AWS Certified Security - Specialty: AWS Certified Security - Specialty (SCS-C01)

Best Seller 164 Lectures 21h 14m 4s
Prepare for your Amazon AWS examination with our training course. The AWS-Certified-Security-Specialty-SCS-C01 course contains a complete batch of videos that will provide you with profound and thorough knowledge related to Amazon AWS certification exam. Pass the Amazon AWS AWS-Certified-Security-Specialty-SCS-C01 test with flying colors.
$14.99$24.99
Curriculum For This Course

  • 1. Introduction to Domain 1 3m 18s
  • 2. Case Study of Hacked Server 7m 24s
  • 3. Dealing with AWS Abuse Notice 7m 28s
  • 4. AWS GuardDuty 8m 20s
  • 5. Whitelisting Alerts in AWS GuardDuty 4m 33s
  • 6. Understanding Incident Response Terminology 12m 19s
  • 7. Incident Response Use-Cases for Exams 2m 38s
  • 8. Use Case - Dealing with Exposed Access Keys 15m 59s
  • 9. Use Case - Dealing with compromised EC2 Instances 5m 1s
  • 10. Incident Response in Cloud 11m 18s
  • 11. Penetration Testing in AWS (New) 6m 27s
  • 1. Introduction to Vulnerability, Exploit, Payload 5m 17s
  • 2. VEP Practical - Hacking inside a test farm 8m 2s
  • 3. Understanding Automated Vulnerability Scanners 8m 23s
  • 4. Common Vulnerabilities Exposures & CVSS 8m 38s
  • 5. Introduction to AWS Inspector 6m 5s
  • 6. Configuring AWS Inspector 6m 42s
  • 7. AWS Inspector & Nessus - CVE scans 9m 4s
  • 8. Best Practices in Vulnerability Assessments 7m 53s
  • 9. Overview of Layer 7 Firewalls 6m 20s
  • 10. Understanding AWS WAF 12m 47s
  • 11. Implementing AWS WAF with ALB 6m 6s
  • 12. Understanding EC2 Run Command 4m 22s
  • 13. Deploying our first RunCommand 10m 38s
  • 14. Patch Compliance with SSM 3m 38s
  • 15. EC2 Systems Manager - Parameter Store 8m
  • 16. Understanding CloudWatch Logs 4m 15s
  • 17. Pushing Linux system logs to CloudWatch 7m 53s
  • 18. CloudWatch Events 8m 54s
  • 19. AWS Athena 11m 54s
  • 20. Overview of AWS CloudTrail 9m 21s
  • 21. Improved Governance - AWS Config 01 13m 20s
  • 22. Improved Governance - AWS Config 02 9m 17s
  • 23. Trusted Advisor 9m 17s
  • 24. CloudTrail - Log File Integrity Validation 8m 40s
  • 25. Digest Delivery Times 2m 18s
  • 26. Overview of AWS Macie (New) 8m 39s
  • 27. Creating our First Alert with AWS Macie (New) 7m 52s
  • 28. S3 Event Notification 7m 15s
  • 29. VPC Flow Logs 13m 41s
  • 1. Implementing Bastion Hosts 11m 1s
  • 2. Introduction to Virtual Private Networks 5m 45s
  • 3. OpenVPN is Awesome 5m 12s
  • 4. OpenVPN - Part 02 3m 19s
  • 5. Overview of AWS VPN Tunnels 6m 15s
  • 6. Using AWS VPN for On-Premise to AWS connectivity 9m 26s
  • 7. Configuring first IPSec tunnel with OpenSwan - Part 01 13m 49s
  • 8. Configuring first IPSec tunnel with OpenSwan - Part 02 4m 43s
  • 9. Inter-Region VPC Peering 7m 40s
  • 10. VPC Endpoints 12m 56s
  • 11. Network ACL 9m 17s
  • 12. Understanding Stateful vs Stateless Firewalls 13m 39s
  • 13. Understanding Networking Sockets 10m 50s
  • 14. Revising Security Groups 4m 51s
  • 15. Connection of Security Group & NIC Cards 6m 30s
  • 16. Egress Rules - The Real Challenge 12m 38s
  • 17. IPTABLES & Instance Metadata 11m 57s
  • 18. IDS / IPS in AWS 5m 15s
  • 19. EBS Architecture & Secure Data Wiping 13m 48s
  • 20. Introduction to Reverse Proxies 7m 54s
  • 21. Understanding the Content Delivery Networks 5m 31s
  • 22. Understanding Edge Locations 7m 47s
  • 23. Deploying Cloudfront Distribution - Part 01 7m 22s
  • 24. Understanding the Origin Access Identity 5m 23s
  • 25. Understanding importance of SNI in TLS protocol 9m 7s
  • 26. CloudFront Signed URL - 01 6m 53s
  • 27. CloudFront Signed URL - 02 9m 55s
  • 28. Real World example on DOS Implementation 8m 20s
  • 29. AWS Shield 4m 5s
  • 30. Mitigating DDOS Attacks 9m 50s
  • 31. Introduction to Application Programming Interface (API) 15m 12s
  • 32. Understanding the working of API 9m 32s
  • 33. Building Lambda Function for our API 4m 18s
  • 34. Building our first API with API Gateway 5m 46s
  • 35. API Gateway - Important Pointers for Exams 4m 24s
  • 36. Lambda & S3 5m 42s
  • 37. EC2 Key-Pair Troubleshooting 10m 48s
  • 38. EC2 Tenancy Attribute 5m 36s
  • 39. AWS Artifact 2m 45s
  • 40. Lambda@Edge 10m 48s
  • 41. AWS Simple Email Service (SES) (New) 6m 15s
