Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

SEC480: AWS Secure Builder

SEC480Cloud Security
  • 16 Hours (Self-Paced)
Course created by:
Serge Borso
Serge Borso
SEC480: AWS Secure Builder
Course created by:
Serge Borso
Serge Borso
  • GIAC AWS Secure Builder Micro-Credential
  • 12 CPEs

    Apply your credits to renew your certifications

  • Self-paced

    Train at your own pace from wherever you are

  • Essential Skill Level

    Course material is for individuals with an understanding of IT or cyber security concepts

  • 8 Hands-On Lab(s)

    Apply what you learn with hands-on exercises and labs

Ensure resilience against threats: Fortify applications, secure data, harden infrastructure, comply with GRC programs.

Course Overview

SEC480: AWS Secure Builder equips non-security personnel such as cloud engineers, developers, and architects with the security fundamentals necessary to build secure AWS workloads from the beginning. This course serves as foundational AWS security training, designed to fill the critical knowledge gap for technical professionals responsible for building and deploying workloads to AWS environments. Organizations operating in AWS face a level of complexity that can introduce vulnerabilities, frequently resulting from inadvertent misconfigurations.

Participants engage in eight self-paced modules covering identity management, encryption, access control protocols, and secure coding principles—each paired with practical, real-world labs. The course delivers immediate value by empowering teams to implement protective measures without overburdening security personnel. Upon completion, learners leave with enhanced skills to construct resilient AWS environments.

What You'll Learn

  • Implement robust IAM configurations aligned with zero trust principles
  • Construct hardened CI/CD pipelines integrating automated security checks
  • Deploy encrypted communication channels securing inter-service data flows
  • Configure comprehensive logging mechanisms across AWS infrastructure
  • Design resilient incident response frameworks detecting intrusion attempts

Business Takeaways

  • Reduce security breaches through proactive secure architecture design
  • Accelerate compliance validation with built-in security controls
  • Decrease resource investment needed for retroactive security fixes
  • Enhance organizational security posture through workforce upskilling
  • Minimize operational disruptions resulting from security incidents
  • Strengthen client trust through demonstrable security capabilities
  • Improve security team efficiency by distributing security knowledge

Course Syllabus

Explore the course syllabus below to view the full range of topics covered in SEC480: AWS Secure Builder.

Section 1Secure Development and Deployment Practices in AWS

In Section 1 of Secure AWS Development, we will concentrate on the shared responsibility model, hardening workloads, securing the CICD pipeline, and understanding the critical role of IAM in AWS.

Section 2Securing AWS: Monitoring, Incident Response, and Trust

In Section 2 of Secure AWS Development, we turn our attention to understanding what happens when there are misconfigurations in our environment and how to deal with adversaries. In addition, we will delve into what proper logging and monitoring entail, how to leverage an incident response plan, and strategies to minimize supply chain risks.

Things You Need To Know

Relevant Job Roles

Cybersecurity Architecture (OPM 652)

NICE: Design and Development

Responsible for ensuring that security requirements are adequately addressed in all aspects of enterprise architecture, including reference models, segment and solution architectures, and the resulting systems that protect and support organizational mission and business processes.

Explore learning path

Technology Research and Development (OPM 661)

NICE: Design and Development

Responsible for conducting software and systems engineering and software systems research to develop new capabilities with fully integrated cybersecurity. Conducts comprehensive technology research to evaluate potential vulnerabilities in cyberspace systems.

Explore learning path

Network Operations (OPM 441)

NICE: Implementation and Operation

Responsible for planning, implementing, and operating network services and systems, including hardware and virtual environments.

Explore learning path

Enterprise Architecture (OPM 651)

NICE: Design and Development

Responsible for developing and maintaining business, systems, and information processes to support enterprise mission needs. Develops technology rules and requirements that describe baseline and target architectures.

Explore learning path

Course Includes:

Group Purchase?Contact Sales
Filter by:
  • Location & instructor

    Virtual (OnDemand)

    Instructed by Serge Borso
    Date & Time
    OnDemand (Anytime)Self-Paced, 4 months access
    Course price
    $1,300 USD*Prices exclude applicable local taxes
    Enrollment options
Showing 1 of 1

Benefits of Learning with SANS

Instructor teaching class with code in the background

Get feedback from the world’s best cybersecurity experts and instructors

Learning via laptop

Choose how you want to learn - online, on demand, or at our live in-person training events

Learning via laptop

Get access to our range of industry-leading courses and resources