AWS Certified Security - Specialty: AWS Certified Security - Specialty (SCS-C01)
Your Amazon AWS Certified Security - Specialty exam is just around the corner, right? So, it's high time to find an effective preparation tool! Our training course is what you really need! This is a series of videos led by the experienced IT instructors who will provide you with a detailed overview of the AWS Certified Security - Specialty certification test. Ace your Amazon AWS Certified Security - Specialty at the first attempt and obtain the AWS Certified Security - Specialty (SCS-C01) credential with ease.
Curriculum for AWS Certified Security - Specialty Video Course
Getting started with the course
Video Name | Time | |
---|---|---|
1. Understanding AWS Security Specialty exams | 04:32 |
Video Name | Time | |
---|---|---|
1. Introduction to Domain 1 | 03:18 | |
2. Case Study of Hacked Server | 07:24 | |
3. Dealing with AWS Abuse Notice | 07:28 | |
4. AWS GuardDuty | 08:20 | |
5. Whitelisting Alerts in AWS GuardDuty | 04:33 | |
6. Understanding Incident Response Terminology | 12:19 | |
7. Incident Response Use-Cases for Exams | 02:38 | |
8. Use Case - Dealing with Exposed Access Keys | 15:59 | |
9. Use Case - Dealing with compromised EC2 Instances | 05:01 | |
10. Incident Response in Cloud | 11:18 | |
11. Penetration Testing in AWS (New) | 06:27 |
Video Name | Time | |
---|---|---|
1. Introduction to Vulnerability, Exploit, Payload | 05:17 | |
2. VEP Practical - Hacking inside a test farm | 08:02 | |
3. Understanding Automated Vulnerability Scanners | 08:23 | |
4. Common Vulnerabilities Exposures & CVSS | 08:38 | |
5. Introduction to AWS Inspector | 06:05 | |
6. Configuring AWS Inspector | 06:42 | |
7. AWS Inspector & Nessus - CVE scans | 09:04 | |
8. Best Practices in Vulnerability Assessments | 07:53 | |
9. Overview of Layer 7 Firewalls | 06:20 | |
10. Understanding AWS WAF | 12:47 | |
11. Implementing AWS WAF with ALB | 06:06 | |
12. Understanding EC2 Run Command | 04:22 | |
13. Deploying our first RunCommand | 10:38 | |
14. Patch Compliance with SSM | 03:38 | |
15. EC2 Systems Manager - Parameter Store | 08:00 | |
16. Understanding CloudWatch Logs | 04:15 | |
17. Pushing Linux system logs to CloudWatch | 07:53 | |
18. CloudWatch Events | 08:54 | |
19. AWS Athena | 11:54 | |
20. Overview of AWS CloudTrail | 09:21 | |
21. Improved Governance - AWS Config 01 | 13:20 | |
22. Improved Governance - AWS Config 02 | 09:17 | |
23. Trusted Advisor | 09:17 | |
24. CloudTrail - Log File Integrity Validation | 08:40 | |
25. Digest Delivery Times | 02:18 | |
26. Overview of AWS Macie (New) | 08:39 | |
27. Creating our First Alert with AWS Macie (New) | 07:52 | |
28. S3 Event Notification | 07:15 | |
29. VPC Flow Logs | 13:41 |
Video Name | Time | |
---|---|---|
1. Implementing Bastion Hosts | 11:01 | |
2. Introduction to Virtual Private Networks | 05:45 | |
3. OpenVPN is Awesome | 05:12 | |
4. OpenVPN - Part 02 | 03:19 | |
5. Overview of AWS VPN Tunnels | 06:15 | |
6. Using AWS VPN for On-Premise to AWS connectivity | 09:26 | |
7. Configuring first IPSec tunnel with OpenSwan - Part 01 | 13:49 | |
