AWS Cloud Practitioner Essentials Training Certificate

AWS Cloud Practitioner Essentials Certificate by Tim Layton @ CloudSecurityLaunchPad.com

I just successfully completed the 6 hour AWS Cloud Practitioner Essentials Training course and I passed the course final exam as well.

If you are reading this article, then you are probably in the process or planning on taking the AWS Certified Cloud Practitioner exam.

The AWS Cloud Practitioner Essentials Training course is for individuals who seek an overall understanding of the Amazon Web Services (AWS) Cloud, independent of specific technical roles. You will learn about AWS Cloud concepts, AWS services, security, architecture, pricing, and support to build your AWS Cloud knowledge. This course also helps you prepare for the AWS Certified Cloud Practitioner exam.

AWS Cloud Practitioner Essentials Certificate by Tim Layton @ CloudSecurityLaunchPad.com

If you have any type of background in cloud computing, I highly recommend anyone preparing for the AWS Certified Cloud Practitioner exam to take this course because it provides an excellent introduction to AWS and many of the subjects that will appear on the exam. This course is develop and delivered by AWS and it delivered at the highest quality. The best part about the training is that it is FREE!

AWS Certified Cloud Practitioner Learning Path @ CloudSecurityLaunchPad.com

You can review the exam preparation recommendations from the AWS website and make sure you are on track for passing the exam. I also highly recommend reviewing the AWS Certified Cloud Practitioner Ramp-up Guide.

AWS also provides a 40 hour free training curriculum for helping take beginners from zero to AWS Certified Cloud Practitioner. If you are brand new to cloud and want to earn the AWS Certified Cloud Practitioner certification, this is an excellent resource that will help you achieve your goal and it is absolutely free.

Get My Free Cloud Security Risk Management Journal

COURSE OBJECTIVES

  • Summarize the working definition of AWS 
  • Differentiate between on-premises, hybrid-cloud, and all-in cloud 
  • Describe the basic global infrastructure of the AWS Cloud 
  • Explain the six benefits of the AWS Cloud 
  • Describe and provide an example of the core AWS services, including compute, network, databases, and storage 
  • Identify an appropriate solution using AWS Cloud services with various use cases 
  • Describe the AWS Well-Architected Framework 
  • Explain the shared responsibility model 
  • Describe the core security services within the AWS Cloud 
  • Describe the basics of AWS Cloud migration 
  • Articulate the financial benefits of the AWS Cloud for an organization’s cost management 
  • Define the core billing, account management, and pricing models 
  • Explain how to use pricing tools to make cost-effective choices for AWS services 

COURSE OUTLINE

The course will take you all day to successfully complete along with time for lunch and a couple of much needed stretching breaks. I try and get up and walk or do some basic exercises after every two hours of training.

Module 1: Introduction to Amazon Web Services

  • Summarize the benefits of AWS 
  • Describe differences between on-demand delivery and cloud deployments 
  • Summarize the pay-as-you-go pricing model 

Module 2: Compute in the Cloud

  • Describe the benefits of Amazon Elastic Compute Cloud (Amazon EC2) at a basic level 
  • Identify the different Amazon EC2 instance types 
  • Differentiate between the various billing options for Amazon EC2 
  • Describe the benefits of Amazon EC2 Auto Scaling 
  • Summarize the benefits of Elastic Load Balancing 
  • Give an example of the uses for Elastic Load Balancing 
  • Summarize the differences between Amazon Simple Notification Service (Amazon SNS) and Amazon Simple Queue Services (Amazon SQS) 
  • Summarize additional AWS compute options 

Module 3: Global Infrastructure and Reliability

  • Summarize the benefits of the AWS Global Infrastructure 
  • Describe the basic concept of Availability Zones 
  • Describe the benefits of Amazon CloudFront and Edge locations 
  • Compare different methods for provisioning AWS services 

Module 4: Networking

  • Describe the basic concepts of networking 
  • Describe the difference between public and private networking resources 
  • Explain a virtual private gateway using a real life scenario 
  • Explain a virtual private network (VPN) using a real life scenario 
  • Describe the benefit of AWS Direct Connect 
  • Describe the benefit of hybrid deployments 
  • Describe the layers of security used in an IT strategy 
  • Describe which services are used to interact with the AWS global network 

Module 5: Storage and Databases

  • Summarize the basic concept of storage and databases 
  • Describe benefits of Amazon Elastic Block Store (Amazon EBS) 
  • Describe benefits of Amazon Simple Storage Service (Amazon S3) 
  • Describe the benefits of Amazon Elastic File System (Amazon EFS) 
  • Summarize various storage solutions 
  • Describe the benefits of Amazon Relational Database Service (Amazon RDS) 
  • Describe the benefits of Amazon DynamoDB 
  • Summarize various database services 

