What You’ll Discover in Linuxacademy AWS Certified Security-Specialty Certification
The AWS Certified Security Specialty Certification is a certification that focuses on securing applications. AWS. It is one of three specialty certifications that are offered by AWS… File Size: 10.52 GB
Linuxacademy – AWS Certified Security-Specialty Certification
Course Details
The AWS Certified Security Specialty Certification is a certification that focuses on securing applications. AWS. It is one of three specialty certifications that are offered by AWS. This certification is focused on five domains that are essential for cloud security design and operation. These are:
Identity and Access Management Detective controls Infrastructure Protection Data Protection Incident Response
This course is designed to give you the knowledge and skills to pass the exam. AWS Certified Security Specialty certification exam and also hands-on experience-To become a qualified professional, you will need to have the required experience AWS Security specialist working in real-World environment.
Here’s What You’ll Get in AWS Certified Security-Specialty Certification
Please connect with us at slack.linuxacademy.com in the #security channel if you have questions or feedback.
Syllabus
Course Introduction
Getting Started
Course Introduction
00:02:49
About the Training Administrator
00:02:15
Introduction to the Security Runbook Interactive Diagram
00:04:39
Tools and features for courses
00:11:02
Domain 1 : Incident Response
Domain 1 – Introduction
Domain 1 – Introduction
00:06:12
1.1 – Given an AWS Take a Notice of Abuse, Evaluate a Suspected Compromise Instance or Exposed Keys
AWS Notification for Abuse
00:17:04
Response to AWS Notifications for Abuse
00:15:18
Hands-Labs are real-life environments that let you practice the skills you’ve learned.
Perform a Source Code Security Scanning Using Git-Discover secrets AWS
00:30:00
AWS Notification for Abuse
00:15:00
1.2 Verify that Incident Response Plans include relevant information AWS services.
What is Incident Response?
00:08:20
Incident Response Framework: Part 1
00:21:50
Incident Response Framework: Part 2
00:13:35
Incident Response Plan
00:15:00
1.3 Assess the Configuration for Automated Alerting, and Perform Possible Security Remediation-Other Incidents & Emerging Issues
Automated Alerting
00:30:08
Automated Incident Response
00:12:02
CloudTrail Automation Example
00:11:10
Hands-Labs are real-life environments that let you practice the skills you’ve learned.
Enabling AWS VPC Flow logs with automation
00:45:00
Domain 2 – Logging and Monitoring
Domain 2 – Introduction
Logging and Monitoring Introduction
00:02:02
2.1 Security monitoring and alerting: Design and implement.
S3 Events
00:18:59
CloudWatch Logs – Metric Filters & Custom Metrics
00:14:11
CloudWatch Events
00:20:40
Multi-CloudWatch Event Buses – Account
00:14:45
AWS Config
00:23:20
AWS Inspector
00:21:33
Hands-Labs are real-life environments that let you practice the skills you’ve learned.
Automatic Resource Recovery with AWS Config
01:30:00
Hands-Labs are real-life environments that let you practice the skills you’ve learned.
Automated Remediation of Inspector Findings AWS
01:30:00
Monitor and Alerting: Design, Implement and Troubleshoot
00:45:00
Troubleshoot security monitoring, alerting
Troubleshoot CloudWatch Event
00:18:05
Hands-Labs are real-life environments that let you practice the skills you’ve learned.
Troubleshooting a Response, Alerting, or Detection Workflow AWS
01:00:00
2.3 Designing and Implementing a Logging System
CloudTrail Logging
00:22:51
CloudWatch Logs: CloudTrail
00:14:14
CloudWatch Logs: VPC-Flow Logs
00:16:59
CloudWatch Logs – Agent for EC2
00:22:47
CloudWatch Logs – DNS Query Logs
00:09:46
Access logs for S3
00:10:18
Multi-Account: Centralized Logging
00:22:04
Troubleshooting Logging Solutions
Get your instant download Linuxacademy – AWS Certified Security-Specialty Certification
Troubleshoot Logging
00:25:39
Multi-Account: Troubleshoot Logging
00:11:24
Hands-Labs are real-life environments that let you practice the skills you’ve learned.
