Amazon Security Lake Getting Started
Offered By: Amazon Web Services via AWS Skill Builder
Course Description
Overview
With Amazon Security Lake, you can automatically centralize security data from various sources into a purpose-built data lake in your account. These sources include Amazon Web Services (AWS) and software as a service (SaaS) providers, on premises, and cloud sources. In this course, you will learn the benefits and technical concepts of Amazon Security Lake. If you are new to the service, you will learn how to start with Security Lake through a demonstration using the AWS Management Console. You will learn about the standard architecture and how the built-in features can help you streamline Security Lake.
- Course level: Fundamental
- Duration: 60 minutes
Activities
This course includes presentations, demonstrations, videos, and assessments.Course objectives
In this course, you will learn to do the following:- Identify the purpose of Amazon Security Lake.
- Recognize the problems Security Lake can solve.
- Understand the architecture and pricing philosophy.
Intended Audience
This course is intended for the following job roles:- Security engineers
- Security operations
- Solution architects
- IT managers
- IT administrators
Prerequisites
We recommend that attendees of this course have the following prerequisites:- Understanding of fundamental AWS Security and software services.
- Recommending learners take the AWS Security Fundamentals Second Edition digital course.
Course outline
- Module 1: Introduction
- Introduction to Amazon Security Lake
- Architecture and Use Cases
- Module 2: Using Amazon Security Lake
- How Do I Configure Amazon Security Lake?
- How Do I Query Data in Amazon Security Lake using Amazon Athena?
- How Do I Disable Amazon Security Lake?
- Module 3: Resources
- Learn More
- Contact Us
Tags
Related Courses
Architecting Microsoft Azure SolutionsMicrosoft via edX Internetwork Security
Indian Institute of Technology, Kharagpur via Swayam Network Security
Georgia Institute of Technology via Udacity Microsoft Professional Orientation : Cloud Administration
Microsoft via edX Cyber Threats and Attack Vectors
University of Colorado System via Coursera