AWS Certified Security – Specialty

AWS Certified Security – Specialty
AWS Certified Security – Specialty
English | MP4 | AVC 1280×720 | AAC 44KHz 2ch | 6h 34m | 2.50 GB

The AWS Certified Security – Specialty is intended for individuals who perform a security role with at least two years of hands-on experience securing AWS workloads.

Introduction

Module 1: AWS Certified Security–Specialty Basics

Lesson 1: AWS Certified Security–Specialty Basics
Learning objectives
1.1 Introduction to Security
1.2 Exam Details
1.3 Course Scope Details
1.4 Certification Candidate Skills

Module 2: Incident Response

Lesson 2: Incident Response
Learning objectives
2.1 Abuse Notice Strategies
2.2 Incident Response Basics
2.3 IR Preparation
2.4 IR Detection & Analysis
2.5 IR Containment Eradication & Recovery
2.6 IR Post-Incident Activity
2.7 Case Study: Compromised EC2
2.8 Question Breakdown

Module 3: Logging and Monitoring

Lesson 3: Security Monitoring
Learning objectives
3.1 Infrastructure Security Monitoring
3.2 Application Security Monitoring
3.3 Account Security Monitoring
3.4 Troubleshooting Security Monitoring
3.5 Case Study: Broken Monitoring
3.6 Question Breakdown

Lesson 4: Logging Solutions
Learning objectives
4.1 Access Logs
4.2 Execution Logs
4.3 Security Logs
4.4 Log Processing
4.5 Case Study: Automated Log Management
4.6 Question Breakdown

Module 4: Infrastructure Security

Lesson 5: Infrastructure Security Part 1
Learning objectives
5.1 Edge Security
5.2 VPC Network Security
5.3 VPC Egress Security
5.4 Multiple VPC Strategies
5.5 Case Study: Multi-scope Infrastructure Design
5.6 Question Breakdown

Lesson 6: Infrastructure Security Part 2
Learning objectives
6.1 Network Troubleshooting
6.2 Host-Based Security
6.3 Case Study: The Golden AMI Pipeline
6.4 Question Breakdown

Module 5: Identity and Access Management

Lesson 7: Permissions and Roles
Learning objectives
7.1 AWS Credentials
7.2 IAM Policy Details
7.3 Policy Evaluation Logic
7.4 Assuming IAM Roles
7.5 Case Study: IAM Policy Examples
7.6 Question Breakdown

Lesson 8: Federation and Resource-based Access Control
Learning objectives
8.1 SAML Federation
8.2 Cognito User Pool Federation
8.3 Cognito Identity Pool Federation
8.4 AWS SSO Federation
8.5 AWS Organizations
8.6 S3 Access Control
8.7 API Gateway and Lambda Access Control
8.8 Troubleshooting Permissions
8.9 Case Study: Broken Permission Examples
8.10 Question Breakdown

Module 6: Data Protection

Lesson 9: Key Management
Learning objectives
9.1 Symmetric Data Encryption
9.2 AWS KMS Basics
9.3 AWS KMS Access Control
9.4 AWS CloudHSM
9.5 AWS Certificate Manager
9.6 Using Keys for Authentication
9.7 Troubleshooting Key Management
9.8 Case Study: CloudWatch Logs Encryption
9.9 Question Breakdown

Lesson 10: Data Encryption At-rest and In Transit
Learning objectives
10.1 Data Encryption At-rest by Default
10.2 Data Encryption At-rest as Option
10.3 Data Encryption At-rest Operations
10.4 Data Encryption In Transit—Web
10.5 Data Encryption In Transit—Storage
10.6 Data Encryption In Transit—Network
10.7 Case Study: End-to-End Encryption
10.8 Question Breakdown

Module 7: Next Steps

Lesson 11: Next Steps
Learning objectives
11.1 Study Strategies
11.2 Study Resources

Summary

Table of Contents

01 AWS Certified Security тАУ Specialty – Introduction
02 Learning objectives
03 1.1 Introduction to Security
04 1.2 Exam Details
05 1.3 Course Scope Details
06 1.4 Certification Candidate Skills
07 Learning objectives
08 2.1 Abuse Notice Strategies
09 2.2 Incident Response Basics
10 2.3 IR Preparation
11 2.4 IR Detection & Analysis
12 2.5 IR Containment Eradication & Recovery
13 2.6 IR Post-Incident Activity
14 2.7 Case Study – Compromised EC2
15 2.8 Question Breakdown
16 Learning objectives
17 3.1 Infrastructure Security Monitoring
18 3.2 Application Security Monitoring
19 3.3 Account Security Monitoring
20 3.4 Troubleshooting Security Monitoring
21 3.5 Case Study – Broken Monitoring
22 3.6 Question Breakdown
23 Learning objectives
24 4.1 Access Logs
25 4.2 Execution Logs
26 4.3 Security Logs
27 4.4 Log Processing
28 4.5 Case Study – Automated Log Management
29 4.6 Question Breakdown
30 Learning objectives
31 5.1 Edge Security
32 5.2 VPC Network Security
33 5.3 VPC Egress Security
34 5.4 Multiple VPC Strategies
35 5.5 Case Study – Multi-scope Infrastructure Design
36 5.6 Question Breakdown
37 Learning objectives
38 6.1 Network Troubleshooting
39 6.2 Host-Based Security
40 6.3 Case Study – The Golden AMI Pipeline
41 6.4 Question Breakdown
42 Learning objectives
43 7.1 AWS Credentials
44 7.2 IAM Policy Details
45 7.3 Policy Evaluation Logic
46 7.4 Assuming IAM Roles
47 7.5 Case Study – IAM Policy Examples
48 7.6 Question Breakdown
49 Learning objectives
50 8.1 SAML Federation
51 8.2 Cognito User Pool Federation
52 8.3 Cognito Identity Pool Federation
53 8.4 AWS SSO Federation
54 8.5 AWS Organizations
55 8.6 S3 Access Control
56 8.7 API Gateway and Lambda Access Control
57 8.8 Troubleshooting Permissions
58 8.9 Case Study – Broken Permission Examples
59 8.10 Question Breakdown
60 Learning objectives
61 9.1 Symmetric Data Encryption
62 9.2 AWS KMS Basics
63 9.3 AWS KMS Access Control
64 9.4 AWS CloudHSM
65 9.5 AWS Certificate Manager
66 9.6 Using Keys for Authentication
67 9.7 Troubleshooting Key Management
68 9.8 Case Study – CloudWatch Logs Encryption
69 9.9 Question Breakdown
70 Learning objectives
71 10.1 Data Encryption At-rest by Default
72 10.2 Data Encryption At-rest as Option
73 10.3 Data Encryption At-rest Operations
74 10.4 Data Encryption In TransitтАФWeb
75 10.5 Data Encryption In TransitтАФStorage
76 10.6 Data Encryption In TransitтАФNetwork
77 10.7 Case Study – End-to-End Encryption
78 10.8 Question Breakdown
79 Learning objectives
80 11.1 Study Strategies
81 11.2 Study Resources
82 AWS Certified Security тАУ Specialty – Summary