Companies Home Search Profile

AWS Certified Security - Specialty (SCS-C02)

Focused View

8:17:44

92 View
  • 1.1 Introduction.mp4
    03:57
  • 1.2 Target Candidate Description.mp4
    04:07
  • 1.3 Exam Content.mp4
    03:19
  • 1.4 Exam Question Domains.mp4
    04:33
  • 1. Learning objecties.mp4
    00:34
  • 2.2 Incident Response Preparation.mp4
    05:06
  • 2.3 Security Serice Deployment Part 1.mp4
    10:57
  • 2.4 Security Serice Deployment Part 2.mp4
    06:17
  • 2.5 Question Breakdown.mp4
    05:14
  • 2. Learning objecties.mp4
    00:35
  • 3.1 Incident Response Detection and Analysis.mp4
    02:44
  • 3.2 Alert Sources.mp4
    05:00
  • 3.3 Security Alerting Types.mp4
    02:45
  • 3.4 Question Breakdown 1.mp4
    04:35
  • 3.5 Incident Response Containment.mp4
    02:50
  • 3.6 Source, Access, and Destination Containment.mp4
    03:43
  • 3.7 Incident Response Eradication.mp4
    04:19
  • 3.8 Incident Response Recoery.mp4
    03:10
  • 3.9 Incident Response Post-Incident Actiity.mp4
    02:18
  • 3.10 Question Breakdown 2.mp4
    03:51
  • 3. Learning objecties.mp4
    00:44
  • 4.1 CloudWatch Alarms.mp4
    04:31
  • 4.2 EentBridge Rules.mp4
    04:32
  • 4.3 Security Alert Automation.mp4
    01:59
  • 4.4 Question Breakdown 1.mp4
    04:26
  • 4.5 Troubleshooting Scenario 1.mp4
    05:32
  • 4.6 Troubleshooting Scenario 2.mp4
    04:36
  • 4.7 Question Breakdown 2.mp4
    04:13
  • 4. Learning objecties.mp4
    00:34
  • 5.1 AWS Security Log Sources.mp4
    04:48
  • 5.2 Security Log Deliery, Storage, and Retention.mp4
    05:45
  • 5.3 Question Breakdown 1.mp4
    05:45
  • 5.4 Troubleshooting Logging Permissions.mp4
    04:18
  • 5.5 CloudTrail Troubleshooting Scenario.mp4
    04:53
  • 5.6 Question Breakdown 2.mp4
    04:35
  • 5.7 Log Analysis Options.mp4
    10:22
  • 5.8 Question Breakdown 3.mp4
    05:11
  • 5. Learning objecties.mp4
    00:41
  • 6.1 Edge Security Serices.mp4
    08:55
  • 6.2 Defense in Depth Example.mp4
    03:41
  • 6.3 Question Breakdown 1.mp4
    05:43
  • 6.4 VPC Security.mp4
    07:00
  • 6.5 Network Encryption Options.mp4
    03:35
  • 6.6 AWS Network Firewall.mp4
    05:37
  • 6.7 Question Breakdown 2.mp4
    04:42
  • 6. Learning objecties.mp4
    00:40
  • 7.1 EC2 Vulnerability Management.mp4
    04:04
  • 7.2 Secure Credentials and Secrets.mp4
    04:04
  • 7.3 Question Breakdown 1.mp4
    03:49
  • 7.4 Network Connectiity Scenarios.mp4
    05:50
  • 7.5 Extended Troubleshooting Scenario.mp4
    06:48
  • 7.6 Question Breakdown 2.mp4
    03:25
  • 7. Learning objecties.mp4
    00:49
  • 8.1 Strong Sign-in Mechanisms.mp4
    06:04
  • 8.2 Temporary Credentials - Account Federation.mp4
    02:40
  • 8.3 Temporary Credentials - Application Federation.mp4
    03:11
  • 8.4 Temporary Credentials - Machine Identities.mp4
    02:54
  • 8.5 Question Breakdown 1.mp4
    04:09
  • 8.6 Store and Use Secrets Securely.mp4
    05:21
  • 8.7 Identity Proider Centralization.mp4
    01:58
  • 8.8 Audit and Rotate Credentials.mp4
    03:23
  • 8.9 User Groups and Attributes.mp4
    03:15
  • 8.10 Question Breakdown 2.mp4
    04:13
  • 8. Learning objecties.mp4
    00:45
  • 9.1 AWS Policy Types.mp4
    04:37
  • 9.2 Access Requirements.mp4
    02:32
  • 9.3 Permission Policy Elements.mp4
    11:26
  • 9.4 AWS Policy Ealuation Logic.mp4
    09:37
  • 9.5 Emergency Access Strategies.mp4