Module 6: Security

  • Explain the benefits of the shared responsibility model 
  • Describe multi-factor authentication (MFA) 
  • Differentiate between the AWS Identity and Access Management (IAM) security levels 
  • Describe security policies at a basic level 
  • Explain the benefits of AWS Organizations 
  • Summarize the benefits of compliance with AWS 
  • Explain primary AWS security services at a basic level 

Module 7: Monitoring and Analytics

  • Summarize approaches to monitoring your AWS environment 
  • Describe the benefits of Amazon CloudWatch 
  • Describe the benefits of AWS CloudTrail 
  • Describe the benefits of AWS Trusted Advisor 

Module 8: Pricing and Support

  • Understand AWS pricing and support models 
  • Describe the AWS Free Tier 
  • Describe key benefits of AWS Organizations and consolidated billing 
  • Explain the benefits of AWS Budgets 
  • Explain the benefits of AWS Cost Explorer 
  • Explain the primary benefits of the AWS Pricing Calculator 
  • Distinguish between the various AWS Support Plans 
  • Describe the benefits of AWS Marketplace 

Module 9: Migration and Innovation

  • Understand migration and innovation in the AWS Cloud 
  • Summarize the AWS Cloud Adoption Framework (AWS CAF) 
  • Summarize six key factors of a cloud migration strategy 
  • Describe the benefits of various AWS data migration solutions, such as AWS Snowcone, AWS Snowball, and AWS Snowmobile 
  • Summarize the broad scope of innovative solutions that AWS offers 

Module 10: The Cloud Journey

  • Summarize the five pillars of the AWS Well-Architected Framework 
  • Explain the six benefits of cloud computing 

Module 11: AWS Certified Cloud Practitioner Basics

  • Determine resources for preparing for the AWS Certified Cloud Practitioner examination 
  • Describe benefits of becoming AWS Certified 

Course Final Assessment

  • Solve questions similar to those found within the AWS Certified Cloud Practitioner examination

Tim Layton specializes in demystifying the complexities and technical jargon associated with cloud computing security and risk management for business stakeholders across the enterprise. Tim is a cloud security thought leader defining actionable and defensible strategies to help enterprise stakeholders make risk-based decisions and prioritize investments in the new digital frontier.

Stay Connected With Tim Layton

LinkedIn: www.Linkedin.com/in/TimLaytonCyber

Website: http://CloudSecurityLaunchPad.com

Get My Free Cloud Security Risk Management Journal


COMMON CYBERSECURITY RISK TERMS DEFINED

Threat: Any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, or the Nation through an information system via unauthorized access, destruction, disclosure, or modification of information, and/or denial of service. (NIST 800–30)

Threat: potential cause of an unwanted incident, which can result in harm to a system or organization. (ISO 27001)

Vulnerability: Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited by a threat source. (NIST 800–30)

Vulnerability: weakness of an asset or control that can be exploited by one or more threats. (ISO 27001)

Likelihood: A weighted factor based on a subjective analysis of the probability that a given threat is capable of exploiting a given vulnerability or a set of vulnerabilities. (NIST 800–30)

Likelihood: chance of something happening. (ISO 27001)

Risk: A measure of the extent to which an entity is threatened by a potential circumstance or event, and typically a function of (i) the adverse impacts that would arise if the circumstance or event occurs; and (ii) the likelihood of occurrence. (NIST 800–30)

Risk: effect of uncertainty on objectives. (ISO 27001)

Security Controls: The management, operational, and technical controls (i.e., safeguards or countermeasures) prescribed for an information system to protect the confidentiality, integrity, and availability of the system and its information. (NIST 800–30)

Compensating Security Control: A management, operational, and/or technical control (i.e., safeguard or countermeasure) employed by an organization in lieu of a recommended security control in the low, moderate, or high baselines that provides equivalent or comparable protection for an information system. (NIST 800–30)

Impact Level: The magnitude of harm that can be expected to result from the consequences of unauthorized disclosure of information, unauthorized modification of information, unauthorized destruction of information, or loss of information or information system availability. (NIST 800–30)

Residual Risk: Portion of risk remaining after security measures have been applied. (NIST 800–30)

Security Posture: The security status of an enterprise’s networks, information, and systems based on information assurance resources (e.g., people, hardware, software, policies) and capabilities in place to manage the defense of the enterprise and to react as the situation changes. (NIST 800–30)

Get My Free Cloud Security Risk Management Journal

Tim Layton

Tim Layton

Get Tim Layton's Free Cloud Security Journal so you can remain current with the latest cloud security trends and updates. Tim is a cloud security thought leader defining actionable and defensible strategies to help organization's make risk-based decisions and prioritize investments.

Recommended Articles

Leave a Reply

Your email address will not be published. Required fields are marked *