<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE FL_Course SYSTEM "https://www.flane.de/dtd/fl_course095.dtd"><?xml-stylesheet type="text/xsl" href="https://portal.flane.ch/css/xml-course.xsl"?><course productid="29830" language="en" source="https://portal.flane.ch/swisscom/en/xml-course/amazon-sbp" lastchanged="2026-03-11T14:54:31+01:00" parent="https://portal.flane.ch/swisscom/en/xml-courses"><title>AWS Security Best Practices</title><productcode>SBP</productcode><vendorcode>AW</vendorcode><vendorname>Amazon Web Services</vendorname><fullproductcode>AW-SBP</fullproductcode><version>1.0.1</version><objective>&lt;p&gt;In this course, you will learn to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Design and implement a secure network infrastructure&lt;/li&gt;&lt;li&gt;Design and implement compute security&lt;/li&gt;&lt;li&gt;Design and implement a logging solution&lt;/li&gt;&lt;/ul&gt;</objective><essentials>&lt;p&gt;Before attending this course, participants should have completed the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;AWS Security Fundamentals&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;cms-link-marked&quot;&gt;&lt;a class=&quot;fl-href-prod&quot; href=&quot;/swisscom/en/course/amazon-sec-ess&quot;&gt;&lt;svg role=&quot;img&quot; aria-hidden=&quot;true&quot; focusable=&quot;false&quot; data-nosnippet class=&quot;cms-linkmark&quot;&gt;&lt;use xlink:href=&quot;/css/img/icnset-linkmarks.svg#linkmark&quot;&gt;&lt;/use&gt;&lt;/svg&gt;AWS Security Essentials &lt;span class=&quot;fl-prod-pcode&quot;&gt;(SEC-ESS)&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;</essentials><audience>&lt;p&gt;This course is intended for:
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Solutions architects, cloud engineers, including security engineers, delivery and implementation engineers, professional services, and Cloud Center of Excellence (CCOE)&lt;/li&gt;&lt;/ul&gt;</audience><contents>&lt;h5&gt;Module 1: AWS Security Overview&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Shared responsibility model&lt;/li&gt;&lt;li&gt;Customer challenges&lt;/li&gt;&lt;li&gt;Frameworks and standards&lt;/li&gt;&lt;li&gt;Establishing best practices&lt;/li&gt;&lt;li&gt;Compliance in AWS&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Module 2: Securing the Network&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Flexible and secure&lt;/li&gt;&lt;li&gt;Security inside the Amazon Virtual Private Cloud (Amazon VPC)&lt;/li&gt;&lt;li&gt;Security services&lt;/li&gt;&lt;li&gt;Third-party security solutions&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Lab 1: Controlling the Network&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Create a three-security zone network infrastructure.&lt;/li&gt;&lt;li&gt;Implement network segmentation using security groups, Network Access Control Lists (NACLs), and public and private subnets.&lt;/li&gt;&lt;li&gt;Monitor network traffic to Amazon Elastic Compute Cloud (EC2) instances using VPC flow logs.&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Module 3: Amazon EC2 Security&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Compute hardening&lt;/li&gt;&lt;li&gt;Amazon Elastic Block Store (EBS) encryption&lt;/li&gt;&lt;li&gt;Secure management and maintenance&lt;/li&gt;&lt;li&gt;Detecting vulnerabilities&lt;/li&gt;&lt;li&gt;Using AWS Marketplace&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Lab 2: Securing the starting point (EC2)&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Create a custom Amazon Machine Image (AMI).&lt;/li&gt;&lt;li&gt;Deploy a new EC2 instance from a custom AMI.&lt;/li&gt;&lt;li&gt;Patch an EC2 instance using AWS Systems Manager.&lt;/li&gt;&lt;li&gt;Encrypt an EBS volume.&lt;/li&gt;&lt;li&gt;Understand how EBS encryption works and how it impacts other operations.&lt;/li&gt;&lt;li&gt;Use security groups to limit traffic between EC2 instances to only that which is encrypted.&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Module 4: Monitoring and Alerting&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Logging network traffic&lt;/li&gt;&lt;li&gt;Logging user and Application Programming Interface (API) traffic&lt;/li&gt;&lt;li&gt;Visibility with Amazon CloudWatch&lt;/li&gt;&lt;li&gt;Enhancing monitoring and alerting&lt;/li&gt;&lt;li&gt;Verifying your AWS environment&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Lab 3: Security Monitoring&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Configure an Amazon Linux 2 instance to send log files to Amazon CloudWatch.&lt;/li&gt;&lt;li&gt;Create Amazon CloudWatch alarms and notifications to monitor for failed login attempts.&lt;/li&gt;&lt;li&gt;Create Amazon CloudWatch alarms to monitor network traffic through a Network Address Translation (NAT) gateway.&lt;/li&gt;&lt;/ul&gt;</contents><objective_plain>In this course, you will learn to:


- Design and implement a secure network infrastructure
- Design and implement compute security
- Design and implement a logging solution</objective_plain><essentials_plain>Before attending this course, participants should have completed the following:


- AWS Security Fundamentals
- AWS Security Essentials (SEC-ESS)</essentials_plain><audience_plain>This course is intended for:



- Solutions architects, cloud engineers, including security engineers, delivery and implementation engineers, professional services, and Cloud Center of Excellence (CCOE)</audience_plain><contents_plain>Module 1: AWS Security Overview


- Shared responsibility model
- Customer challenges
- Frameworks and standards
- Establishing best practices
- Compliance in AWS
Module 2: Securing the Network


- Flexible and secure
- Security inside the Amazon Virtual Private Cloud (Amazon VPC)
- Security services
- Third-party security solutions
Lab 1: Controlling the Network


- Create a three-security zone network infrastructure.
- Implement network segmentation using security groups, Network Access Control Lists (NACLs), and public and private subnets.
- Monitor network traffic to Amazon Elastic Compute Cloud (EC2) instances using VPC flow logs.
Module 3: Amazon EC2 Security


- Compute hardening
- Amazon Elastic Block Store (EBS) encryption
- Secure management and maintenance
- Detecting vulnerabilities
- Using AWS Marketplace
Lab 2: Securing the starting point (EC2)


- Create a custom Amazon Machine Image (AMI).
- Deploy a new EC2 instance from a custom AMI.
- Patch an EC2 instance using AWS Systems Manager.
- Encrypt an EBS volume.
- Understand how EBS encryption works and how it impacts other operations.
- Use security groups to limit traffic between EC2 instances to only that which is encrypted.
Module 4: Monitoring and Alerting


- Logging network traffic
- Logging user and Application Programming Interface (API) traffic
- Visibility with Amazon CloudWatch
- Enhancing monitoring and alerting
- Verifying your AWS environment
Lab 3: Security Monitoring


- Configure an Amazon Linux 2 instance to send log files to Amazon CloudWatch.
- Create Amazon CloudWatch alarms and notifications to monitor for failed login attempts.
- Create Amazon CloudWatch alarms to monitor network traffic through a Network Address Translation (NAT) gateway.</contents_plain><duration unit="d" days="1">1 day</duration><pricelist><price country="SI" currency="EUR">795.00</price><price country="AT" currency="EUR">795.00</price><price country="SE" currency="EUR">795.00</price><price country="IL" currency="ILS">2760.00</price><price country="AE" currency="USD">600.00</price><price country="GR" currency="EUR">795.00</price><price country="MK" currency="EUR">795.00</price><price country="HU" currency="EUR">795.00</price><price country="BE" currency="EUR">795.00</price><price country="CH" currency="CHF">870.00</price><price country="FR" currency="EUR">850.00</price></pricelist><miles/></course>