  • 1. Understanding AWS Organizations 6m 17s
  • 2. AWS Organizations - Practical 8m 34s
  • 3. Organizational Unit (OU) in AWS organization 5m 15s
  • 4. IAM Policy Evaluation Logic 11m 33s
  • 5. Understanding IAM Policies 15m 6s
  • 6. IAM Policies - Part 02 11m 56s
  • 7. Delegation - Cross Account Trust - Part 1 7m 2s
  • 8. Delegation - Cross Account Trust - Part 2 10m 2s
  • 9. Revising AWS CLI 11m 54s
  • 10. Revising IAM Role 10m 56s
  • 11. EC2 Instance Meta-Data 7m 56s
  • 12. Understanding working of an IAM role 7m 52s
  • 13. IAM - Version Element 9m 56s
  • 14. IAM Policy Variables 4m 15s
  • 15. Principal and NotPrincipal Element 7m 24s
  • 16. Implementing NotPrincipal Element 3m 55s
  • 17. Conditionl Element 7m 8s
  • 18. AWS Security Token Service 7m 24s
  • 19. AWS STS - Migrating the EC2 Role Credentials - Part 2 4m 21s
  • 20. AWS STS - Architecturing IAM user keys the right way - Part 3 16m 55s
  • 21. AWS STS - Automate the temporary credentials - Part 4 4m 18s
  • 22. Understanding Federation - Part 01 6m 8s
  • 23. Understanding Federation - Part 02 8m 2s
  • 24. Understanding SAML for SSO 14m 9s
  • 25. Capturing SAML Assertion Packets with Tracer 7m 19s
  • 26. Establishing trust between IdP and SP 20m 33s
  • 27. Choosing a right IdP 6m 15s
  • 28. AWS Cognito 11m 23s
  • 29. Introduction to AWS Directory Service 10m 28s
  • 30. Understanding Active Directory 4m 13s
  • 31. Deploy our first SimpleAD based directory service 4m 16s
  • 32. Domain Joining EC2 instance with Directory Service 9m 17s
  • 33. Trusts in Active Directory 7m 25s
  • 34. IAM & S3 10m 34s
  • 35. S3 Bucket Policies 7m 31s
  • 36. Cross Account S3 Bucket Configuration 10m 59s
  • 37. Canned ACL's 9m 5s
  • 38. Understanding Signed URL's 13m 47s
  • 39. S3 - Versioning 6m 2s
  • 40. S3 - Cross Region Replication 7m 37s
  • 41. IAM Permission Boundaries (New) 9m 38s
  • 42. Troubleshooting IAM Policies 1m 47s
  • 43. Troubleshooting Answers - Solution 01 4m 46s
  • 44. Troubleshooting Answers - Solution 02 5m 28s
  • 45. Troubleshooting Answers - Solution 03 4m 24s
  • 46. Troubleshooting Answers - Solution 04 1m 24s
  • 47. Troubleshooting Answers - Solution 05 3m 32s
  • 1. Introduction to Cryptography 12m 15s
  • 2. Plain Text vs Encrypted Text Based Algorithms 7m 7s
  • 3. CloudHSM 6m 36s
  • 4. AWS Key Management Service 9m 14s
  • 5. AWS Key Management Service - Part 02 8m 20s
  • 6. AWS Key Management Service - Part 03 7m 26s
  • 7. AWS Key Management Service - Data Key Caching 9m 26s
  • 8. AWS Key Management Service - Scheduled CMK Deletion 4m
  • 9. AWS Key Management Service - CMK Deletion & EBS Use-Case 4m 51s
  • 10. Reducing Risk of Unmanageable CMK 3m 21s
  • 11. KMS - Authentication and Access Control 5m 35s
  • 12. KMS Policy Evaluation Logic - Use Case Solution - 01 3m 1s
  • 13. KMS Policy Evaluation Logic - Use Case 02 1m 56s
  • 14. KMS Policy Evaluation Logic - Use Case Solution - 02 3m 8s
  • 15. KMS Policy Evaluation Logic - Use Case - 03 44s
  • 16. KMS Policy Evaluation Logic - Use Case Solution - 03 (New) 1m 41s
  • 17. KMS Grants 12m 8s
  • 18. Importing Key Material to KMS 7m 45s
  • 19. KMS ViaService 8m 20s
  • 20. Migrating Encrypted KMS Data Across Regions 7m 32s
  • 21. S3 Encryption 11m 55s
  • 22. Revising ELB Listener Configuration 8m 42s
  • 23. ELB Listeners - Understanding HTTP vs TCP Listeners 8m 59s
  • 24. Understanding AWS Certificate Manager 5m 23s
  • 25. Deploying SSL/TLS certificate with ACM 3m 8s
  • 26. Configuring ELB with HTTPS for SSL Offloading 4m 54s
  • 27. Glacier Vault and Vault Lock 7m 40s
  • 28. DynamoDB Encryption 2m 57s
  • 29. Overview of AWS Secrets Manager 5m 59s
  • 30. RDS Integration with AWS Secrets Manager 10m 7s
  • 1. Important Pointers - Domain 1 5m 49s
  • 2. Important Pointers - Domain 2 8m 16s
  • 3. Important Pointers - Domain 3 9m 21s
  • 4. Important Pointers - Domain 4 5m 45s
  • 5. Important Pointers - Domain 5 8m 50s

Hot Exams

How to Open Test Engine .dumpsqueen Files

Use FREE DumpsQueen Test Engine player to open .dumpsqueen files

DumpsQueen Test Engine

Windows

 safe checkout

Your purchase with DumpsQueen.com is safe and fast.

The DumpsQueen.com website is protected by 256-bit SSL from Cloudflare, the leader in online security.

Need Help Assistance?