Oreilly – AWS Certified Security – Specialty (SCS-C02) 2024-2
Oreilly – AWS Certified Security – Specialty (SCS-C02) 2024-2 Downloadly IRSpace
AWS Certified Security – Specialty (SCS-C02) course. This comprehensive video course will help you shine in the AWS Cloud Security Expertise (SCS-C02) exam. In this course, you will learn the latest knowledge areas, services, domains and test features. Course instructor Chad Smith has designed this course to set you up for success, ensuring you understand the key concepts and strategies to pass the exam.
What you will learn:
- Fundamentals and applications of key AWS cloud security services
- Tackle exam scenarios and eliminate wrong answers using simulated real-world questions
- Deep understanding of key concepts and strategies to pass the exam
This course is suitable for people who:
- They have professional experience in IT security to design and implement security solutions.
- Have at least two years of practical experience in securing AWS workloads.
AWS Certified Security – Specialty (SCS-C02) course specifications
- Publisher: Oreilly
- Instructor: Chad Smith
- Training level: beginner to advanced
- Training duration: 8 hours 26 minutes
Course headings
- Introduction
- AWS Certified Security – Specialty (SCS-C02): Introduction
- Module 1: Exam Foundation
- Module introduction
- Lesson 1: Exam Guide
- Learning objectives
- 1.1 Introduction
- 1.2 Target Candidate Description
- 1.3 Exam Content
- 1.4 Exam Question Domains
- Module 2: Threat Detection and Incident Response
- Module introduction
- Lesson 2: Design and Implement an Incident Response Plan
- Learning objectives
- 2.1 Incident Response Plan Workflow
- 2.2 Incident Response Preparation
- 2.3 Security Service Deployment Part 1
- 2.4 Security Service Deployment Part 2
- 2.5 Question Breakdown
- Lesson 3: Detect and Respond to Security Incidents
- Learning objectives
- 3.1 Incident Response Detection and Analysis
- 3.2 Alert Sources
- 3.3 Security Alerting Types
- 3.4 Question Breakdown 1
- 3.5 Incident Response Containment
- 3.6 Source, Access, and Destination Containment
- 3.7 Incident Response Eradication
- 3.8 Incident Response Recovery
- 3.9 Incident Response Post-Incident Activity
- 3.10 Question Breakdown 2
- Module 3: Security Logging and Monitoring
- Module introduction
- Lesson 4: Security Monitoring and Troubleshooting
- Learning objectives
- 4.1 CloudWatch Alarms
- 4.2 EventBridge Rules
- 4.3 Security Alert Automation
- 4.4 Question Breakdown 1
- 4.5 Troubleshooting Scenario 1
- 4.6 Troubleshooting Scenario 2
- 4.7 Question Breakdown 2
- Lesson 5: Security Logging and Log Analysis
- Learning objectives
- 5.1 AWS Security Log Sources
- 5.2 Security Log Delivery, Storage, and Retention
- 5.3 Question Breakdown 1
- 5.4 Troubleshooting Logging Permissions
- 5.5 CloudTrail Troubleshooting Scenario
- 5.6 Question Breakdown 2
- 5.7 Log Analysis Options
- 5.8 Question Breakdown 3
- Module 4: Infrastructure Security
- Module introduction
- Lesson 6: Design and Implement Edge and Network Security
- Learning objectives
- 6.1 Edge Security Services
- 6.2 Defense in Depth Example
- 6.3 Question Breakdown 1
- 6.4 VPC Security
- 6.5 Network Encryption Options
- 6.6 AWS Network Firewall
- 6.7 Question Breakdown 2
- Lesson 7: Compute Security and Security Troubleshooting
- Learning objectives
- 7.1 EC2 Vulnerability Management
