Table of contents
Introduction
26m 5s
Lock icon
Course Introduction | 2m 26s
Lock icon
Exploring the Cloud Playground | 4m 28s
Lock icon
About the Exam | 9m 26s
Lock icon
Using the AWS CLI and AWS SDK | 3m 51s
Lock icon
Shared Responsibility Model | 5m 54s
Threat Detection and Incident Response Domain
2h 39m 31s
Lock icon
Recording AWS Resource Changes with AWS Config | 14m 59s
Lock icon
Demo: Analyzing Environments with AWS Trusted Advisor | 10m 19s
Lock icon
Threat Detection with Amazon GuardDuty | 7m 59s
Lock icon
Demo: Viewing Amazon GuardDuty Findings | 4m 57s
Lock icon
Remediating Amazon GuardDuty Findings | 5m 29s
Lock icon
Demo: Account Checkups with the AWS Health Dashboard | 7m 20s
Lock icon
Assessing EC2 Instances with Amazon Inspector | 9m 29s
Lock icon
Demo: Inspecting EC2 Instances | 6m 49s
Lock icon
Automated Patching Using AWS Systems Manager | 15m 41s
Lock icon
Demo: Incident Response and Recovery with AWS Systems Manager | 10m 44s
Lock icon
Security Compliance Reporting Using AWS Artifact | 5m 41s
Lock icon
Responding to AWS Abuse Notices | 4m 18s
Lock icon
AWS Incident Response | 9m 43s
Lock icon
Amazon Detective | 5m 16s
Lock icon
Section Summary | 10m 47s
Lock icon
Incident Response Within AWSIncident Response in AWS | 30m
Security Logging and Monitoring Domain
4h 54m 16s
Lock icon
Logging and Metrics Using Amazon CloudWatch | 14m 10s
Lock icon
Demo: Sending Custom Logs to CloudWatch | 14m 28s
Lock icon
Using CloudWatch for Resource MonitoringUsing CloudWatch for Resource Monitoring | 30m
Lock icon
Auditing AWS Accounts with AWS CloudTrail | 14m 41s
Lock icon
Demo: Examining CloudTrail Events | 11m 55s
Lock icon
Remediating EC2 Auto Scaling Group Modifications with EventBridgeRemediating EC2 Auto Scaling Group Modifications with EventBridge | 30m
Lock icon
Logging with Amazon Kinesis and Amazon OpenSearch (Elasticsearch) | 11m 2s
Lock icon
Demo: Querying Data with Amazon Athena | 9m 36s
Lock icon
Demo: Enabling VPC Flow Logs Part 1 | 6m 54s
Lock icon
Demo: Enabling VPC Flow Logs Part 2 | 11m 5s
Lock icon
Work with AWS VPC Flow Logs for Network MonitoringWork with AWS VPC Flow Logs for Network Monitoring | 1h 30m
Lock icon
Continuously Auditing AWS with AWS Audit Manager | 9m 23s
Lock icon
Section Summary | 11m 2s
Lock icon
Logging and Monitoring Using AWS ServicesLogging and Monitoring in AWS | 30m
Infrastructure Security Domain
5h 8m 33s
Lock icon
AWS Key Management Service (KMS) Fundamentals | 13m 25s
Lock icon
Implementing Envelope Encryption with AWS KMS | 8m 28s
Lock icon
Demo: Generating Data Keys for Envelope Encryption | 10m 25s
Lock icon
Demo: Multi-Region Keys, Imports, and Deletion with AWS KMS | 8m 22s
Lock icon
Creating and Securing Customer Managed Keys with AWS KMSCreating and Securing Customer Managed Keys with AWS KMS | 30m
Lock icon
Creating More Secure Keys with AWS CloudHSM | 10m 41s
Lock icon
Blocking Malicious Traffic with AWS WAF and AWS Firewall Manager | 14m 55s
Lock icon
Demo: Implementing AWS WAF on Application Load Balancers | 11m 31s
Lock icon
Intrusion Detection and Prevention via AWS Network Firewall | 10m 40s
Lock icon
Locking Down CloudFront Distributions Integrated with Amazon S3 | 13m 7s
Lock icon
Origin Access Control (OAC) | 4m 28s
Lock icon
Configuring an Origin Access Control for an AWS CloudFront DistributionConfiguring an Origin Access Control for an AWS CloudFront Distribution | 30m
Lock icon
Securing HTTP Calls with Lambda@Edge | 10m 35s
Lock icon
Preventing DDoS Attacks with AWS Shield | 6m 48s
Lock icon
Auditing Compromised Resources with AWS Security Hub | 8m 27s
Lock icon
Demo: Exploring Security Scores in AWS Security Hub | 4m 38s
Lock icon
Network Security via VPNs | 8m 33s
Lock icon
Customizing VPCs, Routing, and Security Controls - Part 1 | 8m 26s
Lock icon
Customizing VPCs, Routing, and Security Controls - Part 2 | 10m 51s
Lock icon
Securely Connecting to VPCs | 12m 28s
Lock icon
Private Service Connections via VPC Endpoints | 7m 2s
Lock icon
AWS KMS Key Types | 9m 2s
Lock icon
Web App Attacks | 10m 42s
Lock icon
Section Summary | 14m 59s
Lock icon
Securing Our AWS InfrastructureInfrastructure Security in AWS | 30m
