Skill Boost Bonanza
 Unlock Course Combos – Save Up to 30%
D
H
M
S
Your Learning Path
Course 1
AWS Architecture Foundation
Course 2
AWS Security Speciality

Master's Certificate

You will get certificate by Infosectrain

Earn  CPE Course Credits Earn 60 CPE Course Credits
Rated the best Trustpilot 4.9/5 Read Reviews
Infosectrain Group Learner
Infosectrain Learner Point 95259+ Learners

Program Highlights

This program has been specifically developed to provide you with a comprehensive knowledge of the AWS Architecture and AWS Security. It aims to empower you with the skills necessary to design, deploy, and manage security infrastructure on the AWS Cloud Platform. Starting from the basics of cloud computing, the program covers the essential AWS services, particularly AWS Architecture and Security. By participating in this program, you will gain the expertise needed to build and secure your organization’s AWS infrastructure. The content is presented in a straightforward and professional manner, ensuring a clear understanding of the concepts and principles involved.

  • 60-Hour Live Instructor-led Training60-Hour Live Instructor-led Training
  • Live Demos on 30+ AWS ServicesLive Demos on 30+ AWS Services
  • Real-time Industry Use CasesReal-time Industry Use Cases
  • Simulation Exam & Mock TestSimulation Exam & Mock Test
  • 3 Capstone Projects3 Capstone Projects
  • Interactive FlashcardsInteractive Flashcards
  • Telegram Group for Exam SupportTelegram Group for Exam Support
  • Access to Recorded SessionsAccess to Recorded Sessions
  • Career Guidance & MentorshipCareer Guidance & Mentorship

Learning Schedule

  • upcoming classes
  • corporate training
  • 1 on 1 training
Upcoming classes

Looking for a customized training?

REQUEST A BATCH
corporate training

Why Choose Our Corporate Training Solution

  • Upskill your team on the latest tech
  • Highly customized solutions
  • Free Training Needs Analysis
  • Skill-specific training delivery
  • Secure your organizations inside-out

Seeking Corporate Training?

Discover Tailored Solutions for your unique needs. Request a Quote Today!

1-on-1 training

Why Choose 1-on-1 Training

  • Get personalized attention
  • Customized content
  • Learn at your dedicated hour
  • Instant clarification of doubt
  • Guaranteed to run

Desire Personalized Attention?

Request for exclusive batches that are tailored just for you, with flexible schedules.
Ask for 1-on-1 Training Now!

Can't Find a Suitable Schedule? Talk to Our Training Advisor!

Loading...
About Course

The AWS combo course (AWS Solutions Architect Associate + AWS Security Specialty) from InfosecTrain is a comprehensive training course that combines the Architect Associate and Security Specialty certifications training. This intensive program covers the fundamentals of AWS Architect Associate and goes in-depth with Security Specialty. It equips participants with the essential knowledge and skills required to excel in both areas of expertise within the Amazon Web Services (AWS) ecosystem.

