80 workshops and growing
New workshops and content added all the time
This website is a dedicated resource for curated workshops and training Modules created by the teams at AWS and AWS Partners. The workshops will teach you how to modernize various aspects of your business and provide you with detailed insight into what technology will drive this change.
New workshops and content added all the time
Created by specialists in the field from AWS and AWS Partners
Globally available without restriction and mobile friendly
In this workshop, you’ll learn how to leverage the Cloud One Platform to enforce the detection and protection in Applications, Elastic Kubernetes Service, Open-Source Projects and your IaC Templates!
In this workshop, you will learn how to migrate your objects from a on-premise Network File Server (NFS) using AWS DataSync to AWS S3 in your AWS account securing the files with Trend Micro Cloud One File Storage Security.
In this workshop, you’ll learn how to leverage Cloud One - Workload Security to enforce the detection and protection policy (application control, anti-malware, Hosted IDS/IPS, firewall, integrity monitoring, and log inspection) via a small software component deployed on each instance being protected.
Learn how to leverage Trend Micro Cloud One – Network Security to protect the connectivity from the internet to your applications running on Amazon EC2, ECS, AWS Fargate and others. Cloud workloads frequently require internet access, and as we know, anything accessing the internet can be breached. This workshop explores simple tactics on how to protect the internet connectivity to your AWS services and between VPCs. In this workshop, you will learn how to protect your cloud network and meet compliance requirements such as PCI, DSS and HIPAA to deploy Network IDS/IPS into your AWS environments.
In this workshop, you will learn how to monitor data visualization and AWS application observability using Sumo Logic.
Learn how to leverage Trend Micro Cloud One - Application Security with your serverless applications running on AWS Lambda or containerized applications running on AWS Fargate. If you looking to make cloud security more efficient, proactive, and gain visibility to help lead your developers, cloud architects, and DevOps engineers, this workshop is for you! Bridge the gap between your security and development teams by providing relevant information to gain better visibility into attacks targeting your cloud native applications, and take security action.
In this workshop, you will learn how to scan your projects on git repository and easily see the open source vulnerabilities existing in the open source projects that you applications are using. You will learn how you shift-left security leveraging Cloud One - Open Source Security by Snyk.
In this workshop, you will learn to use the new GitLab Agent for Kubernetes to integrate with EKS more securely and to add GitOps pull deployments. Add GitLab’s mature DevSecOps security scanning, automated review environment management and cluster scanning security to your latest GitOps projects. Learn how the new GitLab Agent cluster connection method improves the security posture for all existing EKS CD push integrations as well.
In this workshop, you will learn how to scan your objects stored in Amazon S3 buckets against malware and integrate them into your custom workflows by automating with your current resources, directly into your AWS environment.
In this workshop, you’ll learn how to leverage infrastructure as code (IaC) and Security to automate your cloud security efforts. If you’re interested in making cloud security more efficient, automated, proactive, and accessible to developers, cloud architects, DevOps engineers this workshop is for you!
In this workshop you will learn how to secure your workloads on Amazon EKS using Aqua’s comprehensive DevSecOps platform and tooling
In this workshop you will learn how to scan containerized applications on Amazon EKS with Snyk. We will learn about Open Source vulnerabilities introduced by your Container Base Image and your application dependencies.