Program Highlights
The AWS combo course (Architecture Foundation + Security Specialty) from InfosecTrain is a comprehensive training course that combines the Architect Associate and Security Specialty certifications training. This intensive program covers the fundamentals of AWS Architect Associate and goes in-depth with Security Specialty. It equips participants with the essential knowledge and skills required to excel in both areas of expertise within the Amazon Web Services (AWS) ecosystem.
60-Hour Live Instructor-led Training
Live Demos on 30+ AWS Services
Real-time Industry Use Cases
Simulation Exam & Mock Test
3 Capstone Projects
Interactive Flashcards
Telegram Group for Exam Support
Access to Recorded Sessions
Career Guidance & Mentorship
Learning Schedule
- upcoming classes
- corporate training
- 1 on 1 training
| Start - End Date | Training Mode | Batch Type | Start - End Time | Batch Status | |
|---|---|---|---|---|---|
| 03 Jan - 07 Mar | Online | Weekend | 19:00 - 23:00 IST | BATCH OPEN | |
| 15 Mar - 17 May | Online | Weekend | 09:00 - 13:00 IST | BATCH OPEN |
Why Choose Our Corporate Training Solution
- Upskill your team on the latest tech
- Highly customized solutions
- Free Training Needs Analysis
- Skill-specific training delivery
- Secure your organizations inside-out
Why Choose 1-on-1 Training
- Get personalized attention
- Customized content
- Learn at your dedicated hour
- Instant clarification of doubt
- Guaranteed to run
Can't Find a Suitable Schedule? Talk to Our Training Advisor!
This program has been specifically developed to provide you with a comprehensive knowledge of the AWS Security Architecture. It aims to empower you with the skills necessary to design, deploy, and manage security infrastructure on the AWS Cloud Platform. Starting from the basics of cloud computing, the program covers the essential AWS services architecture, particularly AWS Security. By participating in this program, you will gain the expertise needed to build and secure your organization’s AWS infrastructure. The content is presented in a straightforward and professional manner, ensuring a clear understanding of the concepts and principles involved.
- AWS Architecture Foundation
- Cloud Computing Fundamentals
- Cloud Computing Concepts
- Service and Deployment models
- Shared Responsibility Model
- Virtualization Concepts
- Architecture and Security Concepts
- Compute
- AWS EC2
- Amazon Lightsail
- AWS Elastic Beanstalk
- AWS App
- Serverless
- AWS Lambda
- Storage
- AWS Backup
- Amazon Elastic Block Store (Amazon EBS)
- Amazon Elastic File System (Amazon EFS)
- Amazon FSx
- Amazon S3
- Amazon S3 Glacier
- Database
- Amazon RDS
- Amazon Elasticache
- AWS DynamoDB
- Container Services
- Amazon Elastic Container Service (ECS)
- AWS Elastic Kubernetes Service (EKS)
- Amazon Elastic Container Registry (ECR)
- Networking and Content Delivery
- Amazon CloudFront
- Elastic Load Balancing (ELB)
- AWS Global Accelerator
- Amazon Route 53
- Amazon VPC
- Other Networking and Content Delivery Overview
- AWS VPN
- AWS Transit Gateway
- AWS Private Link
- AWS Direct Connect
- Security, Identity, and Compliance
- AWS Artifact
- AWS Audit Manager
- AWS Certificate Manager (ACM)
- AWS CloudHSM
- Amazon Cognito
- Amazon Detective
- AWS Directory Service
- AWS Firewall Manager
- Amazon GuardDuty
- AWS Identity and Access Management (IAM)
- Amazon Inspector
- AWS Key Management Service (AWS KMS)
- Amazon Macie
- AWS Network Firewall
- AWS Resource Access Manager (AWS RAM)
- AWS Secrets Manager
- AWS Security Hub
- AWS Shield
- AWS WAF
- IAM Identity Center
- AWS Cost Management
- AWS Budgets
- AWS Cost and Usage Report
- AWS Cost Explorer
- Savings Plans
- Analytics
- Amazon Athena
- Amazon Kinesis
- Amazon Athena
- Application Integration
- Amazon EventBridge (Amazon CloudWatch Events)
- Amazon Simple Notification Service (Amazon SNS)
- Amazon EventBridge (Amazon CloudWatch Events)
- Management and Governance
- AWS CloudFormation
- AWS CloudTrail
- Amazon CloudWatch
- AWS Command Line Interface (AWS CLI)
- AWS Config
- AWS Management Console
- AWS Organizations
- AWS Systems Manager
- AWS Trusted Advisor
- Other Management and Governance Services for review
- AWS Control Tower
- AWS License Manager
- AWS Certified Security – Specialty
- Domain 1: Threat Detection and Incident Response
- Design and implement an incident response plan
- Incident Response Strategy
- Roles and responsibilities in IR plan specific to cloud incidents
