
{"id":20361,"date":"2024-03-20T11:57:32","date_gmt":"2024-03-20T11:57:32","guid":{"rendered":"https:\/\/stage.cloudthat.com\/training\/?post_type=stm-courses&#038;p=20361"},"modified":"2025-04-01T13:03:36","modified_gmt":"2025-04-01T13:03:36","slug":"aws-security-governance-at-scale","status":"publish","type":"stm-courses","link":"https:\/\/stage.cloudthat.com\/training\/aws\/aws-security-governance-at-scale","title":{"rendered":"AWS Security Governance at Scale"},"content":{"rendered":"<p>This intermediate-level 1-day course will help solutions architects, DevOps engineers, and security engineers to stop managing cloud governance manually and automate the processes like account management, budget enforcement, security and compliance through AWS security and governance services and concepts. Deep dive into key services, concepts, and best practices to provide control, visibility and governance required to protect sensitive data and systems through tutorials, hands-on labs, and group exercises. By the end of this course, you will be able to apply governance best practices.<br \/>\n<strong data-start=\"0\" data-end=\"9\" data-is-only-node=\"\"><br \/>\n<\/strong><span style=\"color: #ff0000;\"><strong>Note: This course has expired. Please contact us to explore alternative courses that best fit your learning needs or browse our website for a comprehensive list of available courses.<\/strong><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This intermediate-level 1-day course will help solutions architects, DevOps engineers, and security engineers to stop managing cloud governance manually and automate the processes like account management, budget enforcement, security and compliance through AWS security and governance services and concepts. Deep dive into key services, concepts, and best practices to provide control, visibility and governance required [&hellip;]<\/p>\n","protected":false},"author":2390,"featured_media":13808,"template":"","meta":{"footnotes":""},"stm_lms_course_taxonomy":[59],"metadata":{"stm_lms_product_id":["20362"],"_edit_lock":["1743515751:1508"],"_edit_last":["1508"],"permalink_customizer":["aws\/aws-security-governance-at-scale"],"permalink_customizer_regenerate_status":["1"],"_thumbnail_id":["13808"],"_wp_page_template":["default"],"price":["19900"],"wpdocs-meta-bdt":["19900"],"wpdocs-meta-gbp":["349"],"wpdocs-meta-usd":["799"],"_yoast_wpseo_title":["AWS Security Governance at Scale - CloudThat"],"_yoast_wpseo_metadesc":["Achieve seamless AWS security governance at scale with CloudThat's specialized solutions. Safeguard your AWS infrastructure with our proven expertise and best practices."],"_yoast_wpseo_estimated-reading-time-minutes":["1"],"_yoast_wpseo_wordproof_timestamp":[""],"popular_course":["0"],"_popular_course":["field_64253688bc2e5"],"course_banner_image":[""],"_course_banner_image":["field_63c69a6b81cf1"],"mobile_banner_image":[""],"_mobile_banner_image":["field_63cf93896d207"],"banner_link":[""],"_banner_link":["field_63c69a9681cf2"],"banner_image":[""],"_banner_image":["field_621873548f922"],"banner_description":["Hello Security Engineers, Solution Architects, DevOps Engineers, interested in automating cloud governance and make it more reliable \u2013 AWS offers you AWS Security Governance at Scale course which assists you in retiring manual processes and lets you automate cloud governance at scale."],"_banner_description":["field_612c733ed3564"],"overview_section_heading":["AWS Security Governance at Scale Course Overview:"],"_overview_section_heading":["field_64538867ffdd0"],"after_completing_course_heading":["After completing AWS Security Governance at Scale Training, students will be able to:"],"_after_completing_course_heading":["field_645c78ade3f50"],"after_completing_course_0_desciption":["Establish a landing zone with AWS Control Tower"],"_after_completing_course_0_desciption":["field_6103ad2f9f5b2"],"after_completing_course_1_desciption":["Configure AWS Organizations to create a multi-account environment"],"_after_completing_course_1_desciption":["field_6103ad2f9f5b2"],"after_completing_course_2_desciption":["Implement identity management using AWS Single Sign-On users and groups"],"_after_completing_course_2_desciption":["field_6103ad2f9f5b2"],"after_completing_course_3_desciption":["Federate access using AWS SSO"],"_after_completing_course_3_desciption":["field_6103ad2f9f5b2"],"after_completing_course_4_desciption":["Enforce policies using pre-packaged guardrails"],"_after_completing_course_4_desciption":["field_6103ad2f9f5b2"],"after_completing_course_5_desciption":["Centralize