Formazione Cisco

Insoft Services è uno dei pochi fornitori di formazione in EMEAR a offrire una gamma completa di certificazione Cisco e formazione tecnologica specializzata.

Dettagli

Certificazioni Cisco

Sperimenta un approccio di apprendimento misto che combina il meglio della formazione con istruttore e dell'e-learning autogestito per aiutarti a prepararti per l'esame di certificazione.

Dettagli

Cisco Learning Credits

I Cisco Learning Credits (CLC) sono voucher di formazione prepagati riscattati direttamente con Cisco che semplificano la pianificazione del successo durante l'acquisto di prodotti e servizi Cisco.

Dettagli

Formazione Continua

The Cisco Continuing Education Program offers all active certification holders flexible options to recertify by completing a variety of eligible training items.

Dettagli

Cisco Digital Learning

Certified employees are VALUED assets. Explore Cisco official Digital Learning Library to educate yourself through recorded sessions.

Dettagli

Cisco Business Enablement

The Cisco Business Enablement Partner Program focuses on sharpening the business skills of Cisco Channel Partners and customers.

Dettagli

Catalogo Cisco

Dettagli

Certificazioni Fortinet

Il programma Fortinet Network Security Expert (NSE) è un programma di formazione e certificazione di otto livelli per insegnare agli ingegneri la sicurezza della loro rete per le competenze e l'esperienza di Fortinet FW.

Dettagli

Corsi di formazione tecnica

Insoft è riconosciuto come Fortinet Authorized Training Center in sedi selezionate in tutta l'EMEA.

Corsi tecnici

Catalogo Fortinet

Esplora un'ampia varietà di programmi Fortinet in diversi paesi e corsi online.

Dettagli

Stato ATC

Controlla il nostro stato ATC in tutti i paesi selezionati in Europa.

Dettagli

Fortinet Servizi Professionale

Il team riconosciuto a livello globale di esperti certificati ti aiuta a fare una transizione più fluida con i nostri pacchetti di consulenza, installazione e migrazione predefiniti per una vasta gamma di prodotti Fortinet.

Dettagli

Catalogo Microsoft

Insoft Services fornisce formazione Microsoft in EMEAR. Offriamo corsi di formazione tecnica e certificazione Microsoft guidati da istruttori di livello mondiale.

Corsi tecnici

Corsi di formazione

Impara conoscenze e abilità eccezionali di Extreme Networks.Find all the Extreme Networks online and instructor led class room based calendar here.

Corsi tecnici

Certificazioni Extreme

Forniamo un curriculum completo di competenze tecniche sul conseguimento della certificazione.

Dettagli

Catalogo Extreme

Dettagli

Accreditamento ATP

In qualità di partner di formazione autorizzato (ATP), Insoft Services garantisce che tu riceva i più alti standard di istruzione disponibili.

Dettagli

Pacchetti di consulenza

Forniamo un supporto innovativo e avanzato per la progettazione, l'implementazione e l'ottimizzazione delle soluzioni IT.La nostra base di clienti comprende alcune delle più grandi telco a livello globale.

Soluzioni & Servizi

Il team riconosciuto a livello globale di esperti certificati ti aiuta a fare una transizione più fluida con i nostri pacchetti di consulenza, installazione e migrazione predefiniti per una vasta gamma di prodotti Fortinet.

Chi siamo

Insoft fornisce servizi di formazione e consulenza autorizzati per fornitori IP selezionati.Scopri come stiamo rivoluzionando il settore.

Dettagli
  • +39 02 8704 5199
  • AWS Security Best Practices

    Duration
    1 Giorno
    Delivery
    (Online e in loco)
    Price
    Prezzo su richiesta

    Currently, the average cost of a security breach can be upwards of $4 million. AWS Security Best Practices provides an overview of some of the industry best practices for using AWS security and control types. This course helps you understand your responsibilities while providing valuable guidelines for how to keep your workload safe and secure. You will learn how to secure your network infrastructure using sound design options. You will also learn how you can harden your compute resources and manage them securely. Finally, by understanding AWS monitoring and alerting, you can detect and alert on suspicious events to help you quickly begin the response process in the event of a potential compromise.

     

    • Course level: Intermediate

    In this course, you will learn to:

    • Design and implement a secure network infrastructure
    • Design and implement compute security
    • Design and implement a logging solution

    Module 1: AWS Security Overview

    • Shared responsibility model
    • Customer challenges
    • Frameworks and standards
    • Establishing best practices
    • Compliance in AWS

    Module 2: Securing the Network

    • Flexible and secure
    • Security inside the Amazon Virtual Private Cloud (Amazon VPC)
    • Security services
    • Third-party security solutions

    Lab 1: Controlling the Network

    • Create a three-security zone network infrastructure.
    • Implement network segmentation using security groups, Network Access Control Lists (NACLs), and public and private subnets.
    • Monitor network traffic to Amazon Elastic Compute Cloud (EC2) instances using VPC flow logs.