8. Configuring first IPSec tunnel with OpenSwan - Part 02 | 04:43 | |
9. Inter-Region VPC Peering | 07:40 | |
10. VPC Endpoints | 12:56 | |
11. Network ACL | 09:17 | |
12. Understanding Stateful vs Stateless Firewalls | 13:39 | |
13. Understanding Networking Sockets | 10:50 | |
14. Revising Security Groups | 04:51 | |
15. Connection of Security Group & NIC Cards | 06:30 | |
16. Egress Rules - The Real Challenge | 12:38 | |
17. IPTABLES & Instance Metadata | 11:57 | |
18. IDS / IPS in AWS | 05:15 | |
19. EBS Architecture & Secure Data Wiping | 13:48 | |
20. Introduction to Reverse Proxies | 07:54 | |
21. Understanding the Content Delivery Networks | 05:31 | |
22. Understanding Edge Locations | 07:47 | |
23. Deploying Cloudfront Distribution - Part 01 | 07:22 | |
24. Understanding the Origin Access Identity | 05:23 | |
25. Understanding importance of SNI in TLS protocol | 09:07 | |
26. CloudFront Signed URL - 01 | 06:53 | |
27. CloudFront Signed URL - 02 | 09:55 | |
28. Real World example on DOS Implementation | 08:20 | |
29. AWS Shield | 04:05 | |
30. Mitigating DDOS Attacks | 09:50 | |
31. Introduction to Application Programming Interface (API) | 15:12 | |
32. Understanding the working of API | 09:32 | |
33. Building Lambda Function for our API | 04:18 | |
34. Building our first API with API Gateway | 05:46 | |
35. API Gateway - Important Pointers for Exams | 04:24 | |
36. Lambda & S3 | 05:42 | |
37. EC2 Key-Pair Troubleshooting | 10:48 | |
38. EC2 Tenancy Attribute | 05:36 | |
39. AWS Artifact | 02:45 | |
40. Lambda@Edge | 10:48 | |
41. AWS Simple Email Service (SES) (New) | 06:15 |
Video Name | Time | |
---|---|---|
1. Understanding AWS Organizations | 06:17 | |
2. AWS Organizations - Practical | 08:34 | |
3. Organizational Unit (OU) in AWS organization | 05:15 | |
4. IAM Policy Evaluation Logic | 11:33 | |
5. Understanding IAM Policies | 15:06 | |
6. IAM Policies - Part 02 | 11:56 | |
7. Delegation - Cross Account Trust - Part 1 | 07:02 | |
8. Delegation - Cross Account Trust - Part 2 | 10:02 | |
9. Revising AWS CLI | 11:54 | |
10. Revising IAM Role | 10:56 | |
11. EC2 Instance Meta-Data | 07:56 | |
12. Understanding working of an IAM role | 07:52 | |
13. IAM - Version Element | 09:56 | |
14. IAM Policy Variables | 04:15 | |
15. Principal and NotPrincipal Element | 07:24 | |
16. Implementing NotPrincipal Element | 03:55 | |
17. Conditionl Element | 07:08 | |
18. AWS Security Token Service | 07:24 | |
19. AWS STS - Migrating the EC2 Role Credentials - Part 2 | 04:21 | |
20. AWS STS - Architecturing IAM user keys the right way - Part 3 | 16:55 | |
21. AWS STS - Automate the temporary credentials - Part 4 | 04:18 | |
22. Understanding Federation - Part 01 | 06:08 | |
23. Understanding Federation - Part 02 | 08:02 | |
24. Understanding SAML for SSO | 14:09 | |
25. Capturing SAML Assertion Packets with Tracer | 07:19 | |
26. Establishing trust between IdP and SP | 20:33 | |
27. Choosing a right IdP | 06:15 | |
28. AWS Cognito | 11:23 | |
29. Introduction to AWS Directory Service | 10:28 | |
30. Understanding Active Directory | 04:13 | |
31. Deploy our first SimpleAD based directory service | 04:16 | |