- 7.2 Secure Credentials and Secrets
- 7.3 Question Breakdown 1
- 7.4 Network Connectivity Scenarios
- 7.5 Extended Troubleshooting Scenario
- 7.6 Question Breakdown 2
- Module 5: Identity and Access Management
- Module introduction
- Lesson 8: Design, Implement, and Troubleshoot Authentication
- Learning objectives
- 8.1 Strong Sign-in Mechanisms
- 8.2 Temporary Credentials – Account Federation
- 8.3 Temporary Credentials – Application Federation
- 8.4 Temporary Credentials – Machine Identities
- 8.5 Question Breakdown 1
- 8.6 Store and Use Secrets Securely
- 8.7 Identity Provider Centralization
- 8.8 Audit and Rotate Credentials
- 8.9 User Groups and Attributes
- 8.10 Question Breakdown 2
- Lesson 9: Design, Implement, and Troubleshoot Authorization
- Learning objectives
- 9.1 AWS Policy Types
- 9.2 Access Requirements
- 9.3 Permission Policy Elements
- 9.4 AWS Policy Evaluation Logic
- 9.5 Emergency Access Strategies
- 9.6 Question Breakdown 1
- 9.7 Permissions Reduction Strategies
- 9.8 Permissions Guardrails
- 9.9 Access Management Lifecycles
- 9.10 Cross-Account Access
- 9.11 AWS Organizations Sharing
- 9.12 Third-party Sharing
- 9.13 Question Breakdown 2
- Module 6: Data Protection
- Module introduction
- Lesson 10: In-transit Data Protection
- Learning objectives
- 10.1 Three Goals of Data Encryption
- 10.2 Network Traffic Encryption Options
- 10.3 Cross-region Data Protection
- 10.4 AWS Certificate Manager
- 10.5 AWS Private Certificate Authority
- 10.6 In-transit Encryption Enforcement
- 10.7 Question Breakdown
- Lesson 11: At-rest Data Protection
- Learning objectives
- 11.1 Data Integrity Strategies
- 11.2 At-rest Encryption Examples
- 11.3 Symmetric Data Encryption
- 11.4 KMS Features
- 11.5 KMS Key Types
- 11.6 KMS Access Control
- 11.7 Other At-rest Encryption Strategies
- 11.8 Data Modification Prevention
- 11.9 Question Breakdown
- Lesson 12: Data Lifecycle, Credential, and Secret Management
- Learning objectives
- 12.1 Data Retention Strategies
- 12.2 Data Retention Services and Features
- 12.3 Question Breakdown 1
- 12.4 KMS Asymmetric Keys
- 12.5 Credential and Secret Rotation
- 12.6 Secrets Manager Access Control
- 12.7 Question Breakdown 2
- Module 7: Management and Security Governance
- Module introduction
- Lesson 13: AWS Resource Governance
- Learning objectives
- 13.1 AWS Organizations
- 13.2 AWS Control Tower
- 13.3 Question Breakdown 1
- 13.4 AWS Control Tower Account Factory
- 13.5 AWS Resource Groups
- 13.6 AWS Organizations Tag Policies
- 13.7 AWS Firewall Manager
- 13.8 Resource Access Manager
- 13.9 Question Breakdown 2
- Lesson 14: AWS Security Compliance
- Learning objectives
- 14.1 AWS You’ve got it
- 14.2 AWS Config, CloudWatch Logs, and Security Hub
- 14.3 AWS Audit Manager
- 14.4 Question Breakdown 1
- 14.5 Well-Architected Framework and Tool
- 14.6 Cost Analysis and Anomalies
- 14.7 Question Breakdown 2
- Module 8: Next Steps
- Module introduction
- Lesson 15: Further Study
- Learning objectives
- 15.1 Documentation
- 15.2 Hands-on Learning
- 15.3 Sample Questions
- Summary
- AWS Certified Security – Specialty (SCS-C02): Summary
Images of AWS Certified Security – Specialty (SCS-C02) course

Sample video of the course
Installation guide
After Extract, view with your favorite Player.
Subtitle: None
Quality: 720p
download link
File(s) password: www.downloadly.ir
Size
1.7 GB
Super Admin