Troubleshooting CloudTrail/S3 Logging Issues AWS
00:30:00
Domain 3: Infrastructure Security
3.1 Design Edge Security AWS
CloudFront
00:31:30
Limiting S3 to CloudFront
00:11:11
Signed URLs and cookies
00:26:44
CloudFront Geo Restriction
00:09:27
S3 encryption is mandatory
00:14:18
S3 Cross Region Replication – Security
00:17:10
Web Application Firewall, (WAF) AWS Shield
00:23:07
Hands-Labs are real-life environments that let you practice the skills you’ve learned.
Waf in Blocks Web Traffic AWS
00:30:00
3.2 Create and implement a secure network infrastructure.
VPC Design and Security
00:20:51
Security Groups
00:22:12
Network Access Control Lists
00:18:42
VPC Peering
00:35:23
VPC Endpoints
00:30:22
Serverless Security
00:10:23
NAT Gateways
00:13:30
Egress-Only Internet Gateways
00:13:44
Bastion Hosts/ Jump Boxes
00:09:06
Hands-Labs are real-life environments that let you practice the skills you’ve learned.
Configuring Layered security in an AWS VPC
00:30:00
Troubleshoot a secure internet infrastructure
Troubleshoot a VPC
00:15:27
3.4 Design and implement a host-Security based on
AWS Host/Hypervisor Safety (disk/memory).
00:10:53
Host Proxy Servers
00:05:42
Host-Based IDS/IPS
00:09:13
Systems Manager
00:18:02
Packet Capture with EC2
00:09:28
Hands-On Labs are live environments that allow you to put your knowledge into practice.
Install an Intrusion Prevention System on an EC2 instance
00:30:00
Identity and Access Management
4.1 Design and implement a scaleable authorization and authentication system to access AWS Resources.
IAM Policies
00:25:18
Users, Groups and Roles
00:29:14
Policy Evaluation and Permission Boundaries
00:17:21
Organizations and Service Control Policy
00:18:57
Resource Policies: Policies for S3 Buckets
00:15:38
Resource Policies: KMS Key Policies
00:13:39
Cross-Access to Accounts for S3 Buckets & Objects
00:17:53
Identity Federation
00:22:40
AWS Systems Manager Parameter Store
00:18:24
4.2 Troubleshoot Access Authorization and authentication System AWS Resources.
Troubleshooting Permissions Union
00:09:44
Troubleshooting Cross-Account Roles
00:12:57
Troubleshooting Identity Federation
00:05:52
Troubleshooting KMS CMK
00:07:20
Data Protection
5.1 Develop and implement key management strategies and their use.
Key Management System (KMS)
00:28:11
KMS in Multi-Configuration of an Account
00:08:24
CloudHSM
00:17:05
5.2 Troubleshoot key administration
Troubleshooting KMS Permissions
00:08:29
KMS Limits
00:10:44
Hands-Labs are real-life environments that let you practice the skills you’ve learned.
Troubleshoot KMS Key Policies
00:30:00
5.3 Create and implement a data encryption system for data at rest or data in transit.
KMS – Data at Rest
00:16:11
Data at Rest: Server-Side encryption with SSE-C
00:06:25
Data In Transit: Certificate Manager (ACM)
00:07:23
SDKs for encryption
00:05:55
Example of compliance
00:08:59
Hands-Labs are virtual environments where you can practice the skills you’ve learned in real life without having to pay any extra or manage an account.
You can create and manage SSL certificates with AWS Certificate Manager
00:30:00
Conclusion
Do a practice exam
AWS Certified Security Specialty
04:00:00
Final Steps
How to Prepare for the Exam
00:10:50
What’s next after? Certification?
00:04:53
Recognized
00:01:01
Course Features
Our platform provides unique features to enhance your courses, beyond video. Find out more.
Certification Prep Course
This course will prepare you to take the certification exam.
Earn a Certificate Of Completion
When you complete this course, you’ll receive a certificate of completion as proof
IMPORTANT: This is it. “Linuxacademy – AWS Certified Security-Specialty Certification” Completely Downloadable Available In your account
(If your link is broken, we will renew it as soon as possible).
We appreciate your patience.