By the end of this Course you should be able to understand
Shared Security Model
Introduction to Threat Detection
Intrusion Detection Systems, Advanced Threat Detection Systems and other security tools that enable a proactive response to threats.
Building a Threat Reduction Strategy
Cloud Adoption Framework (CAF) Security Perspective Controls
AWS GuardDuty Monitoring (Demo)
AWS Security Specialty Certification
Course Summary
In a recent eye-opening study, Threat Stack found that 73% of companies have at least one critical security misconfiguration, such as remote SSH open to the entire internet.
That most security incidents actually occur because of credential theft (according to the 2018 Verizon Data Breach Investigations Report) not sophisticated zero-day attacks against cloud providers themselves.