logging using AWS CloudTrail and AWS Config"],"_after_completing_course_5_desciption":["field_6103ad2f9f5b2"],"after_completing_course_6_desciption":["Enable cross-account security audits using AWS Identity and Access Management (IAM)"],"_after_completing_course_6_desciption":["field_6103ad2f9f5b2"],"after_completing_course_7_desciption":["Define workflows for provisioning accounts using AWS Service Catalog and AWS Security Hub"],"_after_completing_course_7_desciption":["field_6103ad2f9f5b2"],"after_completing_course":["8"],"_after_completing_course":["field_6103aae828228"],"key_features_heading":["AWS Security Governance at Scale Certification Key Features:"],"_key_features_heading":["field_645388ceffdd1"],"key_features_0_lists":["This is an Intermediate 1-day course that facilitates learners to:"],"_key_features_0_lists":["field_6103ad559f5b3"],"key_features_1_lists":["Understand Governance at scale focal points, Business and Technical Challenges"],"_key_features_1_lists":["field_6103ad559f5b3"],"key_features_2_lists":["Implement Multi-account strategies and Governance with AWS Control Tower"],"_key_features_2_lists":["field_6103ad559f5b3"],"key_features_3_lists":["Preventive cost and security governance and services like AWS Service Catalog"],"_key_features_3_lists":["field_6103ad559f5b3"],"key_features_4_lists":["Implement Detective Controls"],"_key_features_4_lists":["field_6103ad559f5b3"],"key_features_5_lists":["Understand solutions for different use cases"],"_key_features_5_lists":["field_6103ad559f5b3"],"key_features_6_lists":["Perform hands-on labs using services like AWS Catalog, AWS Config, AWS Systems Manager"],"_key_features_6_lists":["field_6103ad559f5b3"],"key_features":["7"],"_key_features":["field_6103aaff28229"],"who_should_attend_heading":["Who Should Attend this Course?"],"_who_should_attend_heading":["field_645388faffdd2"],"who_should_attend_0_attend_lists":["Solutions architects"],"_who_should_attend_0_attend_lists":["field_6103adfb3f3e4"],"who_should_attend_1_attend_lists":["Cloud engineers, including security engineers"],"_who_should_attend_1_attend_lists":["field_6103adfb3f3e4"],"who_should_attend_2_attend_lists":["Delivery and implementation engineers"],"_who_should_attend_2_attend_lists":["field_6103adfb3f3e4"],"who_should_attend_3_attend_lists":["AWS or Security Aspirant Students or job seekers"],"_who_should_attend_3_attend_lists":["field_6103adfb3f3e4"],"who_should_attend":["4"],"_who_should_attend":["field_6103ab0d2822a"],"prerequisites_heading":["Prerequisites for the Training:"],"_prerequisites_heading":["field_64538a51ffdd3"],"prerequisites_text":["<li>Participants of this course must have an understanding and hands-on experience with AWS services, such as AWS Systems Manager, AWS Config, AWS Control Tower and AWS Service Catalog<\/li>\r\n<li>We recommend that attendees of this course have taken AWS Security Fundamentals and AWS Security Essentials<\/li>"],"_prerequisites_text":["field_612c7498c4b84"],"question_sets_details_heading":[""],"_question_sets_details_heading":["field_65d303841f38d"],"question_sets_details_description":[""],"_question_sets_details_description":["field_65d303841f38e"],"question_sets_details_button_text":[""],"_question_sets_details_button_text":["field_65d303841f38f"],"question_sets_details_question_sets":[""],"_question_sets_details_question_sets":["field_65d303841f390"],"question_sets_details":[""],"_question_sets_details":["field_65d303841f38c"],"category_features_heading":[""],"_category_features_heading":["field_644b8ff35049c"],"category_features_features":[""],"_category_features_features":["field_644b90025049d"],"category_features_cta_text":[""],"_category_features_cta_text":["field_644b90285049f"],"category_features_cta_link":[""],"_category_features_cta_link":["field_644b902d504a0"],"category_features":[""],"_category_features":["field_644b8fe15049b"],"course_features_0_heading":["Why choose CloudThat as your training partner?"],"_course_features_0_heading":["field_644a0fae0e67e"],"course_features_0_features_list_0_list":["CloudThat has a strong reputation and a proven track record of delivering high-quality training programs that always exceeds clients\u2019 expectations."],"_course_features_0_features_list_0_list":["field_644a0fc80e680"],"course_features_0_features_list_1_list":["CloudThat has expertise and specialization in multi cloud domains and always ensure they have experience in delivering training programs relevant to your industry, field, or specific learning