Description
To gain deep understanding of AWS security technologies
- Implement data-encryption methods and mechanisms on AWS platform
- Choose appropriate security services for workloads
- Deep understanding of various protocols, logging standards and IAM management.
- Design edge security and implement a secure network infrastructure
- Design and implement a scalable authorization and authentication system to access AWS resources
- Design and implement security monitoring and alerting
- Be able to understand Data security, cost and performance objectives
- Be able to understand various real-time use cases, best practice and n/w design patterns