    Module 3: Amazon EC2 Security

    • Compute hardening
    • Amazon Elastic Block Store (EBS) encryption
    • Secure management and maintenance
    • Detecting vulnerabilities
    • Using AWS Marketplace

    Lab 2: Securing the starting point (EC2)

    • Create a custom Amazon Machine Image (AMI).
    • Deploy a new EC2 instance from a custom AMI.
    • Patch an EC2 instance using AWS Systems Manager.
    • Encrypt an EBS volume.
    • Understand how EBS encryption works and how it impacts other operations.
    • Use security groups to limit traffic between EC2 instances to only that which is encrypted.

    Module 4: Monitoring and Alerting

    • Logging network traffic
    • Logging user and Application Programming Interface (API) traffic
    • Visibility with Amazon CloudWatch
    • Enhancing monitoring and alerting
    • Verifying your AWS environment

    Lab 3: Security Monitoring

    • Configure an Amazon Linux 2 instance to send log files to Amazon CloudWatch.
    • Create Amazon CloudWatch alarms and notifications to monitor for failed login attempts.
    • Create Amazon CloudWatch alarms to monitor network traffic through a Network Address Translation (NAT) gateway.

    This course is intended for:

    • Solutions architects, cloud engineers, including security engineers, delivery and implementation engineers, professional services, and Cloud Center of Excellence (CCOE)

    Before attending this course, participants should have completed the following:

    • AWS Security Fundamentals
    • AWS Security Essentials

    Currently, the average cost of a security breach can be upwards of $4 million. AWS Security Best Practices provides an overview of some of the industry best practices for using AWS security and control types. This course helps you understand your responsibilities while providing valuable guidelines for how to keep your workload safe and secure. You will learn how to secure your network infrastructure using sound design options. You will also learn how you can harden your compute resources and manage them securely. Finally, by understanding AWS monitoring and alerting, you can detect and alert on suspicious events to help you quickly begin the response process in the event of a potential compromise.

     

    • Course level: Intermediate

    In this course, you will learn to:

    • Design and implement a secure network infrastructure
    • Design and implement compute security
    • Design and implement a logging solution

    Module 1: AWS Security Overview

    • Shared responsibility model
    • Customer challenges
    • Frameworks and standards
    • Establishing best practices
    • Compliance in AWS

    Module 2: Securing the Network

    • Flexible and secure
    • Security inside the Amazon Virtual Private Cloud (Amazon VPC)
    • Security services
    • Third-party security solutions

    Lab 1: Controlling the Network

    • Create a three-security zone network infrastructure.
    • Implement network segmentation using security groups, Network Access Control Lists (NACLs), and public and private subnets.
    • Monitor network traffic to Amazon Elastic Compute Cloud (EC2) instances using VPC flow logs.

    Module 3: Amazon EC2 Security

    • Compute hardening
    • Amazon Elastic Block Store (EBS) encryption
    • Secure management and maintenance
    • Detecting vulnerabilities
    • Using AWS Marketplace

    Lab 2: Securing the starting point (EC2)

    • Create a custom Amazon Machine Image (AMI).
    • Deploy a new EC2 instance from a custom AMI.
    • Patch an EC2 instance using AWS Systems Manager.
    • Encrypt an EBS volume.
    • Understand how EBS encryption works and how it impacts other operations.
    • Use security groups to limit traffic between EC2 instances to only that which is encrypted.

    Module 4: Monitoring and Alerting

    • Logging network traffic
    • Logging user and Application Programming Interface (API) traffic
    • Visibility with Amazon CloudWatch
    • Enhancing monitoring and alerting
    • Verifying your AWS environment

    Lab 3: Security Monitoring

    • Configure an Amazon Linux 2 instance to send log files to Amazon CloudWatch.
    • Create Amazon CloudWatch alarms and notifications to monitor for failed login attempts.
    • Create Amazon CloudWatch alarms to monitor network traffic through a Network Address Translation (NAT) gateway.

    This course is intended for:

    • Solutions architects, cloud engineers, including security engineers, delivery and implementation engineers, professional services, and Cloud Center of Excellence (CCOE)

    Before attending this course, participants should have completed the following:

    • AWS Security Fundamentals
    • AWS Security Essentials
      Programma
      Data su richiesta

    Follow Up Courses

    Filtra
    • 2 Giorni
      Data su richiesta
      Price on Request
      Book Now
    • 1 Giorno
      Data su richiesta
      Price on Request
      Book Now
    • 3 Giorni
      Data su richiesta
      Price on Request
      Book Now
    • 1 Giorno
      Data su richiesta
      Price on Request
      Book Now
    • 1 Giorno
      Data su richiesta
      Price on Request
      Book Now
    • 1 Giorno
      Data su richiesta
      Price on Request
      Book Now
    • 1 Giorno
      Data su richiesta
      Price on Request
      Book Now
    • 2 Giorni
      Data su richiesta
      Price on Request
      Book Now
    • 3 Giorni
      Data su richiesta
      Price on Request
      Book Now
    • 3 Giorni
      Data su richiesta
      Price on Request
      Book Now

    Know someone who´d be interested in this course?
    Let them know...

    Use the hashtag #InsoftLearning to talk about this course and find students like you on social media.