- Use case 1: Credentials compromise
- Use case 2: Compromised EC2 Instances
- Playbooks and Runbooks for IR
- AWS Specific services helpful in Incident Response
- Third-party integration concepts
- Centralize security finding with Security Hub
- Detect security threats and anomalies by using AWS services
- Threat detection services specific to AWS
- Visualizing and Detecting anomalies and correlation techniques
- Evaluate findings from security services
- Performing queries for validating security events
- Create metrics filters and dashboards to detect Anomalous activity
- Respond to compromised resources and workloads
- AWS Security IR Guide
- Automating remediation by using AWS services
- Compromised resource management
- Investigating and analyzing to conduct root cause and log analysis
- Capturing relevant forensics data from a compromised resource
- Protecting and preserving forensic artifacts
- Post-incident recovery
- Design and implement an incident response plan
- Domain 2: Security Logging and Monitoring
- Design and Implement monitoring and alerting to address security events
- Key AWS services for monitoring and alerting
- Monitoring metrics and baselines
- Analyzing environments and workloads to determine monitoring requirements according to business and
security requirements - Setting up tools and scripts to perform regular audits
- Troubleshoot security monitoring and alerting
- Configuring monitoring services and collecting event data
- Application monitoring, alerting, and visibility challenges
- Design and implement a logging solution
- Key logging services and attributes
- Log destinations, ingestion points, and lifecycle management
- Logging specific to services and applications
- Troubleshoot logging solutions
- AWS services that provide data sources and logging capabilities
- Access permissions that are necessary for logging
- Identifying misconfigurations and remediations specific to logging
- Reasons for missing logs and performing remediation steps
- Design a log analysis solution
- Services and tools to analyze captured logs
- Identifying patterns in logs to indicate anomalies and known threats
- Log analysis features for AWS services
- Log format and components
- Normalizing, parsing, and correlating logs
- Domain 3: Infrastructure Security
- Design and implement security controls for edge services
- Define edge security strategies and security features
- Select proper edge services based on anticipated threats and attacks and define proper
protection mechanisms based on that - Define proper protection mechanisms based on threats
- Define layered Defense (Defense in Depth) mechanisms
- Applying restrictions based on different criteria
- Enable logging and monitoring across edge services to indicate attacks
- Design and implement network security controls
- VPC security mechanisms, including Security Groups, NACLs, and Network Firewall
- Traffic Mirroring and VPC Flow Logs
- VPC Security mechanisms and implement network segmentation based on security requirements
- Network traffic management and segmentation
- Inter-VPC connectivity, Traffic isolation, and VPN concepts and; deployment
- Peering and Transit Gateway
- AWS Point to Site and Site to Site VPN, Direct Connect
- Continuous optimization by identifying and removing unnecessary network access
- Design and implement security controls for compute workloads
- Provisioning and maintenance of EC2 instances
- Create hardened images and backups
- Applying instance and service roles for defining permissions
- Host-based security mechanisms
- Vulnerability assessment using AWS Inspector
- Passing secrets and credentials security to computing workloads
Troubleshoot network security
Identifying, interpreting, and prioritizing network connectivity and analyzing reachability
Analyze log sources to identify problems
Network traffic sampling using traffic mirroring
- Design and implement security controls for edge services
- Domain 4: Identity and Access Management
- Design, implement, and troubleshoot authentication for AWS resources
- Identity and Access Management
- Establish identity through an authentication system based on requirements
- Managed Identities, Identity federation
- AWS Identity Center, IAM, and Cognito
- MFA, Conditional access, STS
- Troubleshoot authentication issues
- Design, implement, and troubleshoot authorization for AWS resources
- IAM policies and types
