AWS Certified Security - Specialty (SCS-C01)
Focused View
13:00:32
184 View
001 Course Introduction.mp4
02:26
002 Exploring the Cloud Playground.mp4
04:27
003 About the Exam.mp4
09:46
004 Using the AWS CLI and AWS SDK.mp4
03:50
005 Shared Responsibility Model.mp4
05:53
001 AWS IAM.html
001 AWS IAM Identity Center (AWS SSO).html
001 IAM Refresher.mp4
09:29
002 Important AWS Root User Account Concepts.mp4
04:36
003 Exploring AWS Identities - Part 1.mp4
08:45
004 Exploring AWS Identities - Part 2.mp4
10:42
005 Granting and Denying Access via IAM Policies.mp4
14:01
005 Policies and permissions in IAM.html
006 Interpreting IAM Policies.mp4
13:12
008 Demo Troubleshooting Conflicting IAM Policies.mp4
14:05
008 Understanding permissions granted by a policy.html
009 Demo Setting Permissions Boundaries.mp4
14:21
009 Permissions boundaries for IAM entities.html
010 Demo Generating IAM Credential Reports.mp4
07:21
010 Getting credential reports for your AWS account.html
012 Using temporary credentials with AWS resources.html
012 Welcome to the AWS Security Token Service API Reference.html
013 Demo Using Different STS Sources.mp4
17:09
015 About web identity federation.html
015 Using Web Identity Federation.mp4
07:46
016 Amazon Cognito identity pools (federated identities).html
016 Amazon Cognito user pools.html
016 Creating User Pools and Identity Pools in Amazon Cognito.mp4
10:46
017 AWS Directory Service.html
017 Authentication with AWS Directory Service - Part 1.mp4
10:17
018 Authentication with AWS Directory Service - Part 2.mp4
10:20
019 Demo Logging In to AWS via AWS Single Sign-On (SSO).mp4
11:58
020 Getting started with AWS Organizations.html
020 Leveraging AWS Organizations for AWS Account Access.mp4
15:59
021 Section Summary.mp4
17:31
1679069075047-resources.zip
1679069603036-resources.zip
001 CloudWatch agent.html
001 Common scenarios with the CloudWatch agent.html
001 Logging and Metrics Using Amazon CloudWatch.mp4
14:24
002 Demo Sending Custom Logs to CloudWatch.mp4
14:27
004 Auditing AWS Accounts with AWS CloudTrail.mp4
14:40
004 CloudTrail concepts.html
004 CloudTrail supported services and integrations.html
005 Demo Examining CloudTrail Events.mp4
11:54
006 Example Tutorials for Amazon Kinesis Data Streams.html
006 Loading streaming data from Amazon Kinesis Data Stream.txt
006 Logging with Amazon Kinesis and Amazon OpenSearch (Elasticsearch).mp4
11:01
006 OpenSearch Loading streaming data from Amazon Kinesis Data Firehose.txt
006 OpenSearch Service Destination.txt
006 Sending VPC Flow Logs to Splunk.html
006 Subscription filters with Amazon Kinesis Data Firehose.txt
007 Demo Querying Data with Amazon Athena.mp4
09:35
007 Table location in Amazon S3.html
008 Demo Enabling VPC Flow Logs Part 1.mp4
06:53
009 Demo Enabling VPC Flow Logs Part 2.mp4
11:04
011 AWS Audit Manager concepts and terminology.html
011 Assessments in AWS Audit Manager.html
011 Continuously Auditing AWS with AWS Audit Manager.mp4
09:22
012 Section Summary.mp4
11:00
1678996075614-1062-S03-L02.zip
1678996175654-S03 L07 Demo Querying Data With Amazon Athena.zip
001 Concepts.html
001 Evaluating Resources with AWS Config Rules.html
001 Multi-Account Multi-Region Data Aggregation.html
001 Recording AWS Resource Changes with AWS Config.mp4
14:58
001 Remediating Noncompliant Resources with AWS Config Rules.html
001 Viewing AWS Resource Configurations and History.html
003 AWS Trusted Advisor.html
003 AWS Trusted Advisor check reference.html
003 Demo Analyzing Environments with AWS Trusted Advisor.mp4
10:18
003 Organizational view for AWS Trusted Advisor.html
003 Viewing AWS Security Hub controls in AWS Trusted Advisor.html
004 Concepts and terminology.html
004 Finding types.html
004 Foundational data sources.html
004 Managing Amazon GuardDuty findings.html
004 Managing multiple accounts in Amazon GuardDuty.html
004 Threat Detection with Amazon GuardDuty.mp4
07:58
005 Demo Viewing Amazon GuardDuty Findings.mp4
04:56
006 Remediating Amazon GuardDuty Findings.mp4
05:28
006 Remediating security issues discovered by GuardDuty.html
007 Concepts for AWS Health.html
007 Demo Account Checkups with the AWS Health Dashboard.mp4
07:19
007 Monitoring AWS Health events with Amazon EventBridge.html