objectives."],"_course_features_0_features_list_1_list":["field_644a0fc80e680"],"course_features_0_features_list_2_list":["CloudThat has qualified trainers with industry experience who provide valuable insights and practical knowledge in their training deliveries facilitating a great learning."],"_course_features_0_features_list_2_list":["field_644a0fc80e680"],"course_features_0_features_list_3_list":["CloudThat has ability to customize programs to meet your specific needs and objectives. Flexibility in delivery formats, such as on-site, online, blended, weekend learning programs."],"_course_features_0_features_list_3_list":["field_644a0fc80e680"],"course_features_0_features_list_4_list":["CloudThat adopts innovative and engaging learning methods to ensure effective knowledge transfer and skill development including certification preparation assistance, post-training support, labs, case studies, experiential learning and assessments."],"_course_features_0_features_list_4_list":["field_644a0fc80e680"],"course_features_0_features_list_5_list":["CloudThat offers well-designed materials that can enhance the learning experience and serve as valuable resources for participants."],"_course_features_0_features_list_5_list":["field_644a0fc80e680"],"course_features_0_features_list_6_list":["CloudThat offers its trainings at affordable prices to ensure customers get the best learning experience at a best price and Value for their Money."],"_course_features_0_features_list_6_list":["field_644a0fc80e680"],"course_features_0_features_list":["7"],"_course_features_0_features_list":["field_644a0fb70e67f"],"course_features_0_background_color":["a:1:{i:0;s:4:\"blue\";}"],"_course_features_0_background_color":["field_644a0fde0e681"],"course_features_1_heading":["Learning objective of course:"],"_course_features_1_heading":["field_644a0fae0e67e"],"course_features_1_features_list_0_list":["Establish a landing zone with AWS Control Tower"],"_course_features_1_features_list_0_list":["field_644a0fc80e680"],"course_features_1_features_list_1_list":["Configure AWS Organizations to create a multi-account environment"],"_course_features_1_features_list_1_list":["field_644a0fc80e680"],"course_features_1_features_list_2_list":["Implement identity management using AWS Single Sign-On users and groups"],"_course_features_1_features_list_2_list":["field_644a0fc80e680"],"course_features_1_features_list_3_list":["Federate access using AWS SSO"],"_course_features_1_features_list_3_list":["field_644a0fc80e680"],"course_features_1_features_list_4_list":["Enforce policies using pre-packaged guardrails"],"_course_features_1_features_list_4_list":["field_644a0fc80e680"],"course_features_1_features_list_5_list":["Centralize logging using AWS CloudTrail and AWS Config"],"_course_features_1_features_list_5_list":["field_644a0fc80e680"],"course_features_1_features_list_6_list":["Enable cross-account security audits using AWS Identity and Access Management (IAM)"],"_course_features_1_features_list_6_list":["field_644a0fc80e680"],"course_features_1_features_list_7_list":["Define workflows for provisioning accounts using AWS Service Catalog and AWS Security Hub"],"_course_features_1_features_list_7_list":["field_644a0fc80e680"],"course_features_1_features_list":["8"],"_course_features_1_features_list":["field_644a0fb70e67f"],"course_features_1_background_color":["a:1:{i:0;s:5:\"white\";}"],"_course_features_1_background_color":["field_644a0fde0e681"],"course_features":["2"],"_course_features":["field_644a0fa10e67d"],"certification_heading":[""],"_certification_heading":["field_64538bffffdd5"],"certification_0_short_description":[""],"_certification_0_short_description":["field_6103ab2f2822c"],"certification_0_list_content":[""],"_certification_0_list_content":["field_6103ab4a2822d"],"certification_0_image":["12476"],"_certification_0_image":["field_6103ab5b2822e"],"certification":["1"],"_certification":["field_6103ab1a2822b"],"about_trainer":[""],"_about_trainer":["field_6103ab6c2822f"],"course_fee_heading":[""],"_course_fee_heading":["field_64538c1cffdd6"],"course_fee_list":[""],"_course_fee_list":["field_6103abb728234"],"brochure_pdf":[""],"_brochure_pdf":["field_61232e258f89b"],"trainer":[""],"_trainer":["field_6124990e13784"],"course_outline_heading":["AWS Security Governance at Scale Course Outline:"],"_course_outline_heading":["field_64538a8effdd4"],"course_section_0_module_title":["Governance at Scale"],"_course_section_0_module_title":["field_612f5535940c3"],"course_section_0_module_description":[""],"_course_section_0_module_description":["field_612f564c921af"],"course_section_0_section_0_title":[""],"_course_section_0_section_0_title":["field_612f5233b0278"],"course_section_0_section_0_lesson_list_0_lession_title":["Governance