Upon completion of this course, learners will be able to do the following:
• Identify security benefits and responsibilities of using the Amazon Web Services (AWS) Cloud.
• Use the identity and access management features of AWS.
• Describe how to secure network access to AWS resources.
• Explain the available methods for encrypting data at rest and data in transit.
• Determine which AWS services can be used for monitoring and incident response.