AWS Certified Security - Specialty (SCS-C02)
Focused View
8:17:44
92 View
1.1 Introduction.mp4
03:57
1.2 Target Candidate Description.mp4
04:07
1.3 Exam Content.mp4
03:19
1.4 Exam Question Domains.mp4
04:33
1. Learning objecties.mp4
00:34
2.2 Incident Response Preparation.mp4
05:06
2.3 Security Serice Deployment Part 1.mp4
10:57
2.4 Security Serice Deployment Part 2.mp4
06:17
2.5 Question Breakdown.mp4
05:14
2. Learning objecties.mp4
00:35
3.1 Incident Response Detection and Analysis.mp4
02:44
3.2 Alert Sources.mp4
05:00
3.3 Security Alerting Types.mp4
02:45
3.4 Question Breakdown 1.mp4
04:35
3.5 Incident Response Containment.mp4
02:50
3.6 Source, Access, and Destination Containment.mp4
03:43
3.7 Incident Response Eradication.mp4
04:19
3.8 Incident Response Recoery.mp4
03:10
3.9 Incident Response Post-Incident Actiity.mp4
02:18
3.10 Question Breakdown 2.mp4
03:51
3. Learning objecties.mp4
00:44
4.1 CloudWatch Alarms.mp4
04:31
4.2 EentBridge Rules.mp4
04:32
4.3 Security Alert Automation.mp4
01:59
4.4 Question Breakdown 1.mp4
04:26
4.5 Troubleshooting Scenario 1.mp4
05:32
4.6 Troubleshooting Scenario 2.mp4
04:36
4.7 Question Breakdown 2.mp4
04:13
4. Learning objecties.mp4
00:34
5.1 AWS Security Log Sources.mp4
04:48
5.2 Security Log Deliery, Storage, and Retention.mp4
05:45
5.3 Question Breakdown 1.mp4
05:45
5.4 Troubleshooting Logging Permissions.mp4
04:18
5.5 CloudTrail Troubleshooting Scenario.mp4
04:53
5.6 Question Breakdown 2.mp4
04:35
5.7 Log Analysis Options.mp4
10:22
5.8 Question Breakdown 3.mp4
05:11
5. Learning objecties.mp4
00:41
6.1 Edge Security Serices.mp4
08:55
6.2 Defense in Depth Example.mp4
03:41
6.3 Question Breakdown 1.mp4
05:43
6.4 VPC Security.mp4
07:00
6.5 Network Encryption Options.mp4
03:35
6.6 AWS Network Firewall.mp4
05:37
6.7 Question Breakdown 2.mp4
04:42
6. Learning objecties.mp4
00:40
7.1 EC2 Vulnerability Management.mp4
04:04
7.2 Secure Credentials and Secrets.mp4
04:04
7.3 Question Breakdown 1.mp4
03:49
7.4 Network Connectiity Scenarios.mp4
05:50
7.5 Extended Troubleshooting Scenario.mp4
06:48
7.6 Question Breakdown 2.mp4
03:25
7. Learning objecties.mp4
00:49
8.1 Strong Sign-in Mechanisms.mp4
06:04
8.2 Temporary Credentials - Account Federation.mp4
02:40
8.3 Temporary Credentials - Application Federation.mp4
03:11
8.4 Temporary Credentials - Machine Identities.mp4
02:54
8.5 Question Breakdown 1.mp4
04:09
8.6 Store and Use Secrets Securely.mp4
05:21
8.7 Identity Proider Centralization.mp4
01:58
8.8 Audit and Rotate Credentials.mp4
03:23
8.9 User Groups and Attributes.mp4
03:15
8.10 Question Breakdown 2.mp4
04:13
8. Learning objecties.mp4
00:45
9.1 AWS Policy Types.mp4
04:37
9.2 Access Requirements.mp4
02:32
9.3 Permission Policy Elements.mp4
11:26
9.4 AWS Policy Ealuation Logic.mp4
09:37
9.5 Emergency Access Strategies.mp4
04:12
9.6 Question Breakdown 1.mp4
02:52
