pds-it
['Product detail page','no']
Amazon Web Services / AWS Cyber Security
The illustrations were created in cooperation between humans and artificial intelligence. They show a future in which technology is omnipresent, but people remain at the center.
AI-generated illustration

AWS Security Best Practices

Online
1 day
German
Download PDF
€ 790,-
plus VAT.
€ 940,10
incl. VAT.
Booking number
33826
Venue
Online
2 dates
€ 790,-
plus VAT.
€ 940,10
incl. VAT.
Booking number
33826
Venue
Online
2 dates
Become a certified
Machine Learning Engineer
This course is part of the certified Master Class "Machine Learning Engineer". If you book the entire Master Class, you save over 15 percent compared to booking this individual module.
To the Master Class
In-house training
In-house training for your Employees only - exclusive and effective.
Inquiries
In cooperation with
Are you planning to build and operate secure infrastructures in the AWS cloud? The "AWS Security Best Practices" course will help you to design and implement solutions with which you can secure your AWS workloads in a targeted manner.
Contents

This course provides you with a comprehensive overview of industry-standard techniques for using AWS security and control types. You will learn to understand your responsibilities and how to secure your AWS workloads from outside intrusion.


Learn how to secure your network infrastructure with solid design options and how to harden and securely manage your compute resources. Through in-depth knowledge of AWS monitoring and associated alerts, you will recognize suspicious events and learn strategies to adequately respond to incidents.

Module 1: Overview of AWS Security

  • Shared responsibility model
  • Customer challenges
  • Frameworks and standards
  • Establishment of best practices
  • Compliance with the regulations in AWS

Module 2: Securing the network

  • Flexible and secure
  • Security within the Amazon Virtual Private Cloud (Amazon VPC)
  • Security services
  • Security solutions from third-party providers

Module 3: Control of the network (exercise)

  • Creating a network infrastructure with three security zones
  • Implement network segmentation using security groups, Network Access Control Lists (NACLs) and public and private subnets
  • Monitor network traffic to Amazon Elastic Compute Cloud (EC2) instances with the help of VPC flow logs

Module 4: Amazon EC2 security

  • Hardening of computing power
  • Amazon Elastic Block Store (EBS) encryption
  • Secure management and maintenance
  • Recognizing weak points
  • Use AWS Marketplace

Module 5: Securing the starting point with EC2 (exercise) 

  • Create a custom Amazon Machine Image (AMI)
  • Deploy a new EC2 instance from a custom AMI
  • Patching an EC2 instance with AWS Systems Manager
  • Encrypting an EBS volume
  • Understand how EBS encryption works and how it affects other processes
  • Use security groups to restrict traffic between EC2 instances to encrypted traffic only

Module 6: Monitoring and alerting

  • Logging of network traffic
  • Logging of user and API (Application Programming Interface) data traffic
  • Visibility with Amazon CloudWatch
  • Improve monitoring and alerting
  • Check your AWS environment

Module 7: Safety monitoring (exercise)

  • Configuring an Amazon Linux 2 instance to send log files to Amazon CloudWatch
  • Create Amazon CloudWatch alerts and notifications to monitor failed login attempts
  • Create Amazon CloudWatch alerts to monitor network traffic through a Network Address Translation (NAT) gateway

It is recommended that participants have attended the following course (or have equivalent knowledge):

  • AWS Well-Architected Best Practices
Your benefit
  • Design and implementation of a secure network infrastructure
  • Design and implementation of computing security
  • Design and implementation of a logging solution
trainer
Wafi Dahman
Henrique Alves
Methods

This course consists of a full-day session led by a trainer who supervises the participants live. The course consists of theoretical parts with live demonstrations and practical lab exercises. Zoom is used as an online conferencing tool. 

Final examination
Recommended for

This course is aimed at the following job roles:

  • Solution Architect
  • Cyber Security
  • CloudOps
  • DevOps
Start dates and details

Form of learning

Learning form

29.8.2025
Online
Places free
Implementation secured
Online
Places free
Implementation secured
31.10.2025
Online
Places free
Implementation secured
Online
Places free
Implementation secured

The training is carried out in cooperation with an authorized training partner. Participants' data will be transmitted to this partner for the purpose of conducting the training and processed there under its own responsibility. Please take note of the corresponding privacy policy.

Do you have questions about training?
Call us on +49 761 595 33900 or write to us at service@haufe-akademie.de or use the contact form.