AWS Certified Security Specialty Online Course
AWS Certified Security Specialty (SCS-C02) Online Course
Expand your horizon with AWS Certified Security Specialty Online Course and focused training programme. The online courseware assists you with acquiring additional knowledge and skills to prepare for the certification exam. AWS Certified Security Specialty Online Course has been developed around securing applications in AWS. The AWS Security Specialty exam is one one three Specialty certifications by AWS.
Focused Key Components
The AWS Certified Security Specialty Online Course focuses on designing and operating security in the cloud including the key areas -
- Identity and Access Management
- Detective Controls
- Infrastructure Protection
- Data Protection
- Incident Response
AWS Certified Security Specialty Online Course has been designed to provide you with the required knowledge not only to qualify the AWS Certified Security Specialty certification exam but also earn hands-on experience to work in a real-world environment.
What's Inside?
- 23 hours + Learning Videos for all Course Objectives (100% Course Covered)
- 13 Scenarios based Lab-Sessions
- Latest Updated content
- Unlimited Lifetime access
Course Structure
The AWS Certified Security Specialty Online Course covers the following topics -
Course Introduction (5)
- The Course Overview
- Certification Benefits Recap
- Understanding the Shared Responsibility Model
- Birds-Eye View of AWS Security
- Setting up Your AWS Environment
- Understanding Infrastructure Security - Part One (4)
- Using Key Pairs with EC2 Instances
- Understanding Hypervisors and Isolation in EC2 Instances
- Get to Know AWS Secrets Manager
- Leveraging AWS Systems Manager, Parameter Store, and Run Command Features
Understanding Infrastructure Security - Part Two (3)
- What Is a VPC?
- Enabling Safe Internet Connectivity in VPCs
- AWS Marketplace Security Products
- Leverage AWS Services for Logging and Monitoring - Part One (3)
- Enabling Centralized Logging with CloudWatch
- Leverage CloudTrail to Track User Activity and API Usage
- Using Athena to Query Your Logs
- Leveraging AWS Services for Logging and Monitoring - Part Two (3)
- Automated Security Assessments Using AWS Inspector
- Intelligent Threat Detection Using AWS GuardDuty
- Benefits of Using Trusted Advisor
Deep Dive into AWS Identity and Access Management - Part One (3)
- Overview of AWS IAM for User and Group Management
- Deep Dive Into AWS IAM Roles and Policies
- Using AWS Organizations and Service Control Policies
Deep Dive into AWS Identity and Access Management - Part Two (2)
- Enabling Active Directory Federation Within AWS
- Understanding Cognito and Web Identity Federation
Ensuring Data Protection - Part One (4)
- Using AWS KMS to Easily Manage Data Encryption
- Hands-On KMS
- Restrict Access to S3 Buckets Using Policies and Pre-Signed URLs
- Enabling Vault Lock in AWS Glacier
Ensuring Data Protection - Part Two (3)
- Force S3 to Use CloudFront
- Getting to Know AWS Certificate Manager
- Security Considerations and Features of AWS Load Balancers
Managing Incident Response (4)
- Overview of a DDoS Attack
- Enabling AWS WAF and Shield to Protect Against DDoS Attacks
- Configuring Throttling and Caching in API Gateway
- Managing Compliance Requirements in AWS Using Artifact and Macie
Final Preparation (3)
- Booking Your Exam Seat
- Exploring Relevant Whitepapers
- Uncovering Additional Tips