Security Considerations - Web Applications
- 		Security points in an AWS web application environment
 - 		Analyse a three-tier application model and identify common threats
 - 		Assess environments to improve security
 
	Application Security
- 		Securing EC2 instances
 - 		Assess vulnerabilities with Inspector
 - 		Apply security in an automated way using Systems Manager
 - 		Isolate a compromised instance
 
	Lab - Assessing Security with Inspector and Systems Manager
	Securing Networking Communications - Part 1
- 		Apply security best practices to VPC
 - 		Implement an ELB device as a protection point
 - 		Protect data in transit using certificates
 
	Data Security
- 		Protect data at rest using encryption and access controls
 - 		AWS services used to replicate data
 - 		Protect archived data
 
	Security Considerations: Hybrid Environments
- 		Security points outside of a VPC
 - 		Common DoS threats
 
	Monitoring and Collecting Logs on AWS
- 		Monitor events and collect logs with CloudWatch
 - 		Use Config to monitor resources
 - 		AWS-native services that generate and collect logs
 
	Lab - Server Log Analysis Part 1 - collect logs
	Processing Logs on AWS
- 		Stream and process logs for further analysis
 - 		AWS services used to process logs from S3 buckets
 
	Lab - Server Log Analysis Part 2 - analyse logs
	Securing Networking Communications - Part 2
- 		Identify AWS services used to connect on-premise to AWS
 - 		Data protection between on-premise and AWS
 - 		Securely access VPC resources in other accounts
 
	Out-Of-Region Protection
- 		Use Route 53 to isolate attacks
 - 		Implement WAF to protect applications
 - 		Use CloudFront to deliver content securely
 - 		Protect applications using Shield
 
	Account Management on AWS
- 		Manage multiple accounts
 - 		Use identity providers / brokers to acquire access to AWS services
 
	Lab - AWS Federated Authentication with ADFS
	Security Considerations: Serverless Environments
- 		How to secure data in a serverless environment
 - 		Use Cognito to authorize users
 - 		Control API access with API Gateway
 - 		Use AWS messaging services securely
 - 		Secure Lambda functions
 
	Lab - Monitor and Respond with Config and Lambda
	Secrets Management on AWS
- 		Manage key and data encryption with KMS
 - 		Describe how CloudHSM is used to generate and secure keys
 - 		Use Secrets Manager to authenticate applications
 
	Lab - Using KMS
	Security Automation on AWS
- 		Deploy security-oriented AWS environments in a reproducible manner
 - 		Provide management and control of IT services to end-users in a self-serve manner
 
	Lab - Security Automation on AWS with Service Catalog
	Threat Detection and Sensitive Data Monitoring
- 		Threat detection and monitoring for malicious or unauthorized behaviour
 - 		Leverage machine learning to gain visibility into how sensitive data is being managed in the AWS Cloud