- Policy structure and troubleshooting
- Troubleshoot authorization issues
- ABAC and RBAC strategies
- Principle of least privilege and Separation of duties
- Investigate unintended permissions, authorization, or privileges
- Design, implement, and troubleshoot authentication for AWS resources
- Domain 5: Data Protection
- Design and implement controls that provide confidentiality and integrity for data in transit
- Design secure connectivity between AWS and on-premises networks
- Design mechanisms to require encryption when connecting to resources
- Requiring DIT encryption for AWS API calls
- Design mechanisms to forward traffic over secure connections
- Designing cross-region networking
- Design and implement controls that provide confidentiality and integrity for data at rest
- Encryption and integrity concepts
- Resource policies
- Configure services to activate encryption for data at rest and to protect data integrity by
preventing modifications - Cloud HSM and KMS
- Design and implement controls to manage the data lifecycle at rest
- Lifecycle policies and configurations
- Automated life cycle management
- Establishing schedules and retention for AWS backup across AWS services
- Design and implement controls to protect credentials, secrets, and cryptographic key materials
- Designing management and rotation of secrets for workloads using a secret manager
- Designing KMS key policies to limit usage to authorized users
- Establishing mechanisms to import and remove customer-provider key material
- Design and implement controls that provide confidentiality and integrity for data in transit
- Domain 6: Management and Security Governance
- Design a strategy to centrally deploy and manage AWS accounts
- Multi-account strategies using AWS Organizations and control tower
- SCPs and Policy multi-account policy enforcement
- Centralized management of security services and aggregation of findings
- Securing root account access
- Implement a secure and consistent deployment strategy for cloud resources
- Deployment best practices with Infrastructure as a code
- Tagging and metadata
- Configure and deploy portfolios of approved AWS services
- Securely sharing resources across AWS accounts
- Visibility and control over AWS infrastructure
- Evaluate compliance of AWS resources
- Data classification using AWS services
- Define config rules for detection of non-compliant AWS resources.
- Collecting and organizing evidence by using Security Hub and AWS audit manager
- Identify security gaps through architectural reviews and cost analysis
- AWS cost and usage anomaly identification
- Strategies to reduce attack surfaces
- AWS well-architected framework to identify security gaps
- Design a strategy to centrally deploy and manage AWS accounts
This training is ideal for:
- Candidates with an understanding of IT security and Cybersecurity concepts.
- Professionals working as Solution Architects.
- Those who are working in cloud computing and security domains.
- Those who want to build their career in AWS Security Architecting.
- Anyone interested in gaining the AWS Security Speciality Certification.
- Anyone wishing to enhance deep security knowledge related to AWS.
- Knowledge of IT/Cyber Security concepts.
- 3+ years of IT experience in job roles related to System Administration Security, Network Administrators, Operations/DevOps Engineers, etc.
- Basic understanding of Virtualization fundamentals and Virtualization concepts.
- 1+ years of experience in IT security domains.
- Basic understanding of networking and OS concepts.
This combo training opens doors to two prestigious AWS credentials – participants can confidently attempt both the Solutions Architect – Associate and Security – Specialty exams after completing the training.
| Certification Name | AWS Certified Solutions Architect- Associate (SAA-C03) | AWS Certified Security – Specialty (SCS-C02) |
| Exam Format | Multiple Choice, Multiple Response | Multiple Choice, Multiple Response |
| Number of Questions | 65 | 65 |
| Exam Duration | 130 minutes | 170 minutes |
| Passing Score | 720/1000 | 750/1000 |
| Language | English, French, German, Italian, Japanese, Korean, Portuguese, and Simplified Chinese | English, French, German, Italian, Japanese, Korean, Portuguese, Simplified Chinese, and Spanish. |
By the end of this training program, participants will be able to:
- Understand the security controls for AWS environments and workloads.