at scale focal points"],"_course_section_0_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_0_section_0_lesson_list_1_lession_title":["Business and Technical Challenges"],"_course_section_0_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_0_section_0_lesson_list":["2"],"_course_section_0_section_0_lesson_list":["field_612f530a0ac40"],"course_section_0_section":["1"],"_course_section_0_section":["field_612f51e6b0277"],"course_section_1_module_title":["Governance Automation"],"_course_section_1_module_title":["field_612f5535940c3"],"course_section_1_module_description":[""],"_course_section_1_module_description":["field_612f564c921af"],"course_section_1_section_0_title":[""],"_course_section_1_section_0_title":["field_612f5233b0278"],"course_section_1_section_0_lesson_list_0_lession_title":["Multi-account strategies, guidance, and architecture"],"_course_section_1_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_1_section_0_lesson_list_1_lession_title":["Environments for agility and governance at scale"],"_course_section_1_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_1_section_0_lesson_list_2_lession_title":["Governance with AWS Control Tower "],"_course_section_1_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_1_section_0_lesson_list_3_lession_title":["Use cases for governance at scale"],"_course_section_1_section_0_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_1_section_0_lesson_list":["4"],"_course_section_1_section_0_lesson_list":["field_612f530a0ac40"],"course_section_1_section":["1"],"_course_section_1_section":["field_612f51e6b0277"],"course_section_2_module_title":["Preventive Controls"],"_course_section_2_module_title":["field_612f5535940c3"],"course_section_2_module_description":[""],"_course_section_2_module_description":["field_612f564c921af"],"course_section_2_section_0_title":[""],"_course_section_2_section_0_title":["field_612f5233b0278"],"course_section_2_section_0_lesson_list_0_lession_title":["Enterprise environment challenges for developers"],"_course_section_2_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_2_section_0_lesson_list_1_lession_title":["AWS Service Catalog"],"_course_section_2_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_2_section_0_lesson_list_2_lession_title":["Resource creation"],"_course_section_2_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_2_section_0_lesson_list_3_lession_title":["Workflows for provisioning accounts"],"_course_section_2_section_0_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_2_section_0_lesson_list_4_lession_title":["Preventive cost and security governance"],"_course_section_2_section_0_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_2_section_0_lesson_list_5_lession_title":["Self-service with existing IT service management (ITSM) tools"],"_course_section_2_section_0_lesson_list_5_lession_title":["field_612f533b0ac41"],"course_section_2_section_0_lesson_list":["6"],"_course_section_2_section_0_lesson_list":["field_612f530a0ac40"],"course_section_2_section":["1"],"_course_section_2_section":["field_612f51e6b0277"],"course_section_3_module_title":["Lab 1: Deploy Resources for AWS Catalog"],"_course_section_3_module_title":["field_612f5535940c3"],"course_section_3_module_description":[""],"_course_section_3_module_description":["field_612f564c921af"],"course_section_3_section_0_title":[""],"_course_section_3_section_0_title":["field_612f5233b0278"],"course_section_3_section_0_lesson_list_0_lession_title":["Create a new AWS Service Catalog portfolio and product."],"_course_section_3_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_3_section_0_lesson_list_1_lession_title":["Add an IAM role to a launch constraint to limit the actions the product can perform."],"_course_section_3_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_3_section_0_lesson_list_2_lession_title":["Grant access for an IAM role to view the catalog items."],"_course_section_3_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_3_section_0_lesson_list_3_lession_title":["Deploy an S3 bucket from an AWS Service Catalog product"],"_course_section_3_section_0_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_3_section_0_lesson_list":["4"],"_course_section_3_section_0_lesson_list":["field_612f530a0ac40"],"course_section_3_section":["1"],"_course_section_3_section":["field_612f51e6b0277"],"course_section_4_module_title":["Detective