AWS Certified Security – Specialty (SCS-C01) Certification Training
Categories: All Courses, Cybersecurity Certifications

About Course
The AWS Certified Security – Specialty (SCS-C01) Certification Training equips individuals with advanced skills in securing applications and data within the Amazon Web Services (AWS) environment. This comprehensive course covers various security aspects, including identity and access management, encryption, incident response, and compliance. Participants gain expertise in designing and implementing secure solutions, assessing risk, and protecting AWS resources from potential threats. Successful completion of the certification validates proficiency in securing AWS workloads, making certified individuals valuable assets in safeguarding cloud infrastructures and data.
What Will You Learn?
- 1. Expertise
- 2. Career Advancement
- 3. Industry Recognition
- 4. Security Mastery
- 5. Hands-On Experience
- 6. Networking Opportunities
- 7. Enhanced Security
Course Content
Module 1
-
1.01 Cloud Security fundamentals
08:46 -
1.02, 1.03, 1.04 AWS security model, Shared Responsibility, Exam outline
07:49 -
Quiz Module- 01
-
Section 1: Short Answer Questions
-
Section 2: Scenario-Based Questions
-
Section 3: Practical Task
Module 2
-
2.01 Given an AWS abuse notice, evaluate the suspected compromised instance or exposed access keys
05:14 -
2.02 Preparation stages for incident response
06:40 -
2.03 Mitigation steps to perform Incident response steps
06:48 -
2.04 Verify that the Incident Response plan includes relevant AWS services
03:33 -
2.05 Dealing with exposed access keys
05:27 -
2.06 Evaluated suspected compromised EC2 Instances
04:57 -
2.07 Evaluate the configuration of automated alerting, and execute possible remediation of security-related incidents and emerging issues
07:19 -
2.08 AWS Guard duty
04:59 -
2.09 Penetration testing
09:02 -
Quiz Module- 02
-
Section 1: Short Answer Questions
-
Section 2: Scenario-Based Questions
-
Section 3: Practical Task
Module 3
-
3.01,3.02 Design and implement security monitoring and alerting, Design and implement a logging solution
05:45 -
3.03, 3.04 Continuous Security Monitoring, Introduction to Vulnerability Assessment
09:17 -
3.05, 3.06 AWS Inspector, AWS Inspector Assessment targets
08:51 -
3.07 AWS EC2 systems manager
05:15 -
3.08 AWS Config (1)
05:00 -
3.09 Understanding CloudWatch
05:30 -
3.10 VPC Flow Logs
09:35 -
3.11 CloudWatch Events
05:48 -
3.12 AWS Cloud Trail
05:23 -
3.13 AWS Macie
05:50 -
3.14 AWS Detective
04:19 -
3.15 AWS Security Hub
04:40 -
3.16 S3 Event notifications
05:26 -
3.17 Trusted advisor recommendations
05:28 -
3.18, 3.19 Troubleshoot security monitoring and alerting, Troubleshoot logging solutions
04:57 -
Quiz Module- 03
Module 4
-
4.01 Design edge security on AWS
04:42 -
4.02 Design and implement a secure network infrastructure
05:33 -
4.03 AWS Organizations
06:40 -
4.04 Managing OUs
05:45 -
4.05 CloudFront
05:49 -
4.06 AWS CloudFront Custom SSL
06:43 -
4.07 Firewalls
06:08 -
4.08 Security groups
05:58 -
4.09 Network ACLs
05:48 -
4.10 IPS-IDS concepts in cloud
06:29 -
4.11 AWS Web Application Firewall (WAF)
05:15 -
4.12 AWS Shield concepts
06:30 -
4.13 DDoS Mitigation
07:28 -
4.14 Network Segmentation
07:15 -
4.15 Bastion Hosts
06:03 -
4.16 Virtual Private Cloud (VPC)
06:19 -
4.17 VPC Endpoints
04:09 -
4.18, 4.19 EC2 Tenancy, Compliance Frameworks
06:44 -
4.20 AWS lambda fundamentals
06:14 -
4.21 AWS Simple Email Service
04:19 -
4.22 AWS Route53 DNS
06:51 -
4.23 Troubleshoot a secure network infrastructure
05:41 -
4.24 Design and implement host-based security
04:43
Module 5
-
5.01 Design and implement a scalable authorization and authentication system to access AWS resources.
05:42 -
5.02 Understand the Principle of Least Privilege
05:36 -
5.03 IAM Policies
07:56 -
5.04 IAM JSON Policy Elements
05:52 -
5.05 IAM Roles
06:11 -
5.06 IAM Permission boundaries
05:53 -
5.07 Evaluating effective permissions
03:42 -
5.08 Understanding Delegation
05:33 -
5.09 Cross account policies & roles
06:16 -
5.10 Understanding Federation
05:09 -
5.11 AWS Directory services
05:55 -
5.12 AWS Organizations
06:53 -
5.13 Single Sign-On
05:47 -
5.14 SAML Overview Concepts
08:05 -
5.15 S3 Security
06:06 -
5.16 Cross Account S3 access
05:39 -
5.17, 5.18 S3 Versioning, S3 MFA delete
08:29 -
5.19 AWS License manager
05:58 -
5.20 Troubleshoot an authorization and authentication system to access AWS resources
06:30
Module 6
-
6.01 Design and implement key management and use
05:51 -
6.02 Cryptography fundamentals
06:21 -
6.03 Cloud Hardware Security Module (HSM)
06:59 -
6.04 AWS Key Management Service (KMS)
08:04 -
6.05 Envelope Encryption
08:13 -
6.06 KMS Authentication and Access Control
06:34 -
6.07 CloudTrail and Encryption
08:52 -
6.08 EBS Architecture and Secure Data Wiping
06:13 -
6.09 S3 Encryption
05:35 -
6.10 AWS Certificate Manager
07:21 -
6.11 ELB- ALB and NLB
09:03 -
6.12 Docker and container security fundamentals
08:19 -
6.13 AWS Glacier
06:28 -
6.14 Troubleshoot key management
09:16 -
6.15 Design and implement a data encryption solution for data at rest and data in transit
06:43