Buy Linuxacademy – AWS Certified Security-Specialty Certification Course at GBesy. We actively participate in Groupbuys and are committed to sharing knowledge with a wider audience. Rest assured, the quality of our courses matches that of the original sale page. If you prefer, you can also buy directly from the sale page at the full price (the SALEPAGE link is directly provided in the post).
The AWS Certified Security Specialty is a certification based around securing applications in AWS. It is one one three specialty certifications offered by AWS File size: 10.52 GB
Linuxacademy – AWS Certified Security-Specialty Certification course with special price just for you: $449 $61
Linuxacademy – AWS Certified Security-Specialty Certification
Course Details
The AWS Certified Security Specialty is a certification based around securing applications in AWS. It is one one three specialty certifications offered by AWS. The certification focuses on five components or domains when designing and operating security in the cloud. These are:
Identity and Access Management Detective Controls Infrastructure Protection Data Protection Incident Response
This course has been developed to provide you with the requisite knowledge to not only pass the AWS Certified Security Specialty certification exam but also gain the hands-on experience required to become a qualified AWS security specialist working in a real-world environment.
Please connect with us at slack.linuxacademy.com in the #security channel if you have questions or feedback.
Syllabus
Course Introduction
Getting Started
Get Linuxacademy – AWS Certified Security-Specialty Certification download
Course Introduction
00:02:49
About the Training Architect
00:02:15
Introduction to the Security Runbook Interactive Diagram
00:04:39
Course Features and Tools
00:11:02
Domain 1 : Incident Response
Domain 1 – Introduction
Domain 1 – Introduction
00:06:12
1.1 – Given an AWS Abuse Notice, Evaluate a Suspected Compromised Instance or Exposed Access Keys
AWS Abuse Notification
00:17:04
Responding to AWS Abuse Notifications
00:15:18
Hands-on Labs are real live environments that put you in a real scenario to practice what you have learned without any other extra charge or account to manage.
Performing a Source Code Security Scan Using git-secrets in AWS
00:30:00
AWS Abuse Notification
00:15:00
1.2 Verify that the Incident Response plan includes relevant AWS services.
What is Incident Response?
00:08:20
Incident Response Framework: Part 1
00:21:50
Incident Response Framework: Part 2
00:13:35
Incident Response Plan
00:15:00
1.3 Evaluate the Configuration of Automated Alerting and Execute Possible Remediation of Security-Related Incidents and Emerging Issues
Automated Alerting
00:30:08
Automated Incident Response
00:12:02
CloudTrail Automation Example
00:11:10
Hands-on Labs are real live environments that put you in a real scenario to practice what you have learned without any other extra charge or account to manage.
Enabling AWS VPC Flow Logs with Automation
00:45:00
Domain 2 : Logging and Monitoring
Domain 2 – Introduction
Logging and Monitoring Introduction
00:02:02
2.1 Design and implement security monitoring and alerting.
S3 Events
00:18:59
CloudWatch Logs: Metric Filters and Custom Metrics
00:14:11
CloudWatch Events
00:20:40
Multi-Account: CloudWatch Event Buses
00:14:45
AWS Config
00:23:20
AWS Inspector
00:21:33
Hands-on Labs are real live environments that put you in a real scenario to practice what you have learned without any other extra charge or account to manage.
Automatic Resource Remediation with AWS Config
01:30:00
Hands-on Labs are real live environments that put you in a real scenario to practice what you have learned without any other extra charge or account to manage.
Automatic Remediation of Inspector Findings in AWS
01:30:00
Design, Implement, and Troubleshoot Monitoring and Alerting
00:45:00
2.2 Troubleshoot security monitoring and alerting.
Troubleshoot CloudWatch Events
00:18:05
Hands-on Labs are real live environments that put you in a real scenario to practice what you have learned without any other extra charge or account to manage.
Troubleshooting a Detection, Alerting, and Response Workflow in AWS
01:00:00
2.3 Design and Implement a Logging Solution
CloudTrail Logging
00:22:51
CloudWatch Logs: CloudTrail
00:14:14
CloudWatch Logs: VPC Flow Logs
00:16:59
CloudWatch Logs: Agent for EC2
00:22:47
CloudWatch Logs: DNS Query Logs
00:09:46
S3 Access Logs
00:10:18
Multi-Account: Centralized Logging
00:22:04
2.4 Troubleshoot Logging Solutions
Troubleshoot Logging
00:25:39
Multi-Account: Troubleshoot Logging
00:11:24
Hands-on Labs are real live environments that put you in a real scenario to practice what you have learned without any other extra charge or account to manage.
Troubleshooting CloudTrail and S3 Logging Issues in AWS
00:30:00
Domain 3: Infrastructure Security
3.1 Design Edge Security on AWS
CloudFront
00:31:30
Restricting S3 to CloudFront
00:11:11
Signed URLs and Cookies
00:26:44
CloudFront Geo Restriction
00:09:27
Forcing S3 Encryption
00:14:18
S3 Cross Region Replication (CRR) – Security
00:17:10
Web Application Firewall (WAF) and AWS Shield
00:23:07
Hands-on Labs are real live environments that put you in a real scenario to practice what you have learned without any other extra charge or account to manage.
Blocking Web Traffic with WAF in AWS
00:30:00
3.2 Design and implement a secure network infrastructure.
VPC Design and Security
00:20:51
Security Groups
00:22:12
Network Access Control Lists (NACLs)
00:18:42
VPC Peering
00:35:23
VPC Endpoints
00:30:22
Serverless Security
00:10:23
NAT Gateways
00:13:30
Egress-Only Internet Gateways
00:13:44
Bastion Hosts / Jump Boxes
00:09:06
Hands-on Labs are real live environments that put you in a real scenario to practice what you have learned without any other extra charge or account to manage.
