Listing Thumbnail

    Training: AWS Security Best Practices

     Info
    AWS Security Best Practices provides an overview of some of the industry best practices for using AWS security and control types. This course helps you understand your responsibilities while providing valuable guidelines for how to keep your workload safe and secure. You will learn how to secure your network infrastructure using sound design options. You will also learn how you can harden your compute resources and manage them securely. Finally, by understanding AWS monitoring and alerting, you can detect and alert on suspicious events to help you quickly begin the response process in the event of a potential compromise.

    Overview

    Description

    Currently, the average cost of a security breach can be upwards of $4 million. AWS Security Best Practices provides an overview of some of the industry best practices for using AWS security and control types. This course helps you understand your responsibilities while providing valuable guidelines for how to keep your workload safe and secure. You will learn how to secure your network infrastructure using sound design options. You will also learn how you can harden your compute resources and manage them securely. Finally, by understanding AWS monitoring and alerting, you can detect and alert on suspicious events to help you quickly begin the response process in the event of a potential compromise.

    Course Objectives

    In this course, you will learn to:

    • Design and implement a secure network infrastructure
    • Design and implement compute security
    • Design and implement a logging solution

    Prerequisites

    We recommend that attendees of this course have:

    • AWS Security Fundamentals
    • AWS Security Essentials

    Course duration / Price

    1 day / € 795.00 (excl. tax) per person (DE)

    Course outline

    Module 1: AWS Security Overview

    • Shared responsibility model
    • Customer challenges
    • Frameworks and standards
    • Establishing best practices
    • Compliance in AWS

    Module 2: Securing the Network

    • Flexible and secure
    • Security inside the Amazon Virtual Private Cloud (Amazon VPC)
    • Security services
    • Third-party security solutions
    • Lab 1: Controlling the Network
    • Create a three-security zone network infrastructure
    • Implement network segmentation using security groups, Network Access Control Lists (NACLs), and public and private subnets
    • Monitor network traffic to Amazon Elastic Compute Cloud (EC2) instances using VPC flow logs

    Module 3: Amazon EC2 Security

    • Compute hardening
    • Amazon Elastic Block Store (EBS) encryption
    • Secure management and maintenance
    • Detecting vulnerabilities
    • Using AWS Marketplace
    • Lab 2: Securing the starting point (EC2)
    • Create a custom Amazon Machine Image (AMI)
    • Deploy a new EC2 instance from a custom AMI
    • Patch an EC2 instance using AWS Systems Manager
    • Encrypt an EBS volume.
    • Understand how EBS encryption works and how it impacts other operations.
    • Use security groups to limit traffic between EC2 instances to only that which is encrypted

    Module 4: Monitoring and Alerting

    • Logging network traffic
    • Logging user and Application Programming Interface (API) traffic
    • Visibility with Amazon CloudWatch
    • Enhancing monitoring and alerting
    • Verifying your AWS environment
    • Lab 3: Security Monitoring
    • Configure an Amazon Linux 2 instance to send log files to Amazon CloudWatch
    • Create Amazon CloudWatch alarms and notifications to monitor for failed login attempts
    • Create Amazon CloudWatch alarms to monitor network traffic through a Network Address Translation (NAT) gateway

    IMPORTANT: Please bring your notebook (Windows, Linux or Mac) to our trainings. If this is not possible, please contact us in advance.

    The practical exercises are performed in prepared working environments available via web browser – no software needs to be installed. The course material is in English, spoken language can be in german or english. Other languages like spanish, portuguese or french, please contact us under training@tecracer.de 

    Highlights

    • Comprehensive Network Security: Learn to design and implement a secure network infrastructure within AWS, utilizing best practices for network segmentation and monitoring with VPC flow logs.
    • Hardening Compute Resources: Gain hands-on experience in securing Amazon EC2 instances, implementing EBS encryption, and managing vulnerabilities through AWS services like Systems Manager.
    • Effective Monitoring and Alerting: Master the setup of AWS monitoring tools like CloudWatch to track user, API, and network traffic, and configure alarms for suspicious activity.

    Details

    Delivery method

    Deployed on AWS

    Unlock automation with AI agent solutions

    Fast-track AI initiatives with agents, tools, and solutions from AWS Partners.
    AI Agents

    Pricing

    Custom pricing options

    Pricing is based on your specific requirements and eligibility. To get a custom quote for your needs, request a private offer.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Support

    Vendor support

    This offer does not include a support package. Please contact training@tecracer.de  if you have any questions.