008 Amazon EventBridge event schema for Amazon Inspector events.html
008 Assessing EC2 Instances with Amazon Inspector.mp4
09:28
008 Designating a delegated administrator for Amazon Inspector.html
008 Managing multiple accounts in Amazon Inspector with AWS Organizations.html
008 Understanding findings in Amazon Inspector.html
009 Demo Inspecting EC2 Instances.mp4
06:48
010 AWS Systems Manager Patch Manager.html
010 AWS Systems Manager Patch Manager walkthroughs.html
010 About patch baselines.html
010 Automated Patching Using AWS Systems Manager.mp4
15:40
011 Demo Incident Response and Recovery with AWS Systems Manager.mp4
10:43
012 Downloading reports in AWS Artifact.html
012 Managing agreements in AWS Artifact.html
012 Security Compliance Reporting Using AWS Artifact.mp4
05:40
012 What is AWS Artifact.html
013 Responding to AWS Abuse Notices.mp4
04:17
014 Section Summary.mp4
09:48
1676645782541-1062-S04-L10-Demo.zip
001 AWS KMS concepts.html
001 AWS Key Management Service (KMS) Fundamentals.mp4
13:24
001 Condition keys for AWS KMS.html
001 Deleting AWS KMS keys.html
001 Grants in AWS KMS.html
001 Key policies in AWS KMS.html
001 Managing keys.html
001 Rotating AWS KMS keys.html
001 Special-purpose keys.html
001 Using IAM policies with AWS KMS.html
002 Data keys.txt
002 Data key pairs.txt
002 Envelope encryption.txt
002 Implementing Envelope Encryption with AWS KMS.mp4
08:27
003 Demo Generating Data Keys for Envelope Encryption.mp4
10:24
004 Custom key stores.html
004 Demo Multi-Region Keys Imports and Deletion with AWS KMS.mp4
08:21
004 Importing key material in AWS KMS keys.html
004 Key material origin.txt
006 AWS CloudHSM Client SDKs.html
006 AWS CloudHSM command line tools.html
006 AWS CloudHSM use cases.html
006 Best practices for AWS CloudHSM.html
006 Creating More Secure Keys with AWS CloudHSM.mp4
10:40
006 Integrating third-party applications with AWS CloudHSM.html
007 Blocking Malicious Traffic with AWS WAF and AWS Firewall Manager.mp4
14:54
007 Customized web requests and responses in AWS WAF.html
007 Getting started with AWS Firewall Manager policies.html
007 How AWS WAF works with Amazon CloudFront features.html
007 IP sets and regex pattern sets.html
007 Rules.html
007 Rule groups.html
007 Web access control lists (web ACLs).html
007 Working with AWS Firewall Manager policies.html
008 Demo Implementing AWS WAF on Application Load Balancers.mp4
11:30
009 AWS Network Firewall example architectures with routing.html
009 Firewalls in AWS Network Firewall.html
009 Firewall behavior in AWS Network Firewall.html
009 Firewall policies in AWS Network Firewall.html
009 Intrusion Detection and Prevention via AWS Network Firewall.mp4
10:39
009 Rule groups in AWS Network Firewall.html
010 Locking Down CloudFront Distributions Integrated with Amazon S3.mp4
13:06
010 Using an Amazon S3 bucket.txt
010 Using custom URLs by adding alternate domain names (CNAMEs).html
012 Customizing at the edge with CloudFront Functions.html
012 Customizing at the edge with LambdaEdge.html
012 Restrictions on edge functions.html
012 Securing HTTP Calls with LambdaEdge.mp4
10:34
013 AWS Shield Advanced capabilities and options.html
013 AWS Shield Advanced overview.html
013 AWS Shield Advanced protected resources.html
013 AWS Shield Standard overview.html
013 Deciding whether to subscribe to AWS Shield Advanced and apply additional protections.html
013 Examples of basic DDoS resilient architectures.html
013 Preventing DDoS Attacks with AWS Shield.mp4
06:47
013 Responding to DDoS events.html
014 Auditing Compromised Resources with AWS Security Hub.mp4
08:26
015 Demo Exploring Security Scores in AWS Security Hub.mp4
04:37
016 AWS Client VPN.txt
016 AWS Site-to-Site VPN.html
016 AWS VPN CloudHub.html
016 Connect your VPC to remote networks using AWS Virtual Private Network.html
016 Network Security via VPNs.mp4
08:32
016 Third party software VPN appliance.txt
017 Configure Route Tables.html
017 Customizing VPCs Routing and Security Controls - Part 1.mp4
08:25
017 DHCP option sets in Amazon VPC.html
017 Middlebox routing.html
017 Subnets for your VPC.html
017 Work with AWS-managed prefix lists.html
017 Work with customer-managed prefix lists.html
