Table of contents
Introduction
26mins
Lock icon
Course Introduction | 2m
Lock icon
Exploring the Cloud Playground | 4m
Lock icon
About the Exam | 9m
Lock icon
Using the AWS CLI and AWS SDK | 3m
Lock icon
Shared Responsibility Model | 5m
Identity and Access Management Domain
436mins
Lock icon
IAM Refresher | 9m
Lock icon
Important AWS Root User Account Concepts | 4m
Lock icon
Exploring AWS Identities - Part 1 | 8m
Lock icon
Exploring AWS Identities - Part 2 | 10m
Lock icon
Granting and Denying Access via IAM Policies | 14m
Lock icon
Interpreting IAM Policies | 13m
Lock icon
Create and Assume Roles in AWS | 1h 0m
Lock icon
Demo: Troubleshooting Conflicting IAM Policies | 14m
Lock icon
Demo: Setting Permissions Boundaries | 14m
Lock icon
Demo: Generating IAM Credential Reports | 7m
Lock icon
Create Users and Manage Permissions Using Groups and Policies in IAM | 1h 0m
Lock icon
Importance of AWS Security Token Service (STS) | 12m
Lock icon
Demo: Using Different STS Sources | 17m
Lock icon
Using EC2 Roles and Instance Profiles in AWS | 1h 45m
Lock icon
Using Web Identity Federation | 7m
Lock icon
Creating User Pools and Identity Pools in Amazon Cognito | 10m
Lock icon
Authentication with AWS Directory Service - Part 1 | 10m
Lock icon
Authentication with AWS Directory Service - Part 2 | 10m
Lock icon
Demo: Logging In to AWS via AWS Single Sign-On (SSO) | 11m
Lock icon
Leveraging AWS Organizations for AWS Account Access | 16m
Lock icon
Section Summary | 17m
Lock icon
| 0m
Security Logging and Monitoring Domain
279mins
Lock icon
Logging and Metrics Using Amazon CloudWatch | 14m
Lock icon
Demo: Sending Custom Logs to CloudWatch | 14m
Lock icon
Using CloudWatch for Resource Monitoring | 1h 0m
Lock icon
Auditing AWS Accounts with AWS CloudTrail | 14m
Lock icon
Demo: Examining CloudTrail Events | 11m
Lock icon
Logging with Amazon Kinesis and Amazon OpenSearch (Elasticsearch) | 11m
Lock icon
Demo: Querying Data with Amazon Athena | 9m
Lock icon
Demo: Enabling VPC Flow Logs Part 1 | 6m
Lock icon
Demo: Enabling VPC Flow Logs Part 2 | 11m
Lock icon
Work with AWS VPC Flow Logs for Network Monitoring | 1h 45m
Lock icon
Continuously Auditing AWS with AWS Audit Manager | 9m
Lock icon
Section Summary | 11m
Lock icon
| 0m
Threat Detection and Incident Response Domain
158mins
Lock icon
Recording AWS Resource Changes with AWS Config | 14m
Lock icon
Remediating EC2 Auto Scaling Group Modifications with EventBridge | 45m
Lock icon
Demo: Analyzing Environments with AWS Trusted Advisor | 10m
Lock icon
Threat Detection with Amazon GuardDuty | 7m
Lock icon
Demo: Viewing Amazon GuardDuty Findings | 4m
Lock icon
Remediating Amazon GuardDuty Findings | 5m
Lock icon
Demo: Account Checkups with the AWS Health Dashboard | 7m
Lock icon
Assessing EC2 Instances with Amazon Inspector | 9m
Lock icon
Demo: Inspecting EC2 Instances | 6m
Lock icon
Automated Patching Using AWS Systems Manager | 15m
Lock icon
Demo: Incident Response and Recovery with AWS Systems Manager | 10m
Lock icon
Security Compliance Reporting Using AWS Artifact | 5m