    04:12
  • 9.6 Question Breakdown 1.mp4
    02:52
  • 9.7 Permissions Reduction Strategies.mp4
    07:11
  • 9.8 Permissions Guardrails.mp4
    02:57
  • 9.9 Access Management Lifecycles.mp4
    03:03
  • 9.10 Cross-Account Access.mp4
    02:58
  • 9.11 AWS Organizations Sharing.mp4
    08:01
  • 9.12 Third-party Sharing.mp4
    02:14
  • 9.13 Question Breakdown 2.mp4
    04:09
  • 9. Learning objecties.mp4
    00:44
  • 10.1 Three Goals of Data Encryption.mp4
    02:00
  • 10.2 Network Traffic Encryption Options.mp4
    02:11
  • 10.3 Cross-region Data Protection.mp4
    03:08
  • 10.4 AWS Certificate Manager.mp4
    03:27
  • 10.5 AWS Priate Certificate Authority.mp4
    02:39
  • 10.6 In-transit Encryption Enforcement.mp4
    02:51
  • 10.7 Question Breakdown.mp4
    05:47
  • 10. Learning objecties.mp4
    00:44
  • 11.1 Data Integrity Strategies.mp4
    02:51
  • 11.2 At-rest Encryption Examples.mp4
    03:37
  • 11.3 Symmetric Data Encryption.mp4
    03:42
  • 11.4 KMS Features.mp4
    04:05
  • 11.5 KMS Key Types.mp4
    04:29
  • 11.6 KMS Access Control.mp4
    04:38
  • 11.7 Other At-rest Encryption Strategies.mp4
    04:45
  • 11.8 Data Modification Preention.mp4
    03:40
  • 11.9 Question Breakdown.mp4
    04:21
  • 11. Learning objecties.mp4
    00:47
  • 12.1 Data Retention Strategies.mp4
    06:06
  • 12.2 Data Retention Serices and Features.mp4
    05:21
  • 12.3 Question Breakdown 1.mp4
    04:13
  • 12.4 KMS Asymmetric Keys.mp4
    01:44
  • 12.5 Credential and Secret Rotation.mp4
    03:00
  • 12.6 Secrets Manager Access Control.mp4
    03:07
  • 12.7 Question Breakdown 2.mp4
    03:14
  • 12. Learning objecties.mp4
    00:42
  • 13.1 AWS Organizations.mp4
    05:27
  • 13.2 AWS Control Tower.mp4
    06:43
  • 13.3 Question Breakdown 1.mp4
    04:07
  • 13.4 AWS Control Tower Account Factory.mp4
    02:07
  • 13.5 AWS Resource Groups.mp4
    01:22
  • 13.6 AWS Organizations Tag Policies.mp4
    02:57
  • 13.7 AWS Firewall Manager.mp4
    02:41
  • 13.8 Resource Access Manager.mp4
    03:16
  • 13.9 Question Breakdown 2.mp4
    04:00
  • 13. Learning objecties.mp4
    00:48
  • 14.1 AWS Macie.mp4
    02:46
  • 14.2 AWS Config, CloudWatch Logs, and Security Hub.mp4
    02:56
  • 14.3 AWS Audit Manager.mp4
    02:41
  • 14.4 Question Breakdown 1.mp4
    04:12
  • 14.5 Well-Architected Framework and Tool.mp4
    05:50
  • 14.6 Cost Analysis and Anomalies.mp4
    05:44
  • 14.7 Question Breakdown 2.mp4
    04:02
  • 14. Learning objecties.mp4
    00:45
  • 15.1 Documentation.mp4
    05:42
  • 15.2 Hands-on Learning.mp4
    03:40
  • 15.3 Sample Questions.mp4
    03:36
  • 15. Learning objecties.mp4
    00:40
  • Introduction.mp4
    03:11
  • Summary.mp4
    00:55
  • More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Pearson's video training library is an indispensable learning tool for today's competitive job market. Having essential technology training and certifications can open doors for career advancement and life enrichment. We take learning personally. We've published hundreds of up-to-date videos on wide variety of key topics for Professionals and IT Certification candidates. Now you can learn from renowned industry experts from anywhere in the world, without leaving home.
    • language english
    • Training sessions 128
    • duration 8:17:44
    • Release Date 2024/07/21