- Understand security logging and monitoring capabilities.
- Able to design and implement Identity and Access Management architecture.
- Learn Encryption and Key Management for DAR and DIT.
- Manage Data retention and lifecycle management.
- Multi-account governance and organizational compliance.
- Threat detection and Incident response strategies.
- Vulnerability Management and Security Automation.
- Demonstrate your skills and working experience on AWS services.
- Learn the authentication of technical expertise to design, deploy and operate AWS applications.
How We Help You Succeed
Vision
Goal
Skill-Building
Mentoring
Direction
Support
Success
Your Trusted Instructors
18+ Years of Experience
7+ Years Of Experience
Words Have Power
The AWS course was excellent, especially because of the trainer’s engagement. Amit ensured every small point was addressed thoughtfully, it never felt like a monologue but a truly interactive experience.
Thank you for an excellent session! The trainer demonstrated deep knowledge of the subject and explained complex AWS concepts in a simple, relatable way. It was an interactive session with great examples throughout.
The AWS training was good, with topics covered in depth and at a well-maintained pace, making it easy to follow and understand.
The AWS course was excellent. The trainer’s expertise & ability to simplify complex concepts made the material accessible and engaging. The hands-on labs were particularly beneficial and I now feel more confident in implementing AWS security best practices.
The AWS training was very insightful and practical. The trainer demonstrated extensive knowledge of the field, which really helped in clearing all the concepts with clarity.
The explanation of AWS training was clear and engaging, with real-world examples making complex concepts easy to grasp. The interactive elements, especially group discussions and hands-on labs, really helped reinforce the material. The trainer’s support and willingness to answer questions, even beyond sessions, was truly appreciated.
Success Speaks Volumes
Get a Sample Certificate
Frequently Asked Questions
What is the AWS Combo (Architecture Foundation + Security Speciality) Training course?
This is a comprehensive, live, instructor-led training program designed to prepare you for two significant AWS certifications: the AWS Certified Solutions Architect - Associate (SAA-C03) and the AWS Certified Security - Specialty (SCS-C02). The course combines foundational architectural knowledge with advanced, in-depth security principles and practices, equipping you with the skills to design, deploy, and secure robust AWS infrastructures.
Who should take this AWS Combo training course?
This course is ideal for IT professionals, including system administrators, network administrators, and DevOps engineers, who want to advance their careers in cloud computing. It's particularly beneficial for those with prior experience in IT security and cybersecurity concepts, as well as professionals who aspire to become an AWS Solutions Architect or a specialist in AWS security.
Is this AWS course available online?
Yes, this is a live, instructor-led online training course. You will receive live instruction, interactive demos, and have access to recorded sessions and a dedicated Telegram group for support and practice.
What is the duration of this AWS certification training?
The training program consists of 60 hours of live, instructor-led sessions.
Does this training include exam preparation for AWS certifications?
Yes, the program is designed to get you "exam ready." It includes official curriculum, simulation exams, mock tests, and post-training support until your exam.
What are the prerequisites for enrolling in this AWS combo course?
To get the most out of this training, you should have a basic understanding of IT/Cyber Security concepts, networking, and OS concepts. The program is geared towards professionals with 3+ years of IT experience and 1+ years of experience in IT security domains.
Will I receive a certificate after completing the course?
After successfully completing the training program, you will receive a certificate of completion from InfosecTrain. To become officially certified, you must pass the respective AWS certification exams (SAA-C03 and SCS-C02) administered by AWS.
What are the benefits of this AWS training program?
This program offers a comprehensive approach to mastering both foundational architecture and specialized security in AWS. Key benefits include live, hands-on learning with expert instructors, real-world case studies, post-training support, career guidance, and mentorship. Earning these two certifications can significantly enhance your career prospects, increase your earning potential, and validate your expertise in a high-demand field.
How do I register for this AWS Combo course?
To register, simply click the "ENROLL NOW" button or the "DOWNLOAD BROCHURE" button to learn more or reach out at sales@infosectrain.com. If you are training a team, you can use the "TRAIN YOUR TEAM - Get Quote" option.