Controls"],"_course_section_4_module_title":["field_612f5535940c3"],"course_section_4_module_description":[""],"_course_section_4_module_description":["field_612f564c921af"],"course_section_4_section_0_title":[""],"_course_section_4_section_0_title":["field_612f5233b0278"],"course_section_4_section_0_lesson_list_0_lession_title":["Operations aspect of governance at scale"],"_course_section_4_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_4_section_0_lesson_list_1_lession_title":["Resource monitoring"],"_course_section_4_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_4_section_0_lesson_list_2_lession_title":["Configuration rules for auditing"],"_course_section_4_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_4_section_0_lesson_list_3_lession_title":["Operational insights "],"_course_section_4_section_0_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_4_section_0_lesson_list_4_lession_title":["Remediation"],"_course_section_4_section_0_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_4_section_0_lesson_list_5_lession_title":["Clean up accounts"],"_course_section_4_section_0_lesson_list_5_lession_title":["field_612f533b0ac41"],"course_section_4_section_0_lesson_list":["6"],"_course_section_4_section_0_lesson_list":["field_612f530a0ac40"],"course_section_4_section":["1"],"_course_section_4_section":["field_612f51e6b0277"],"course_section_5_module_title":["Lab 2: Compliance and Security Automation with AWS Config"],"_course_section_5_module_title":["field_612f5535940c3"],"course_section_5_module_description":[""],"_course_section_5_module_description":["field_612f564c921af"],"course_section_5_section_0_title":[""],"_course_section_5_section_0_title":["field_612f5233b0278"],"course_section_5_section_0_lesson_list_0_lession_title":["Apply Managed Rules through AWS Config to selected resources"],"_course_section_5_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_5_section_0_lesson_list_1_lession_title":["Automate remediation based on AWS Config rules"],"_course_section_5_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_5_section_0_lesson_list_2_lession_title":["Investigate the Amazon Config dashboard and verify resources and rule compliance"],"_course_section_5_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_5_section_0_lesson_list":["3"],"_course_section_5_section_0_lesson_list":["field_612f530a0ac40"],"course_section_5_section":["1"],"_course_section_5_section":["field_612f51e6b0277"],"course_section_6_module_title":["Lab 3: Taking Action with AWS Systems Manager"],"_course_section_6_module_title":["field_612f5535940c3"],"course_section_6_module_description":[""],"_course_section_6_module_description":["field_612f564c921af"],"course_section_6_section_0_title":[""],"_course_section_6_section_0_title":["field_612f5233b0278"],"course_section_6_section_0_lesson_list_0_lession_title":["Setup Resource Groups for various resources based on common requirements"],"_course_section_6_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_6_section_0_lesson_list_1_lession_title":["Perform automated actions against targeted Resource Groups"],"_course_section_6_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_6_section_0_lesson_list":["2"],"_course_section_6_section_0_lesson_list":["field_612f530a0ac40"],"course_section_6_section":["1"],"_course_section_6_section":["field_612f51e6b0277"],"course_section_7_module_title":["Resources"],"_course_section_7_module_title":["field_612f5535940c3"],"course_section_7_module_description":[""],"_course_section_7_module_description":["field_612f564c921af"],"course_section_7_section_0_title":[""],"_course_section_7_section_0_title":["field_612f5233b0278"],"course_section_7_section_0_lesson_list_0_lession_title":["Explore additional resources for security governance at scale"],"_course_section_7_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_7_section_0_lesson_list":["1"],"_course_section_7_section_0_lesson_list":["field_612f530a0ac40"],"course_section_7_section":["1"],"_course_section_7_section":["field_612f51e6b0277"],"course_section":["8"],"_course_section":["field_612f4f27b0276"],"note_section":["Note: This course has expired. Please contact us to explore alternative courses that best fit your learning needs or browse our website for a comprehensive list of available