- Learning Path Libraries: This path is only available in the libraries listed. To access this path, purchase a license for the corresponding library.
- Cloud
- Security
Threat Detection for AWS
Learn how to detect, investigate, and respond to threats in your AWS environment using native tools like Amazon GuardDuty, Amazon Security Hub, CloudTrail Lake, and Lambda. This path is designed to help cloud engineers and security practitioners operationalize threat detection workflows and build automated response capabilities that scale across accounts and services.
Content in this path
Essentials
This section introduces the foundational workflows for detecting and responding to threats in AWS. You'll learn how to configure GuardDuty, Security Hub, and related telemetry services to surface suspicious activity across your environment.
- 1. Learn how to configure Amazon GuardDuty, CloudTrail, AWS Config, and VPC Flow Logs to generate meaningful, actionable threat telemetry.
- 2. Use Amazon Security Hub and CloudTrail Lake to triage GuardDuty findings, reconstruct attack timelines, and build a clear picture of suspicious activity across your environment.
- 3. Build EventBridge rules and Lambda functions that respond to high-priority threats in real time—isolating compromised resources, revoking credentials, and notifying your security team automatically.
- Before starting this path, you should already be comfortable navigating the AWS Console and working with foundational cloud services such as EC2, IAM, and VPC. You don't need to be a security expert, but you should understand core AWS concepts like CloudTrail logs, IAM roles, and how resources interact within a typical cloud environment. If you’ve configured basic workloads and handled permissions or logging before, you're ready to take the next step into threat detection and response.
- Amazon Web Services
- Cloud Security
- Threat Detection