Oreilly – AWS Certified Security – Specialty (SCS-C02) 2024-2

Oreilly – AWS Certified Security – Specialty (SCS-C02) 2024-2 Downloadly IRSpace

Oreilly – AWS Certified Security – Specialty (SCS-C02) 2024-2
Oreilly – AWS Certified Security – Specialty (SCS-C02) 2024-2

AWS Certified Security – Specialty (SCS-C02) course. This comprehensive video course will help you shine in the AWS Cloud Security Expertise (SCS-C02) exam. In this course, you will learn the latest knowledge areas, services, domains and test features. Course instructor Chad Smith has designed this course to set you up for success, ensuring you understand the key concepts and strategies to pass the exam.

What you will learn:

  • Fundamentals and applications of key AWS cloud security services
  • Tackle exam scenarios and eliminate wrong answers using simulated real-world questions
  • Deep understanding of key concepts and strategies to pass the exam

This course is suitable for people who:

  • They have professional experience in IT security to design and implement security solutions.
  • Have at least two years of practical experience in securing AWS workloads.

AWS Certified Security – Specialty (SCS-C02) course specifications

  • Publisher: Oreilly
  • Instructor: Chad Smith
  • Training level: beginner to advanced
  • Training duration: 8 hours 26 minutes

Course headings

  • Introduction
    1. AWS Certified Security – Specialty (SCS-C02): Introduction
  • Module 1: Exam Foundation
    1. Module introduction
  • Lesson 1: Exam Guide
    1. Learning objectives
    2. 1.1 Introduction
    3. 1.2 Target Candidate Description
    4. 1.3 Exam Content
    5. 1.4 Exam Question Domains
  • Module 2: Threat Detection and Incident Response
    1. Module introduction
  • Lesson 2: Design and Implement an Incident Response Plan
    1. Learning objectives
    2. 2.1 Incident Response Plan Workflow
    3. 2.2 Incident Response Preparation
    4. 2.3 Security Service Deployment Part 1
    5. 2.4 Security Service Deployment Part 2
    6. 2.5 Question Breakdown
  • Lesson 3: Detect and Respond to Security Incidents
    1. Learning objectives
    2. 3.1 Incident Response Detection and Analysis
    3. 3.2 Alert Sources
    4. 3.3 Security Alerting Types
    5. 3.4 Question Breakdown 1
    6. 3.5 Incident Response Containment
    7. 3.6 Source, Access, and Destination Containment
    8. 3.7 Incident Response Eradication
    9. 3.8 Incident Response Recovery
    10. 3.9 Incident Response Post-Incident Activity
    11. 3.10 Question Breakdown 2
  • Module 3: Security Logging and Monitoring
    1. Module introduction
  • Lesson 4: Security Monitoring and Troubleshooting
    1. Learning objectives
    2. 4.1 CloudWatch Alarms
    3. 4.2 EventBridge Rules
    4. 4.3 Security Alert Automation
    5. 4.4 Question Breakdown 1
    6. 4.5 Troubleshooting Scenario 1
    7. 4.6 Troubleshooting Scenario 2
    8. 4.7 Question Breakdown 2
  • Lesson 5: Security Logging and Log Analysis
    1. Learning objectives
    2. 5.1 AWS Security Log Sources
    3. 5.2 Security Log Delivery, Storage, and Retention
    4. 5.3 Question Breakdown 1
    5. 5.4 Troubleshooting Logging Permissions
    6. 5.5 CloudTrail Troubleshooting Scenario
    7. 5.6 Question Breakdown 2
    8. 5.7 Log Analysis Options
    9. 5.8 Question Breakdown 3
  • Module 4: Infrastructure Security
    1. Module introduction
  • Lesson 6: Design and Implement Edge and Network Security
    1. Learning objectives
    2. 6.1 Edge Security Services
    3. 6.2 Defense in Depth Example
    4. 6.3 Question Breakdown 1
    5. 6.4 VPC Security
    6. 6.5 Network Encryption Options
    7. 6.6 AWS Network Firewall
    8. 6.7 Question Breakdown 2
  • Lesson 7: Compute Security and Security Troubleshooting
    1. Learning objectives
    2. 7.1 EC2 Vulnerability Management
    3. 7.2 Secure Credentials and Secrets