Lock icon
Responding to AWS Abuse Notices | 4m
Lock icon
Section Summary | 9m
Lock icon
| 0m
Infrastructure Security Domain
329mins
Lock icon
AWS Key Management Service (KMS) Fundamentals | 13m
Lock icon
Implementing Envelope Encryption with AWS KMS | 8m
Lock icon
Demo: Generating Data Keys for Envelope Encryption | 10m
Lock icon
Demo: Multi-Region Keys, Imports, and Deletion with AWS KMS | 8m
Lock icon
Creating and Securing Customer Managed Keys with AWS KMS | 1h 0m
Lock icon
Creating More Secure Keys with AWS CloudHSM | 10m
Lock icon
Blocking Malicious Traffic with AWS WAF and AWS Firewall Manager | 14m
Lock icon
Demo: Implementing AWS WAF on Application Load Balancers | 11m
Lock icon
Intrusion Detection and Prevention via AWS Network Firewall | 10m
Lock icon
Locking Down CloudFront Distributions Integrated with Amazon S3 | 13m
Lock icon
Setting Up AWS CloudFront as an HTTPS Endpoint for S3 | 1h 15m
Lock icon
Securing HTTP Calls with Lambda@Edge | 10m
Lock icon
Preventing DDoS Attacks with AWS Shield | 6m
Lock icon
Auditing Compromised Resources with AWS Security Hub | 8m
Lock icon
Demo: Exploring Security Scores in AWS Security Hub | 4m
Lock icon
Network Security via VPNs | 8m
Lock icon
Customizing VPCs, Routing, and Security Controls - Part 1 | 8m
Lock icon
Customizing VPCs, Routing, and Security Controls - Part 2 | 10m
Lock icon
Securely Connecting to VPCs | 12m
Lock icon
Private Service Connections via VPC Endpoints | 7m
Lock icon
Section Summary | 14m
Lock icon
| 0m
Data Protection Domain
174mins
Lock icon
TLS Certificate Management with AWS Certificate Manager (ACM) | 14m
Lock icon
Secure Elastic Load Balancing (ELB) - Part 1 | 13m
Lock icon
Secure Elastic Load Balancing (ELB) - Part 2 | 5m
Lock icon
Demo: Deploying a TLS-Secured Application Load Balancer | 9m
Lock icon
Demo: Increasing Security within DynamoDB | 9m
Lock icon
Controlling Sensitive Data with Amazon Macie | 9m
Lock icon
Secure Storage with Amazon S3 | 13m
Lock icon
Advanced S3 Security Configuration | 1h 30m
Lock icon
Section Summary | 9m
Lock icon
| 0m
Miscellaneous Services and Concepts
49mins
Lock icon
Section Overview | 1m
Lock icon
Controlling Access to Amazon QuickSight | 7m
Lock icon
Demo: Complicated KMS-Related Issues - Recovering Encrypted EBS Volumes | 10m
Lock icon
Parameter Store and Secrets Manager for Sensitive Data | 14m
Lock icon
Filtering and Rejecting EC2 Instance Traffic | 3m
Lock icon
Kinesis Encryption | 5m
Lock icon
Section Summary | 7m
Lock icon
| 0m
Conclusion
1min
Lock icon
Congratulations! What's Next? | 1m
Lock icon
| 0m
Lock icon
| 0m
Lock icon
| 0m
SCS-C02 Updates
55mins
Lock icon
SCS-C02 Update | 2m
Lock icon
AWS Incident Response | 9m
Lock icon
Amazon Detective | 5m
Lock icon
AWS KMS Key Types | 9m
Lock icon
Web App Attacks | 10m
Lock icon
Data Lifecycle | 9m
Lock icon
Cross-Region Networking | 5m
Lock icon
Origin Access Control (OAC) | 4m
Get access now
Sign up to get immediate access to this course plus thousands more you can watch anytime, anywhere
Cancel
Close button icon