Identity and Access Management Domain
6h 44m
Lock icon
IAM Refresher | 9m 30s
Lock icon
Important AWS Root User Account Concepts | 4m 37s
Lock icon
Exploring AWS Identities - Part 1 | 8m 46s
Lock icon
Exploring AWS Identities - Part 2 | 10m 43s
Lock icon
Granting and Denying Access via IAM Policies | 14m 2s
Lock icon
Interpreting IAM Policies | 13m 13s
Lock icon
Create and Assume Roles in AWSCreate and Assume Roles in AWS | 45m
Lock icon
Demo: Troubleshooting Conflicting IAM Policies | 14m 6s
Lock icon
Demo: Setting Permissions Boundaries | 14m 22s
Lock icon
Demo: Generating IAM Credential Reports | 7m 22s
Lock icon
Create Users and Manage Permissions Using Groups and Policies in IAMCreate Users and Manage Permissions Using Groups and Policies in IAM | 30m
Lock icon
Importance of AWS Security Token Service (STS) | 12m 57s
Lock icon
Demo: Using Different STS Sources | 17m 10s
Lock icon
Using EC2 Roles and Instance Profiles in AWSUsing EC2 Roles and Instance Profiles in AWS | 1h 30m
Lock icon
Using Web Identity Federation | 7m 47s
Lock icon
Creating User Pools and Identity Pools in Amazon Cognito | 10m 47s
Lock icon
Authentication with AWS Directory Service - Part 1 | 10m 18s
Lock icon
Authentication with AWS Directory Service - Part 2 | 10m 21s
Lock icon
Demo: Logging In to AWS via AWS Single Sign-On (SSO) | 11m 59s
Lock icon
Leveraging AWS Organizations for AWS Account Access | 16m
Lock icon
Section Summary | 15m
Lock icon
Identity and Access Management in AWSIdentity and Access Management in AWS | 30m
Data Protection Domain
2h 49m 57s
Lock icon
TLS Certificate Management with AWS Certificate Manager (ACM) | 14m 13s
Lock icon
Secure Elastic Load Balancing (ELB) - Part 1 | 13m 12s
Lock icon
Secure Elastic Load Balancing (ELB) - Part 2 | 5m 20s
Lock icon
Demo: Deploying a TLS-Secured Application Load Balancer | 9m 2s
Lock icon
Demo: Increasing Security within DynamoDB | 9m 59s
Lock icon
Controlling Sensitive Data with Amazon Macie | 9m 44s
Lock icon
Data Lifecycle | 9m 3s
Lock icon
Secure Storage with Amazon S3 | 13m 33s
Lock icon
Advanced S3 Security ConfigurationAdvanced S3 Security Configuration | 30m
Lock icon
Creating a Basic Amazon S3 Lifecycle PolicyCreating a Basic Amazon S3 Lifecycle Policy | 30m
Lock icon
Section Summary | 10m 51s
Lock icon
Protecting Our Data in AWSData Protection in AWS | 15m
Management and Security Governance (and Miscellaneous)
1h 11m 9s
Lock icon
Section Overview | 1m 27s
Lock icon
Controlling Access to Amazon QuickSight | 7m 20s
Lock icon
Demo: Complicated KMS-Related Issues - Recovering Encrypted EBS Volumes | 10m 1s
Lock icon
Parameter Store and Secrets Manager for Sensitive Data | 14m 51s
Lock icon
Filtering and Rejecting EC2 Instance Traffic | 3m 28s
Lock icon
Kinesis Encryption | 5m 2s
Lock icon
Cross-Region Networking | 5m 30s
Lock icon
Section Summary | 8m 30s
Lock icon
Miscellaneous AWS Security Knowledge ReviewMiscellaneous Services and Concepts in AWS | 15m
Conclusion
8h 16m 8s
Lock icon
Congratulations! What's Next? | 1m 8s
Lock icon
AWS Certified Security - Specialty 2022AWS Certified Security – Specialty SCS-C02: Exam 1 | 2h 45m
Lock icon
AWS Certified Security - Specialty 2022 BAWS Certified Security – Specialty SCS-C02: Exam 2 | 2h 45m
Lock icon
AWS Certified Security - Specialty 2022 CAWS Certified Security – Specialty SCS-C02: Exam 3 | 2h 45m
About the author
Andru Estes
Andru has been working within the IT industry for just under 15 years. He started off in Systems Administration and Systems Engineering within virtualization platforms like VMware and Hyper-V. Soon after that, he began his journey into the public cloud, where he quickly dove headfirst into AWS and Azure.
After working as a Cloud Architect and Consultant for the past 7 years, Andru found his other passion in being able to help students learn about the public cloud and general DevOps methodologies. If it involves public cloud, DevOps, or Python, then Andru is all about it!
More Courses by Andru E.
Get access now
Sign up to get immediate access to this course plus thousands more you can watch anytime, anywhere
Cancel
Close button icon