courses."],"_note_section":["field_616d3ed46bbd2"],"popular_sort":[""],"_popular_sort":["field_6172496402af3"],"related_courses":["a:3:{i:0;s:4:\"8544\";i:1;s:4:\"8540\";i:2;s:5:\"20762\";}"],"_related_courses":["field_61c453ca6b2dd"],"reviews_heading":[""],"_reviews_heading":["field_64538c39ffdd7"],"review_rating":[""],"_review_rating":["field_62a813a92bee6"],"total_review_count":["2441"],"_total_review_count":["field_62b002d8d2de5"],"average_review_count":["4.3"],"_average_review_count":["field_62b00367d2de6"],"faq_heading":[""],"_faq_heading":["field_64538c59ffdd8"],"educational_schema":[""],"_educational_schema":["field_652fbbf6f589a"],"curriculum":[""],"featured":[""],"views":["2271"],"level":["intermediate"],"current_students":["0"],"duration_info":["1 Day"],"video_duration":[""],"status":[""],"status_dates":[""],"not_single_sale":[""],"sale_price":[""],"sale_price_dates":[""],"enterprise_price":[""],"not_membership":[""],"affiliate_course":[""],"affiliate_course_text":[""],"affiliate_course_link":[""],"expiration_course":[""],"end_time":[""],"drip_content":[""],"prerequisites":[""],"prerequisite_passing_level":[""],"announcement":[""],"faq":["[{\"question\":\"What is AWS Security Governance at Scale training for?\",\"answer\":\"Security Governance at scale is a new concept for automating cloud governance that can help companies to automate the repetitive processes like account management, budget enforcement, compliance enforcement, security enforcement etc. By automating such common challenges, companies can scale without compromising on agility, speed, or innovation.\"},{\"question\":\"What will this training enable the learners?\",\"answer\":\"In this course, you will learn how to facilitate developer speed and agility, and incorporate preventive and detective controls. It also provides decision makers with the visibility, control, and governance necessary to protect sensitive data and systems.\"},{\"question\":\"What is the duration of this training?\",\"answer\":\"This is a 1-day Intermediate level training\"},{\"question\":\"Where to get started with AWS Training and Certification Security learning path?\",\"answer\":\"AWS Security Essentials and AWS Security Best Practices courses where you learn fundamental AWS Cloud security concepts\"},{\"question\":\"What is the career prospect of Security Engineers in AWS?\",\"answer\":\"As per https:\/\/www.payscale.com\/, $117k\/ year is the Avg. Base Salary (USD) for a person planning in career in security domain and specifically in AWS Security domain\"}]"],"course_files_pack":[""],"course_certificate":[""],"type":[""],"video_type":[""],"presto_player_idx":[""],"lesson_video":[""],"lesson_video_poster":[""],"lesson_video_width":[""],"lesson_shortcode":[""],"lesson_embed_ctx":[""],"lesson_youtube_url":[""],"lesson_stream_url":[""],"lesson_vimeo_url":[""],"lesson_ext_link_url":[""],"duration":[""],"preview":[""],"lesson_excerpt":[""],"lesson_files_pack":[""],"questions":[""],"quiz_style":[""],"duration_measure":[""],"correct_answer":[""],"passing_grade":[""],"re_take_cut":[""],"random_questions":[""],"answers":[""],"question_explanation":[""],"question_view_type":[""],"review_course":[""],"review_user":[""],"review_mark":[""],"order":[""],"absolute":[""],"sticky":[""],"sticky_threshold":[""],"sticky_threshold_color":[""],"stm_agenda":[""],"stm_host":[""],"stm_select_approved_denied":[""],"stm_multiselect_approved":[""],"stm_multiselect_denied":[""],"stm_date":[""],"stm_time":[""],"stm_timezone":[""],"stm_duration":[""],"stm_password":[""],"stm_waiting_room":[""],"stm_join_before_host":[""],"stm_host_join_start":[""],"stm_start_after_participants":[""],"stm_mute_participants":[""],"stm_enforce_login":[""],"stm_alternative_hosts":[""],"author_id":[""],"emails":[""],"_yoast_wpseo_primary_stm_lms_course_taxonomy":["59"],"sale_price_dates_start":[""],"sale_price_dates_end":[""],"_wp_old_date":["2024-03-18"],"_regular_price_wmcp":["{\"USD\":\"799\",\"GBP\":\"349\",\"BDT\":\"19900\"}"],"_yoast_wpseo_content_score":["90"]},"acf":[],"_links":{"self":[{"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/stm-courses\/20361"}],"collection":[{"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/stm-courses"}],"about":[{"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/types\/stm-courses"}],"author":[{"embeddable":true,"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/users\/2390"}],"version-history":[{"count":0,"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/stm-courses\/20361\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/media\/13808"}],"wp:attachment":[{"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/media?parent=20361"}],"wp:term":[{"taxonomy":"stm_lms_course_taxonomy","embeddable":true,"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/stm_lms_course_taxonomy?post=20361"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}