Intro
- Welcome and introductions
 - Introduction to Security on AWS
 
Identifying entry points on AWS
- Ways to access the platform
 - IAM policies
 - Securing entry points
 - Incident response
 
Lab - cross-account authentication
Security Considerations - Web Applications
- Security points in an AWS web application environment
 - Analyse a three-tier application model and identify common threats
 - Assess environments to improve security
 
Application Security
- Securing EC2 instances
 - Assess vulnerabilities with Inspector
 - Apply security in an automated way using Systems Manager
 - Isolate a compromised instance
 
Lab - Assessing Security with Inspector and Systems Manager
Securing Networking Communications - Part 1
- Apply security best practices to VPC
 - Implement an ELB device as a protection point
 - Protect data in transit using certificates
 
Data Security
- Protect data at rest using encryption and access controls
 - AWS services used to replicate data
 - Protect archived data
 
Security Considerations: Hybrid Environments
- Security points outside of a VPC
 - Common DoS threats
 
Monitoring and Collecting Logs on AWS
- Monitor events and collect logs with CloudWatch
 - Use Config to monitor resources
 - AWS-native services that generate and collect logs
 
Lab - Server Log Analysis Part 1 - collect logs
Processing Logs on AWS
- Stream and process logs for further analysis
 - AWS services used to process logs from S3 buckets
 
Lab - Server Log Analysis Part 2 - analyse logs
Securing Networking Communications - Part 2
- Identify AWS services used to connect on-premise to AWS
 - Data protection between on-premise and AWS
 - Securely access VPC resources in other accounts
 
Out-Of-Region Protection
- Use Route 53 to isolate attacks
 - Implement WAF to protect applications
 - Use CloudFront to deliver content securely
 - Protect applications using Shield
 
Account Management on AWS
- Manage multiple accounts
 - Use identity providers / brokers to acquire access to AWS services
 
Lab - AWS Federated Authentication with ADFS
Security Considerations: Serverless Environments
- How to secure data in a serverless environment
 - Use Cognito to authorize users
 - Control API access with API Gateway
 - Use AWS messaging services securely
 - Secure Lambda functions
 
Lab - Monitor and Respond with Config and Lambda
Secrets Management on AWS
- Manage key and data encryption with KMS
 - Describe how CloudHSM is used to generate and secure keys
 - Use Secrets Manager to authenticate applications
 
Lab - Using KMS
Security Automation on AWS
- Deploy security-oriented AWS environments in a reproducible manner
 - Provide management and control of IT services to end-users in a self-serve manner
 
Lab - Security Automation on AWS with Service Catalog
Threat Detection and Sensitive Data Monitoring
- Threat detection and monitoring for malicious or unauthorized behaviour
 - Leverage machine learning to gain visibility into how sensitive data is being managed in the AWS Cloud