9.7 Permissions Reduction Strategies.mp4
07:11
9.8 Permissions Guardrails.mp4
02:57
9.9 Access Management Lifecycles.mp4
03:03
9.10 Cross-Account Access.mp4
02:58
9.11 AWS Organizations Sharing.mp4
08:01
9.12 Third-party Sharing.mp4
02:14
9.13 Question Breakdown 2.mp4
04:09
9. Learning objecties.mp4
00:44
10.1 Three Goals of Data Encryption.mp4
02:00
10.2 Network Traffic Encryption Options.mp4
02:11
10.3 Cross-region Data Protection.mp4
03:08
10.4 AWS Certificate Manager.mp4
03:27
10.5 AWS Priate Certificate Authority.mp4
02:39
10.6 In-transit Encryption Enforcement.mp4
02:51
10.7 Question Breakdown.mp4
05:47
10. Learning objecties.mp4
00:44
11.1 Data Integrity Strategies.mp4
02:51
11.2 At-rest Encryption Examples.mp4
03:37
11.3 Symmetric Data Encryption.mp4
03:42
11.4 KMS Features.mp4
04:05
11.5 KMS Key Types.mp4
04:29
11.6 KMS Access Control.mp4
04:38
11.7 Other At-rest Encryption Strategies.mp4
04:45
11.8 Data Modification Preention.mp4
03:40
11.9 Question Breakdown.mp4
04:21
11. Learning objecties.mp4
00:47
12.1 Data Retention Strategies.mp4
06:06
12.2 Data Retention Serices and Features.mp4
05:21
12.3 Question Breakdown 1.mp4
04:13
12.4 KMS Asymmetric Keys.mp4
01:44
12.5 Credential and Secret Rotation.mp4
03:00
12.6 Secrets Manager Access Control.mp4
03:07
12.7 Question Breakdown 2.mp4
03:14
12. Learning objecties.mp4
00:42
13.1 AWS Organizations.mp4
05:27
13.2 AWS Control Tower.mp4
06:43
13.3 Question Breakdown 1.mp4
04:07
13.4 AWS Control Tower Account Factory.mp4
02:07
13.5 AWS Resource Groups.mp4
01:22
13.6 AWS Organizations Tag Policies.mp4
02:57
13.7 AWS Firewall Manager.mp4
02:41
13.8 Resource Access Manager.mp4
03:16
13.9 Question Breakdown 2.mp4
04:00
13. Learning objecties.mp4
00:48
14.1 AWS Macie.mp4
02:46
14.2 AWS Config, CloudWatch Logs, and Security Hub.mp4
02:56
14.3 AWS Audit Manager.mp4
02:41
14.4 Question Breakdown 1.mp4
04:12
14.5 Well-Architected Framework and Tool.mp4
05:50
14.6 Cost Analysis and Anomalies.mp4
05:44
14.7 Question Breakdown 2.mp4
04:02
14. Learning objecties.mp4
00:45
15.1 Documentation.mp4
05:42
15.2 Hands-on Learning.mp4
03:40
15.3 Sample Questions.mp4
03:36
15. Learning objecties.mp4
00:40
Introduction.mp4
03:11
Summary.mp4
00:55
More details
User Reviews
Rating
average 0
Focused display
Category

LiveLessons
View courses LiveLessonsPearson's video training library is an indispensable learning tool for today's competitive job market. Having essential technology training and certifications can open doors for career advancement and life enrichment. We take learning personally. We've published hundreds of up-to-date videos on wide variety of key topics for Professionals and IT Certification candidates. Now you can learn from renowned industry experts from anywhere in the world, without leaving home.
- language english
- Training sessions 128
- duration 8:17:44
- Release Date 2024/07/21