Seminare
Seminare

Live-Online: AWS Security Best Practices

Webinar - Haufe Akademie GmbH & Co. KG

Do you need to know how to establish and maintain a secure posture in the AWS Cloud? The AWS Security Best Practices course will help you learn to design and implement solutions to keep your workloads safe and secure.
Termin Ort Preis*
21.01.2025 online 904,40 €
11.03.2025 online 904,40 €
*Alle Preise verstehen sich inkl. MwSt.

Detaillierte Informationen zum Seminar

Inhalte:

Currently, the average cost of a security breach can be upwards of $4 million. AWS Security Best Practices provides an overview of some of the industry best practices for using AWS security and control types. This course helps you understand your responsibilities while providing valuable guidelines for how to keep your workload safe and secure.



You will learn how to secure your network infrastructure using sound design options. You will also learn how you can harden your compute resources and manage them securely. Finally, by understanding AWS monitoring and alerting, you can detect and alert on suspicious events to help you quickly begin the response process in the event of a potential compromise.


 


Module 1: AWS Security Overview


  • Shared responsibility model
  • Customer challenges
  • Frameworks and standards
  • Establishing best practices
  • Compliance in AWS


Module 2: Securing the Network


  • Flexible and secure
  • Security inside the Amazon Virtual Private Cloud (Amazon VPC)
  • Security services
  • Third-party security solutions


Lab 1: Controlling the Network


  • Create a three-security zone network infrastructure
  • Implement network segmentation using security groups, Network Access Control Lists (NACLs), and public and private subnets
  • Monitor network traffic to Amazon Elastic Compute Cloud (EC2) instances using VPC flow logs


Module 3: Amazon EC2 Security


  • Compute hardening
  • Amazon Elastic Block Store (EBS) encryption
  • Secure management and maintenance
  • Detecting vulnerabilities
  • Using AWS Marketplace


Lab 2: Securing the starting point (EC2)


  • Create a custom Amazon Machine Image (AMI)
  • Deploy a new EC2 instance from a custom AMI
  • Patch an EC2 instance using AWS Systems Manager
  • Encrypt an EBS volume.
  • Understand how EBS encryption works and how it impacts other operations
  • Use security groups to limit traffic between EC2 instances to only that which is encrypted


Module 4: Monitoring and Alerting


  • Logging network traffic
  • Logging user and Application Programming Interface (API) traffic
  • Visibility with Amazon CloudWatch
  • Enhancing monitoring and alerting
  • Verifying your AWS environment


Lab 3: Security Monitoring


  • Configure an Amazon Linux 2 instance to send log files to Amazon CloudWatch
  • Create Amazon CloudWatch alarms and notifications to monitor for failed login attempts
  • Create Amazon CloudWatch alarms to monitor network traffic through a Network Address Translation (NAT) gateway
Dauer/zeitlicher Ablauf:
1 day
Ziele/Bildungsabschluss:
  • Designing and implementing a secure network infrastructure
  • Designing and implementing compute security
  • Designing and implementing a logging solution
Zielgruppe:

This course is intended for the following job roles:

  • Solution Architect
  • Cyber Security
  • CloudOps
  • DevOps 

We recommend that attendees of this course have knowlege on
AWS Well-Architected Best Practices.

Seminarkennung:
33890
Nach unten
Nach oben
Wir setzen Analyse-Cookies ein, um Ihre Zufriedenheit bei der Nutzung unserer Webseite zu verbessern. Diese Cookies werden nicht automatisiert gesetzt. Wenn Sie mit dem Einsatz dieser Cookies einverstanden sind, klicken Sie bitte auf Akzeptieren. Weitere Informationen finden Sie hier.
Akzeptieren Nicht akzeptieren









Um Spam abzuwehren, geben Sie bitte die Buchstaben auf dem Bild in das Textfeld ein:

captcha



Bei der Verarbeitung Ihrer personenbezogenen Daten im Zusammenhang mit der Kontaktfunktion beachten wir die gesetzlichen Bestimmungen. Unsere ausführlichen Datenschutzinformationen finden Sie hier. Bei der Kontakt-Funktion erhobene Daten werden nur an den jeweiligen Anbieter weitergeleitet und sind nötig, damit der Anbieter auf Ihr Anliegen reagieren kann.







Um Spam abzuwehren, geben Sie bitte die Buchstaben auf dem Bild in das Textfeld ein:

captcha