Course Curriculum
    AWS Certified Solutions Architect – Associate

  • Cloud Computing Fundamentals
    • Cloud Computing Concepts
    • Service and Deployment models
    • Shared Responsibility Model
    • Virtualization Concepts
    • Architecture and Security Concepts
  • Compute
    • AWS EC2
    • Amazon LightSail
    • AWS Elastic Beanstalk
  • Serverless
    • Lambda
    • AWS Fargate
  • Data Storage and Transfer Services
    • AWS Backup
    • Amazon Elastic Block Store (EBS)
    • Amazon Elastic File System (EFS)
    • Amazon FSx
    • Amazon S3
    • AWS Snow Family
    • Storage Gateway
    • AWS Transfer Family
    • DataSync
  • Database
    • Amazon RDS
    • Amazon DynamoDB
    • Amazon Aurora
    • ElastiCache
  • Container Services
    • Amazon Elastic Container Service (ECS)
    • Amazon Elastic Kubernetes Service (EKS)
    • Amazon Elastic Container Registry (ECR)
  • Networking
    • Amazon VPC
    • Amazon VPN
    • Amazon Transit Gateway
    • AWS Private Link
    • AWS Direct Connect
    • VPC Flow logs
  • DNS, Load Balancing and Edge Services
    • Amazon CloudFront
    • Elastic Load Balancing (ELB)
    • AWS Global Accelerator
    • Amazon Route 53
  • Security, Identity and Compliance
    • AWS Artifact
    • AWS Audit Manager
    • AWS Certificate Manager (ACM)
    • AWS CloudHSM
    • Amazon Cognito
    • Amazon Detective
    • AWS Directory Service
    • AWS Firewall Manager
    • Amazon GuardDuty
    • AWS Identity and Access Management (IAM)
    • Amazon Inspector
    • AWS Key Management Service (AWS KMS)
    • Amazon Macie
    • AWS Network Firewall
    • AWS Resource Access Manager (AWS RAM)
    • AWS Secrets Manager
    • AWS Security Hub
    • AWS Shield
    • AWS WAF
    • IAM Identity Center
  • AWS Cost Management
    • AWS Budget
    • AWS Cost and Usage Report
    • AWS Cost Explorer
    • Savings Plans
  • Management and Governance
    • AWS CloudFormation
    • AWS CloudTrail
    • Amazon CloudWatch
    • AWS Config
    • AWS Organizations
    • AWS Systems Manager
    • AWS Trusted Advisor
  • ML Services
    • Rekognition
    • Transcribe
    • Polly
    • Translate
    • Lex
    • Comprehend
    • SageMaker
    • Kendra
    • Personalize
    • Textract
  • AWS Certified Security – Specialty