    4. 7.3 Question Breakdown 1
    5. 7.4 Network Connectivity Scenarios
    6. 7.5 Extended Troubleshooting Scenario
    7. 7.6 Question Breakdown 2
  • Module 5: Identity and Access Management
    1. Module introduction
  • Lesson 8: Design, Implement, and Troubleshoot Authentication
    1. Learning objectives
    2. 8.1 Strong Sign-in Mechanisms
    3. 8.2 Temporary Credentials – Account Federation
    4. 8.3 Temporary Credentials – Application Federation
    5. 8.4 Temporary Credentials – Machine Identities
    6. 8.5 Question Breakdown 1
    7. 8.6 Store and Use Secrets Securely
    8. 8.7 Identity Provider Centralization
    9. 8.8 Audit and Rotate Credentials
    10. 8.9 User Groups and Attributes
    11. 8.10 Question Breakdown 2
  • Lesson 9: Design, Implement, and Troubleshoot Authorization
    1. Learning objectives
    2. 9.1 AWS Policy Types
    3. 9.2 Access Requirements
    4. 9.3 Permission Policy Elements
    5. 9.4 AWS Policy Evaluation Logic
    6. 9.5 Emergency Access Strategies
    7. 9.6 Question Breakdown 1
    8. 9.7 Permissions Reduction Strategies
    9. 9.8 Permissions Guardrails
    10. 9.9 Access Management Lifecycles
    11. 9.10 Cross-Account Access
    12. 9.11 AWS Organizations Sharing
    13. 9.12 Third-party Sharing
    14. 9.13 Question Breakdown 2
  • Module 6: Data Protection
    1. Module introduction
  • Lesson 10: In-transit Data Protection
    1. Learning objectives
    2. 10.1 Three Goals of Data Encryption
    3. 10.2 Network Traffic Encryption Options
    4. 10.3 Cross-region Data Protection
    5. 10.4 AWS Certificate Manager
    6. 10.5 AWS Private Certificate Authority
    7. 10.6 In-transit Encryption Enforcement
    8. 10.7 Question Breakdown
  • Lesson 11: At-rest Data Protection
    1. Learning objectives
    2. 11.1 Data Integrity Strategies
    3. 11.2 At-rest Encryption Examples
    4. 11.3 Symmetric Data Encryption
    5. 11.4 KMS Features
    6. 11.5 KMS Key Types
    7. 11.6 KMS Access Control
    8. 11.7 Other At-rest Encryption Strategies
    9. 11.8 Data Modification Prevention
    10. 11.9 Question Breakdown
  • Lesson 12: Data Lifecycle, Credential, and Secret Management
    1. Learning objectives
    2. 12.1 Data Retention Strategies
    3. 12.2 Data Retention Services and Features
    4. 12.3 Question Breakdown 1
    5. 12.4 KMS Asymmetric Keys
    6. 12.5 Credential and Secret Rotation
    7. 12.6 Secrets Manager Access Control
    8. 12.7 Question Breakdown 2
  • Module 7: Management and Security Governance
    1. Module introduction
  • Lesson 13: AWS Resource Governance
    1. Learning objectives
    2. 13.1 AWS Organizations
    3. 13.2 AWS Control Tower
    4. 13.3 Question Breakdown 1
    5. 13.4 AWS Control Tower Account Factory
    6. 13.5 AWS Resource Groups
    7. 13.6 AWS Organizations Tag Policies
    8. 13.7 AWS Firewall Manager
    9. 13.8 Resource Access Manager
    10. 13.9 Question Breakdown 2
  • Lesson 14: AWS Security Compliance
    1. Learning objectives
    2. 14.1 AWS You’ve got it
    3. 14.2 AWS Config, CloudWatch Logs, and Security Hub
    4. 14.3 AWS Audit Manager
    5. 14.4 Question Breakdown 1
    6. 14.5 Well-Architected Framework and Tool
    7. 14.6 Cost Analysis and Anomalies
    8. 14.7 Question Breakdown 2
  • Module 8: Next Steps
    1. Module introduction
  • Lesson 15: Further Study
    1. Learning objectives
    2. 15.1 Documentation
    3. 15.2 Hands-on Learning
    4. 15.3 Sample Questions
  • Summary
    1. AWS Certified Security – Specialty (SCS-C02): Summary

Images of AWS Certified Security – Specialty (SCS-C02) course

AWS Certified Security - Specialty (SCS-C02)

Sample video of the course

Installation guide

After Extract, view with your favorite Player.

Subtitle: None

Quality: 720p

download link

Download part 1 – 1 GB

Download part 2 – 743 MB

File(s) password: www.downloadly.ir

Size

1.7 GB