Table of contents
Introduction
0mins
Lock icon
Course Introduction | 0m
Lock icon
Exploring the Cloud Playground | 0m
Lock icon
About the Exam | 0m
Lock icon
Using the AWS CLI and AWS SDK | 0m
Lock icon
Shared Responsibility Model | 0m
Threat Detection and Incident Response Domain
60mins
Lock icon
Recording AWS Resource Changes with AWS Config | 0m
Lock icon
Demo: Analyzing Environments with AWS Trusted Advisor | 0m
Lock icon
Threat Detection with Amazon GuardDuty | 0m
Lock icon
Demo: Viewing Amazon GuardDuty Findings | 0m
Lock icon
Remediating Amazon GuardDuty Findings | 0m
Lock icon
Demo: Account Checkups with the AWS Health Dashboard | 0m
Lock icon
Assessing EC2 Instances with Amazon Inspector | 0m
Lock icon
Demo: Inspecting EC2 Instances | 0m
Lock icon
Automated Patching Using AWS Systems Manager | 0m
Lock icon
Demo: Incident Response and Recovery with AWS Systems Manager | 0m
Lock icon
Security Compliance Reporting Using AWS Artifact | 0m
Lock icon
Responding to AWS Abuse Notices | 0m
Lock icon
AWS Incident Response | 0m
Lock icon
Amazon Detective | 0m
Lock icon
Section Summary | 0m
Lock icon
Incident Response Within AWSIncident Response in AWS | 1h 0m
Security Logging and Monitoring Domain
255mins
Lock icon
Logging and Metrics Using Amazon CloudWatch | 0m
Lock icon
Demo: Sending Custom Logs to CloudWatch | 0m
Lock icon
Using CloudWatch for Resource MonitoringUsing CloudWatch for Resource Monitoring | 1h 0m
Lock icon
Auditing AWS Accounts with AWS CloudTrail | 0m
Lock icon
Demo: Examining CloudTrail Events | 0m
Lock icon
Remediating EC2 Auto Scaling Group Modifications with EventBridgeRemediating EC2 Auto Scaling Group Modifications with EventBridge | 45m
Lock icon
Logging with Amazon Kinesis and Amazon OpenSearch (Elasticsearch) | 0m
Lock icon
Demo: Querying Data with Amazon Athena | 0m
Lock icon
Demo: Enabling VPC Flow Logs Part 1 | 0m
Lock icon
Demo: Enabling VPC Flow Logs Part 2 | 0m
Lock icon
Work with AWS VPC Flow Logs for Network MonitoringWork with AWS VPC Flow Logs for Network Monitoring | 1h 45m
Lock icon
Continuously Auditing AWS with AWS Audit Manager | 0m
Lock icon
Section Summary | 0m
Lock icon
Logging and Monitoring Using AWS ServicesLogging and Monitoring in AWS | 45m
Infrastructure Security Domain
165mins
Lock icon
AWS Key Management Service (KMS) Fundamentals | 0m
Lock icon
Implementing Envelope Encryption with AWS KMS | 0m
Lock icon
Demo: Generating Data Keys for Envelope Encryption | 0m
Lock icon
Demo: Multi-Region Keys, Imports, and Deletion with AWS KMS | 0m
Lock icon
Creating and Securing Customer Managed Keys with AWS KMSCreating and Securing Customer Managed Keys with AWS KMS | 1h 0m
Lock icon
Creating More Secure Keys with AWS CloudHSM | 0m
Lock icon
Blocking Malicious Traffic with AWS WAF and AWS Firewall Manager | 0m
Lock icon
Demo: Implementing AWS WAF on Application Load Balancers | 0m
Lock icon
Intrusion Detection and Prevention via AWS Network Firewall | 0m
Lock icon
Locking Down CloudFront Distributions Integrated with Amazon S3 | 0m
Lock icon
Origin Access Control (OAC) | 0m
Lock icon
Configuring an Origin Access Control for an AWS CloudFront DistributionConfiguring an Origin Access Control for an AWS CloudFront Distribution | 1h 0m
Lock icon
Securing HTTP Calls with Lambda@Edge | 0m
Lock icon
Preventing DDoS Attacks with AWS Shield | 0m
Lock icon
Auditing Compromised Resources with AWS Security Hub | 0m
Lock icon
Demo: Exploring Security Scores in AWS Security Hub | 0m
Lock icon
Network Security via VPNs | 0m
Lock icon
Customizing VPCs, Routing, and Security Controls - Part 1 | 0m
Lock icon
Customizing VPCs, Routing, and Security Controls - Part 2 | 0m
Lock icon
Securely Connecting to VPCs | 0m
Lock icon
Private Service Connections via VPC Endpoints | 0m
Lock icon
AWS KMS Key Types | 0m
Lock icon
Web App Attacks | 0m
Lock icon
Section Summary | 0m
Lock icon
Securing Our AWS InfrastructureInfrastructure Security in AWS | 45m