32. Domain Joining EC2 instance with Directory Service | 09:17 | |
33. Trusts in Active Directory | 07:25 | |
34. IAM & S3 | 10:34 | |
35. S3 Bucket Policies | 07:31 | |
36. Cross Account S3 Bucket Configuration | 10:59 | |
37. Canned ACL's | 09:05 | |
38. Understanding Signed URL's | 13:47 | |
39. S3 - Versioning | 06:02 | |
40. S3 - Cross Region Replication | 07:37 | |
41. IAM Permission Boundaries (New) | 09:38 | |
42. Troubleshooting IAM Policies | 01:47 | |
43. Troubleshooting Answers - Solution 01 | 04:46 | |
44. Troubleshooting Answers - Solution 02 | 05:28 | |
45. Troubleshooting Answers - Solution 03 | 04:24 | |
46. Troubleshooting Answers - Solution 04 | 01:24 | |
47. Troubleshooting Answers - Solution 05 | 03:32 |
Video Name | Time | |
---|---|---|
1. Introduction to Cryptography | 12:15 | |
2. Plain Text vs Encrypted Text Based Algorithms | 07:07 | |
3. CloudHSM | 06:36 | |
4. AWS Key Management Service | 09:14 | |
5. AWS Key Management Service - Part 02 | 08:20 | |
6. AWS Key Management Service - Part 03 | 07:26 | |
7. AWS Key Management Service - Data Key Caching | 09:26 | |
8. AWS Key Management Service - Scheduled CMK Deletion | 04:00 | |
9. AWS Key Management Service - CMK Deletion & EBS Use-Case | 04:51 | |
10. Reducing Risk of Unmanageable CMK | 03:21 | |
11. KMS - Authentication and Access Control | 05:35 | |
12. KMS Policy Evaluation Logic - Use Case Solution - 01 | 03:01 | |
13. KMS Policy Evaluation Logic - Use Case Solution - 01 | 04:25 | |
14. KMS Policy Evaluation Logic - Use Case 02 | 01:56 | |
15. KMS Policy Evaluation Logic - Use Case Solution - 02 | 03:08 | |
16. KMS Policy Evaluation Logic - Use Case - 03 | 00:44 | |
17. KMS Policy Evaluation Logic - Use Case Solution - 03 (New) | 01:41 | |
18. KMS Grants | 12:08 | |
19. Importing Key Material to KMS | 07:45 | |
20. KMS ViaService | 08:20 | |
21. Migrating Encrypted KMS Data Across Regions | 07:32 | |
22. S3 Encryption | 11:55 | |
23. Revising ELB Listener Configuration | 08:42 | |
24. ELB Listeners - Understanding HTTP vs TCP Listeners | 08:59 | |
25. Understanding AWS Certificate Manager | 05:23 | |
26. Deploying SSL/TLS certificate with ACM | 03:08 | |
27. Configuring ELB with HTTPS for SSL Offloading | 04:54 | |
28. Glacier Vault and Vault Lock | 07:40 | |
29. DynamoDB Encryption | 02:57 | |
30. Overview of AWS Secrets Manager | 05:59 | |
31. RDS Integration with AWS Secrets Manager | 10:07 |
Video Name | Time | |
---|---|---|
1. Important Pointers - Domain 1 | 05:49 | |
2. Important Pointers - Domain 2 | 08:16 | |
3. Important Pointers - Domain 3 | 09:21 | |
4. Important Pointers - Domain 4 | 05:45 | |
5. Important Pointers - Domain 5 | 08:50 |
Student Feedback
Similar Courses
Only Registered Members can View Training Courses
Please fill out your email address below in order to view Training Courses. Registration is Free and Easy, You Simply need to provide an email address.
Try Free Demo
Try Free Demo
Get 10% Discount on Your Purchase When You Sign Up for Email
Enter Your Email Address to Receive Your 10%
OFF Discount Code Plus... Our Exclusive Weekly Deals