  • Domain 1: Threat Detection and Incident Response
    • Design and implement an incident response plan
      • Incident Response Strategy
      • Roles and responsibilities in IR plan specific to cloud incidents
        • Use case 1: Credentials compromise
        • Use case 2: Compromised EC2 Instances/li>
      • Playbooks and Runbooks for IR
      • AWS Specific services helpful in Incident Response
      • Third-party integration concepts
      • Centralize security finding with security hub
    • Detect security threats and anomalies by using AWS services
      • Threat detection services specific to AWS
      • Visualizing and Detecting anomalies and correlation techniques
      • Evaluate finding from security services
      • Performing queries for validating security events
      • Create metrics filters and dashboards to detect Anomalous activity
    • Respond to compromised resources and workloads
      • AWS Security IR Guide
      • Automating remediation by using AWS services
      • Compromised resource management
      • Investigating and analyzing to conduct Root cause and log analysis
      • Capturing relevant forensics data from a compromised resource
      • Protecting and preserving forensic artifacts
      • Post-incident recovery
  • Domain 2 : Security Logging and Monitoring
    • Design and Implement monitoring and alerting to address security events
    • Key AWS services for monitoring and alerting
    • Monitoring metrics and baselines
    • Analyzing environments and workloads to determine monitoring requirements according to business and security requirements
    • Setting up tools and scripts to perform regular audits
    • Troubleshoot security monitoring and alerting
      • Configuring monitoring services and collecting event data
      • Application monitoring, alerting, and visibility challenges
    • Design and implement a logging solution
      • Key logging services and attributes
      • Log destinations, Ingestion points, and lifecycle management
      • Logging specific to services and applications
    • Design a log analysis solution
      • Services and tools to analyze captured logs
      • Identifying patterns in logs to indicate anomalies and known threats
      • Log analysis features for AWS services
      • Log format and components
      • Normalizing, parsing, and correlating logs
    • Troubleshoot logging solutions
      • AWS services that provide data sources and logging capabilities
      • Access permissions that are necessary for logging
      • Identifying misconfigurations and remediations specific to logging
      • Reasons for missing logs and performing remediation steps
  • Domain 3 : Infrastructure Security
    • Design and implement security controls for edge services
      • Define edge security strategies and security features
      • Select proper edge services based on anticipated threats and attacks and define proper protection mechanisms based on that
      • Define layered Defense (Defense in Depth) mechanisms
      • Applying restrictions based on different criteria
      • Enable logging and monitoring across edge services to indicate attacks
    • Design and implement network security controls
      • VPC security mechanisms, including Security Groups, NACLs and Network firewall
      • Traffic Mirroring and VPC Flow Logs
      • VPC Security mechanisms and implement network segmentation based on security requirements
      • Network traffic management and segmentation
      • Inter-VPC connectivity, Traffic isolation, and VPN concepts and deployment
      • Peering and Transit Gateway
      • AWS Point to Site and Site to Site VPN, Direct Connect
      • Continuous optimization by identifying and removing unnecessary network access
    • Design and implement security controls for compute workloads
      • Provisioning and maintenance of EC2 instances
      • Create hardened images and backups
      • Applying instance and service roles for defining permissions
      • Host-based security mechanisms
      • Vulnerability assessment using AWS Inspector
      • Passing secrets and credentials security to computing workloads
    • Troubleshoot network security
    • Identifying, interpreting, and prioritizing network connectivity and analyzing reachability
    • Analyze log sources to identify problems
    • Network traffic sampling using traffic mirroring
  • Domain 4 : Identity And Access Management
    • Design, implement, and troubleshoot authentication for AWS resources
      • Identity and Access Management
      • Establish identity through an authentication system based on requirements
      • Managed Identities, Identity federation
      • AWS Identity center, IAM, and Cognito
      • MFA, Conditional access, STS
      • Troubleshoot authentication issues
    • Design, implement, and troubleshoot authorization for AWS resources
      • IAM policies and types
      • Policy structure and troubleshooting
      • Troubleshoot authorization issues
      • ABAC and RBAC strategies
      • Principle of least privilege and Separation of duties
      • Investigate unintended permissions, authorization, or privileges
  • Domain 5 : Data Protection
    • Design and implement controls that provide confidentiality and integrity for data in transit
      • Design secure connectivity between AWS and on-premises networks
      • Design mechanisms to require encryption when connecting to resources
      • Requiring DIT encryption for AWS API calls
      • Design mechanisms to forward traffic over secure connections
      • Designing cross-region networking
    • Design and implement controls that provide confidentiality and integrity for data at rest
      • Encryption and integrity concepts
      • Resource policies
      • Configure services to activate encryption for data at rest and to protect data integrity by preventing modifications
      • Cloud HSM and KMS
    • Design and implement controls to manage the data lifecycle at rest
      • Lifecycle policies and configurations
      • Automated life cycle management
      • Establishing schedules and retention for AWS backup across AWS services
    • Design and implement controls to protect credentials, secrets,and cryptographic key materials
      • Designing management and rotation of secrets for workloads using a secret manager
      • Designing KMS key policies to limit key usage to authorized users
      • Establishing mechanisms to import and remove customer-provider key material
  • Domain 6 : Management and Security Governance
    • Design a strategy to centrally deploy and manage AWS accounts
      • Multi-account strategies using AWS organization and Control tower
      • SCPs and Policy multi-account policy enforcement
      • Centralized management of security services and aggregation of findings Securing root account access
    • Implement a secure and consistent deployment strategy for cloud resources
      • Deployment of best practices with Infrastructure as a code
      • Tagging and metadata
      • Configure and deploy portfolios of approved AWS services
      • Securely sharing resources across AWS accounts
      • Visibility and control over AWS infrastructure
    • Evaluate compliance of AWS resources
      • Data classification by using AWS services
      • Define config rules for detection of non- compliant AWS resources
      • Collecting and organizing evidence by using Security Hub and AWS audit manager
    • Identify security gaps through architectural reviews and cost analysis
      • AWS cost and usage anomaly identification
      • Strategies to reduce attack surfaces
      • AWS well-architected framework to identify security gaps

