top of page

Related Courses

AWS Certified Security – Specialty (SCS-C01) Pack of 2 Courses & PDF Guides Down

AWS Certified Security – Specialty (SCS-C01) Pack of 2 Courses & PDF Guides Download

 

Number of Courses : 02

 

Duration : 24 Hours + 6 Hours

 

Size: 8.37 GB

 

1 - Manage Access to AWS Resources

 

2 - Plan for Advanced Auth Patterns at AWS

 

3 - Work with IAM Security Policies

 

4 - Plan for AWS Account Management

 

5 - Plan for Governance Monitoring at AWS

 

6 - Configuration and Audit Management

 

7 - Plan for Deployment Management

 

8 - Implement an AWS Service Catalog

 

9 - Automate Cost Management

 

10 - Work with Cost and Usage Reports

 

11 - Plan for Data Storage Security at AWS

 

12 - Plan For Data-In-Transit Security at AWS

 

13 - Plan for Data Encryption at AWS

 

14 - Plan for EC2 Storage Security

 

15 - Create Encrypted Root Volume AMI

 

16 - Create EC2 Encrypted Filesystem

 

17 - Plan for S3 Confidentiality Data Security

 

18 - Plan for S3 Integrity and Availability Data Security

 

19 - Deploy AWS Storage Gateway NFS Share

 

20 - Secure EC2 Workloads

 

21 - Manage Systems with AWS Systems Manager

 

22 - Plan for Protective Controls at AWS

 

23 - Plan for VPC Network Traffic

 

24 - Network for a Public Web Server

 

25 - Network for Management and Private Traffic

 

26 - Plan for Transit Gateway Connectivity at AWS

 

27 - Plan for Cross-VPC Network Traffic at AWS

 

28 - Deploy Juniper vSRX Firewall on AWS

 

29 - Plan for Denial-Of-Service (DoS) Security

 

30 - Filter Traffic with AWS Web Application Firewall

 

31 - Plan for Monitoring at AWS

 

32 - Monitor with AWS CloudWatch

 

33 - Security Scanning with Amazon Inspector

 

34 - Plan for Logging at AWS

 

35 - Apply the AWS Well-Architected Framework

 

 

Course : 02

 

 

 

01 AWS Certified Security – Specialty - Introduction

02 Learning objectives

03 1.1 Introduction to Security

04 1.2 Exam Details

05 1.3 Course Scope Details

06 1.4 Certification Candidate Skills

07 Learning objectives

08 2.1 Abuse Notice Strategies

09 2.2 Incident Response Basics

10 2.3 IR Preparation

11 2.4 IR Detection & Analysis

12 2.5 IR Containment Eradication & Recovery

13 2.6 IR Post-Incident Activity

14 2.7 Case Study - Compromised EC2

15 2.8 Question Breakdown

16 Learning objectives

17 3.1 Infrastructure Security Monitoring

18 3.2 Application Security Monitoring

19 3.3 Account Security Monitoring

20 3.4 Troubleshooting Security Monitoring

21 3.5 Case Study - Broken Monitoring

22 3.6 Question Breakdown

23 Learning objectives

24 4.1 Access Logs

25 4.2 Execution Logs

26 4.3 Security Logs

27 4.4 Log Processing

28 4.5 Case Study - Automated Log Management

29 4.6 Question Breakdown

30 Learning objectives

31 5.1 Edge Security

32 5.2 VPC Network Security

33 5.3 VPC Egress Security

34 5.4 Multiple VPC Strategies

35 5.5 Case Study - Multi-scope Infrastructure Design

36 5.6 Question Breakdown

37 Learning objectives

38 6.1 Network Troubleshooting

39 6.2 Host-Based Security

40 6.3 Case Study - The Golden AMI Pipeline

41 6.4 Question Breakdown

42 Learning objectives

43 7.1 AWS Credentials

44 7.2 IAM Policy Details

45 7.3 Policy Evaluation Logic

46 7.4 Assuming IAM Roles

47 7.5 Case Study - IAM Policy Examples

48 7.6 Question Breakdown

49 Learning objectives

50 8.1 SAML Federation

51 8.2 Cognito User Pool Federation

52 8.3 Cognito Identity Pool Federation

53 8.4 AWS SSO Federation

54 8.5 AWS Organizations

55 8.6 S3 Access Control

56 8.7 API Gateway and Lambda Access Control

57 8.8 Troubleshooting Permissions

58 8.9 Case Study - Broken Permission Examples

59 8.10 Question Breakdown

60 Learning objectives

61 9.1 Symmetric Data Encryption

62 9.2 AWS KMS Basics

63 9.3 AWS KMS Access Control

64 9.4 AWS CloudHSM

65 9.5 AWS Certificate Manager

66 9.6 Using Keys for Authentication

67 9.7 Troubleshooting Key Management

68 9.8 Case Study - CloudWatch Logs Encryption

69 9.9 Question Breakdown

70 Learning objectives

71 10.1 Data Encryption At-rest by Default

72 10.2 Data Encryption At-rest as Option

73 10.3 Data Encryption At-rest Operations

74 10.4 Data Encryption In Transit—Web

75 10.5 Data Encryption In Transit—Storage

76 10.6 Data Encryption In Transit—Network

77 10.7 Case Study - End-to-End Encryption

78 10.8 Question Breakdown

79 Learning objectives

80 11.1 Study Strategies

81 11.2 Study Resources

82 AWS Certified Security – Specialty - Summary

AWS Certified Security – Specialty (SCS-C01) Pack of 2 Courses & PDF Guides Down

SKU: EXT2021-0180
$10.00Price
  • You can Instant Download a PDF file 

    After successful payment , 

    This PDF File Contains Course Download links

    You can Download This Course immediately from click that Links.

bottom of page