018 Customizing VPCs Routing and Security Controls - Part 2.mp4
10:50
019 Compare NAT gateways and NAT instances.html
019 Connect VPCs using VPC peering.html
019 Connect to the internet using an internet gateway.html
019 Outbound IPv6 traffic using an egress-only internet gateway.html
019 Securely Connecting to VPCs.mp4
12:27
019 VPC peering limitations.txt
020 Private Service Connections via VPC Endpoints.mp4
07:01
020 VPC Endpoint Services.html
022 Section Summary.mp4
14:38
1679069603036-resources.zip
001 Importing certificates into AWS Certificate Manager.html
001 Installing ACM certificates.html
001 Managed renewal for ACM certificates.html
001 Planning your AWS Private CA deployment.html
001 Private CA Certificate administration.html
001 Requesting a public certificate.html
001 Services integrated with AWS Certificate Manager.html
001 Supported Regions.html
001 TLS Certificate Management with AWS Certificate Manager (ACM).mp4
14:12
001 Validating domain ownership.html
002 Access logs for your Application Load Balancer.html
002 Authenticate users using an Application Load Balancer.html
002 Create an HTTPS listener for your Application Load Balancer.html
002 HTTP headers and Application Load Balancers.html
002 Secure Elastic Load Balancing (ELB) - Part 1.mp4
13:11
002 TLS listeners for your Network Load Balancer.html
003 Secure Elastic Load Balancing (ELB) - Part 2.mp4
05:19
003 What is a Gateway Load Balancer.html
004 Demo Deploying a TLS-Secured Application Load Balancer.mp4
09:01
005 DAX encryption at rest.html
005 DAX encryption in transit.html
005 Demo Increasing Security within DynamoDB.mp4
09:58
005 DynamoDB Encryption at Rest.html
005 Internetwork traffic privacy.html
006 Analyzing your Amazon S3 security posture with Amazon Macie.html
006 Controlling Sensitive Data with Amazon Macie.mp4
09:43
006 Discovering sensitive data with Amazon Macie.html
006 How Amazon Macie monitors Amazon S3 data security.html
006 Managing multiple Amazon Macie accounts.html
007 AWS PrivateLink for Amazon S3.html
007 Amazon S3 CloudTrail events.html
007 Blocking public access to your Amazon S3 storage.html
007 Managing data access with Amazon S3 access points.html
007 Protecting data using encryption.html
007 S3 Glacier Vault Lock.html
007 Secure Storage with Amazon S3.mp4
13:32
007 Setting default server-side encryption behavior for Amazon S3 buckets.html
007 Using S3 Object Lock.html
007 Using bucket policies.html
009 Section Summary.mp4
09:11
001 Section Overview.mp4
01:33
002 Controlling Access to Amazon QuickSight.mp4
07:19
002 Creating a dataset using Amazon Athena data.html
002 Run queries as an IAM role in Amazon QuickSight.html
002 Using column-level security (CLS) to restrict access to a dataset.html
002 Using row-level security (RLS) restrict access to a dataset for anonymous users.html
003 Demo Complicated KMS-Related Issues - Recovering Encrypted EBS Volumes.mp4
10:00
004 AWS Secrets Manager tutorials.html
004 AWS services that use AWS Secrets Manager secrets.html
004 An Inside Look At AWS Secrets Manager vs AWS Systems Manager Parameter Store.txt
004 Assigning parameter policies.html
004 Auditing and logging Parameter Store activity.html
004 Parameter Store and Secrets Manager for Sensitive Data.mp4
14:50
004 Rotate AWS Secrets Manager secrets.html
004 Secret encryption and decryption in AWS Secrets Manager.html
005 Filtering and Rejecting EC2 Instance Traffic.mp4
03:27
006 Data Encryption in Kinesis Data Analytics.txt
006 Kinesis Encryption.mp4
05:01
006 Server-Side Encryption with Direct PUT or Other Data Sources.txt
006 Server-Side Encryption with Kinesis Data Streams as the Data Source.txt
006 What Is Server-Side Encryption for Kinesis Data Streams.html
007 Section Summary.mp4
07:01
1679069999316-resources.zip
001 Congratulations Whats Next.mp4
01:11
More details
User Reviews
Rating
average 0
Focused display

Acloud Guru
View courses Acloud GuruA Cloud Guru is an online training platform for people interested in Information Technology. Most of the courses offered prepare students to take certification exams for the three major cloud providers.
- language english
- Training sessions 80
- duration 13:00:32
- English subtitles has
- Release Date 2023/05/15