Target Audience

The training is ideal for:

  • Candidates with an understanding of IT security and Cybersecurity concepts
  • Professionals working as Solutions Architects
  • Those who are working in cloud computing and security domains
  • Those who want to build their career in AWS Security Architecting
  • Anyone interested in gaining the AWS Solution Architect Associate and AWS Security Speciality Certification
  • Anyone wishing to enhance deep Architect and security knowledge related to AWS
Pre-requisites
  • Knowledge of IT/Cyber Security concepts.
  • 3+ years of IT experience in job roles related to System Administration Security, Network Administrators, Operations/DevOps Engineers, etc.
  • Basic understanding of Virtualization fundamentals and Virtualization concepts.
  • 1+ years of experience in IT security domains.
  • Basic understanding of networking and OS concepts.
Exam Details
Certification Name SCS-C03 SAA-C03
Exam Duration 170 Minutes 130 minutes
Number of Questions 65 65
Exam Format Multiple-choice Questions Multiple-choice Questions or Multiple Response Questions
Passing Score 750 out of 1000 720 on a scale of 100-1000
Exam Language English, Japanese, Korean, Portuguese (Brazil), Simplified Chinese, Spanish (Latin America) English, French (France), Italian, Japanese, Korean, Portuguese (Brazil), Spanish (Latin America), Spanish (Spain), Simplified Chinese, and Traditional Chinese
Course Objectives
  • Understand the security controls for AWS environments and workloads.
  • Understand security logging and monitoring capabilities.
  • Able to design and implement Identity and Access Management architecture.
  • Learn Encryption and Key Management for DAR and DIT.
  • Manage Data retention and lifecycle management.
  • Multi-account governance and organizational compliance.
  • Threat detection and Incident response strategies.
  • Vulnerability Management and Security Automation.
  • Demonstrate your skills and working experience on AWS services.
  • Learn the authentication of technical expertise to design, deploy and operate AWS applications.
Still unsure?
We're just a click away
For
loader-infosectrain

Can't wait? Get in touch now

Toll Free Numbers

How We Help You Succeed

Vision

Vision

Goal

Goal

Skill-Building

Skill-Building

Mentoring

Mentoring

Direction

Direction

Support

Support

Success

Success

Your Trusted Instructors

Words Have Power

Success Speaks Volumes

Success Story

Get a Sample Certificate

Sample Certificate

Frequently Asked Questions

What is AWS Combo Training?

AWS combo training is a combined program of AWS Solutions Architect Associate & AWS Security Specialty that teaches AWS architecture fundamentals along with advanced cloud security concepts and best practices.

Which AWS certifications are covered in this course?

This course covers both AWS Solutions Architect Associate & AWS Security Specialty certification training.

Does the training prepare for AWS Solutions Architect Associate and Security Specialty exams?

Yes, this course prepares you for both—AWS Solutions Architect Associate and Security Specialty exams. First candidates learn the basics of solutions architect and then deepen security expertise.

Are AWS certification exams included in the training fee?

No, the training fee does not include certification exams.

Is this course suitable for beginners in AWS cloud and security?

No, this course is not for beginners as it requires some knowledge, basic understanding and work experience.

Does the training include hands-on AWS labs?

Yes, this training includes hands-on labs and real-world use cases for better understanding.

What AWS security concepts are covered in the course?

The training covers secure cloud deployment, IAM, monitoring, encryption, and real-world labs while also preparing learners for AWS certifications such as Solutions Architect and Security Specialty.

How does AWS Combo training help in cloud security careers?

AWS Combo training from InfosecTrain helps build both AWS architecture and cloud security skills, making it valuable for careers like Cloud Security Engineer, DevSecOps Engineer, and AWS Security Specialist.

TOP