Identity and Access Management Domain
300mins
Lock icon
IAM Refresher | 0m
Lock icon
Important AWS Root User Account Concepts | 0m
Lock icon
Exploring AWS Identities - Part 1 | 0m
Lock icon
Exploring AWS Identities - Part 2 | 0m
Lock icon
Granting and Denying Access via IAM Policies | 0m
Lock icon
Interpreting IAM Policies | 0m
Lock icon
Create and Assume Roles in AWSCreate and Assume Roles in AWS | 1h 30m
Lock icon
Demo: Troubleshooting Conflicting IAM Policies | 0m
Lock icon
Demo: Setting Permissions Boundaries | 0m
Lock icon
Demo: Generating IAM Credential Reports | 0m
Lock icon
Create Users and Manage Permissions Using Groups and Policies in IAMCreate Users and Manage Permissions Using Groups and Policies in IAM | 1h 0m
Lock icon
Importance of AWS Security Token Service (STS) | 0m
Lock icon
Demo: Using Different STS Sources | 0m
Lock icon
Using EC2 Roles and Instance Profiles in AWSUsing EC2 Roles and Instance Profiles in AWS | 1h 45m
Lock icon
Using Web Identity Federation | 0m
Lock icon
Creating User Pools and Identity Pools in Amazon Cognito | 0m
Lock icon
Authentication with AWS Directory Service - Part 1 | 0m
Lock icon
Authentication with AWS Directory Service - Part 2 | 0m
Lock icon
Demo: Logging In to AWS via AWS Single Sign-On (SSO) | 0m
Lock icon
Leveraging AWS Organizations for AWS Account Access | 0m
Lock icon
Section Summary | 0m
Lock icon
Identity and Access Management in AWSIdentity and Access Management in AWS | 45m
Data Protection Domain
165mins
Lock icon
TLS Certificate Management with AWS Certificate Manager (ACM) | 0m
Lock icon
Secure Elastic Load Balancing (ELB) - Part 1 | 0m
Lock icon
Secure Elastic Load Balancing (ELB) - Part 2 | 0m
Lock icon
Demo: Deploying a TLS-Secured Application Load Balancer | 0m
Lock icon
Demo: Increasing Security within DynamoDB | 0m
Lock icon
Controlling Sensitive Data with Amazon Macie | 0m
Lock icon
Data Lifecycle | 0m
Lock icon
Secure Storage with Amazon S3 | 0m
Lock icon
Advanced S3 Security ConfigurationAdvanced S3 Security Configuration | 1h 30m
Lock icon
Creating a Basic Amazon S3 Lifecycle PolicyCreating a Basic Amazon S3 Lifecycle Policy | 45m
Lock icon
Section Summary | 0m
Lock icon
Protecting Our Data in AWSData Protection in AWS | 30m
Management and Security Governance (and Miscellaneous)
30mins
Lock icon
Section Overview | 0m
Lock icon
Controlling Access to Amazon QuickSight | 0m
Lock icon
Demo: Complicated KMS-Related Issues - Recovering Encrypted EBS Volumes | 0m
Lock icon
Parameter Store and Secrets Manager for Sensitive Data | 0m
Lock icon
Filtering and Rejecting EC2 Instance Traffic | 0m
Lock icon
Kinesis Encryption | 0m
Lock icon
Cross-Region Networking | 0m
Lock icon
Section Summary | 0m
Lock icon
Miscellaneous AWS Security Knowledge ReviewMiscellaneous Services and Concepts in AWS | 30m
Conclusion
495mins
Lock icon
Congratulations! What's Next? | 0m
Lock icon
AWS Certified Security - Specialty 2022AWS Certified Security – Specialty SCS-C02: Exam 1 | 2h 45m
Lock icon
AWS Certified Security - Specialty 2022 BAWS Certified Security – Specialty SCS-C02: Exam 2 | 2h 45m
Lock icon
AWS Certified Security - Specialty 2022 CAWS Certified Security – Specialty SCS-C02: Exam 3 | 2h 45m
About the author
Andru Estes
Andru has been working within the IT industry for just under 15 years. He started off in Systems Administration and Systems Engineering within virtualization platforms like VMware and Hyper-V. Soon after that, he began his journey into the public cloud, where he quickly dove headfirst into AWS and Azure.
After working as a Cloud Architect and Consultant for the past 7 years, Andru found his other passion in being able to help students learn about the public cloud and general DevOps methodologies. If it involves public cloud, DevOps, or Python, then Andru is all about it!
More Courses by Andru E.
Get access now
Sign up to get immediate access to this course plus thousands more you can watch anytime, anywhere
Cancel
Close button icon