Share your details for best career advice.
| 01 Nov 2025 | 24 | 06:00 PM - 09:00 PM | Sat, Sun | |
| 02 Nov 2025 | 24 | 06:00 PM - 09:00 PM | Sat, Sun | |
| 08 Nov 2025 | 24 | 06:00 PM - 09:00 PM | Sat, Sun | |
| 09 Nov 2025 | 24 | 06:00 PM - 09:00 PM | Sat, Sun | 
Course Price At
 Secure Transaction
                                       Secure Transaction
                                        
                                        
                                    | 01 Nov 2025 | 24 | 06:00 PM - 09:00 PM | Sat, Sun | |
| 02 Nov 2025 | 24 | 06:00 PM - 09:00 PM | Sat, Sun | |
| 08 Nov 2025 | 24 | 06:00 PM - 09:00 PM | Sat, Sun | |
| 09 Nov 2025 | 24 | 06:00 PM - 09:00 PM | Sat, Sun | 
Course Price At
 Secure Transaction
                                          Secure Transaction
                                           
                                           
                                       Online Self Learning Courses are designed for self-directed training, allowing participants to begin at their convenience with structured training and review exercises to reinforce learning. You’ll learn through videos, PPTs and complete assignments, projects and other activities designed to enhance learning outcomes, all at times that are most convenient to you.
Course Price At
 Secure Transaction
                                          Secure Transaction
                                           
                                           
                                        DOWNLOAD CURRICULUM
 
                         DOWNLOAD CURRICULUM
                     
                  AWS Certified Security - Specialty is an advanced certification for IT professionals focusing on securing AWS environments. It validates expertise in data protection, identity and access management, infrastructure security, and threat detection on AWS. Ideal for cloud security roles, it demonstrates an in-depth understanding of AWS’s security best practices, enabling professionals to safeguard cloud applications and data effectively.
1.1 Design and implement an incident response plan
1.2 Detect security threats and anomalies by using AWS services
1.3 Respond to compromised resources and workloads
 DOWNLOAD CURRICULUM
                                       DOWNLOAD CURRICULUM
                                    
                                    2.1 Design and Implement monitoring and alerting to address security events
2.2 Troubleshoot security monitoring and alerting
2.3 Design and implement a logging solution
2.4 Troubleshoot logging solutions
2.5 Design a log analysis solution
 DOWNLOAD CURRICULUM
                                       DOWNLOAD CURRICULUM
                                    
                                    3.1 Design and implement security controls for edge services
3.2 Design and implement network security controls
3.3 Design and implement security controls for compute workloads
 DOWNLOAD CURRICULUM
                                       DOWNLOAD CURRICULUM
                                    
                                    4.1 Design, implement and troubleshoot authentication for AWS resources
4.2 Design, implement and troubleshoot authorization for AWS resources
 DOWNLOAD CURRICULUM
                                       DOWNLOAD CURRICULUM
                                    
                                    5.1 Design and implement controls that provide confidentiality and integrity for data in transit
5.2 Design and implement controls that provide confidentiality and integrity for data at rest
5.3 Design and implement controls to manage the data lifecycle at rest
5.4 Design and implement controls to protect credentials, secrets, and cryptographic key materials
 DOWNLOAD CURRICULUM
                                       DOWNLOAD CURRICULUM
                                    
                                     
 
                         
                         
                         
                         
                        You’ll learn about data encryption, IAM, incident response, threat detection, compliance, and secure network design in AWS.