Configuring Layered Security in an AWS VPC
00:30:00
3.3 Troubleshoot a secure network infrastructure.
Troubleshoot a VPC
00:15:27
3.4 Design and implement host-based security.
AWS Host/Hypervisor Security (disk/memory)
00:10:53
Host Proxy Servers
00:05:42
Host-Based IDS/IPS
00:09:13
Systems Manager
00:18:02
Packet Capture on EC2
00:09:28
Hands-on Labs are real live environments that put you in a real scenario to practice what you have learned without any other extra charge or account to manage.
Install an Intrusion Prevention System (IPS) on an EC2 Instance
00:30:00
Identity and Access Management
4.1 Design and Implement a Scalable Authorization and Authentication System to Access AWS Resources.
IAM Policies
00:25:18
Users, Groups, and Roles
00:29:14
Permission Boundaries and Policy Evaluation
00:17:21
Organizations and Service Control Policies
00:18:57
Resource Policies: S3 Bucket Policies
00:15:38
Resource Policies: KMS Key Policies
00:13:39
Cross-Account Access to S3 Buckets and Objects
00:17:53
Identity Federation
00:22:40
AWS Systems Manager Parameter Store
00:18:24
4.2 Troubleshoot an Authorization and Authentication System to Access AWS Resources.
Troubleshooting Permissions Union (IAM//RESOURCE//ACL)
00:09:44
Troubleshooting Cross-Account Roles
00:12:57
Troubleshooting Identity Federation
00:05:52
Troubleshooting KMS CMK’s
00:07:20
Data Protection
5.1 Design and implement key management and use.
Key Management System (KMS)
00:28:11
KMS in a Multi-Account Configuration
00:08:24
CloudHSM
00:17:05
5.2 Troubleshoot key management.
Troubleshooting KMS Permissions
00:08:29
KMS Limits
00:10:44
Hands-on Labs are real live environments that put you in a real scenario to practice what you have learned without any other extra charge or account to manage.
Troubleshoot KMS Key Policies
00:30:00
5.3 Design and implement a data encryption solution for data at rest and data in transit.
Data At Rest: KMS
00:16:11
Data At Rest: Server-side encryption with SSE-C
00:06:25
Data In Transit: Certificate Manager (ACM)
00:07:23
Encryption SDKs
00:05:55
Compliance Examples
00:08:59
Hands-on Labs are real live environments that put you in a real scenario to practice what you have learned without any other extra charge or account to manage.
Create and Manage SSL Certificates with AWS Certificate Manager
00:30:00
Conclusion
Practice Exam
AWS Certified Security Specialty
04:00:00
Final Steps
How to Prepare for the Exam
00:10:50
What’s Next After Certification?
00:04:53
Get Recognized!
00:01:01
Course Features
Our platform enhances courses beyond just videos with unique features. Learn more.
Certification Prep Course
This course can help prepare you for a certification exam.
Earn a Certificate of Completion
When you complete this course, you’ll receive a certificate of completion as proof
Get Linuxacademy – AWS Certified Security-Specialty Certification download
AWS Certified Security-Specialty Certification|Linuxacademy|Linuxacademy – AWS Certified Security-Specialty Certification
Buy the Linuxacademy – AWS Certified Security-Specialty Certification course at the best price at GBesy.. After your purchase, you will get access to the downloads page. You can download all the files associated in your order at here and we will also send a download notification email via your mail.
Unlock your full potential with Linuxacademy – AWS Certified Security-Specialty Certification courses. our courses are designed to help you excel.
Why wait? Take the first step towards greatness by purchasing Linuxacademy – AWS Certified Security-Specialty Certification courses today. We offer a seamless and secure purchasing experience, ensuring your peace of mind. With our trusted payment gateways, Stripe and PayPal, you can confidently complete your transaction knowing that your financial information is protected.
Stripe, known for its robust security measures, provides a safe and reliable payment process. With its encrypted technology, your sensitive data remains confidential throughout the transaction. Rest assured that your purchase is protected.
PayPal, a globally recognized payment platform, offers an additional layer of security. With its buyer protection program, you can feel confident in your purchase. PayPal ensures that your financial details are safeguarded, allowing you to focus on your learning journey.
Is it secure? to Use of?
- Your identity is completely confidential. We do not share your information with anyone. So it is absolutely safe to buy the Linuxacademy – AWS Certified Security-Specialty Certification course.
- 100% Safe Checkout Privateness coverage
- Communication and encryption of sensitive knowledge
- All card numbers are encrypted using AES at relaxation-256 and transmitting card numbers runs in a separate internet hosting atmosphere, and doesn’t share or save any data.
How can this course be delivered?
- After your successful payment this “Linuxacademy – AWS Certified Security-Specialty Certification course”, Most of the products will come to you immediately. But for some products were posted for offer. Please wait for our response, it might take a few hours due to the time zone difference.
- If this happens, please wait. The technical department will process the link shortly after. You will receive notifications directly by e-mail. We appreciate your wait.
What Shipping Methods Are Available?
- You will receive a download link in the invoice or YOUR ACCOUNT.
- The course link always exists. use your account to login and download the Linuxacademy – AWS Certified Security-Specialty Certification course whenever you need.
- You only need to visit a single link, and you can get all the Linuxacademy – AWS Certified Security-Specialty Certification course content at once.
- You can do your learning online. You can be downloaded for better results and can study anywhere on any device. Make sure your system does not sleep during the download.
How Do I Track Order?
- We always notice the status of your order immediately after your payment. After 7 days if there is no download link, the system will automatically complete your money.
- We love to hear from you. Please don’t hesitate to email us with any comments, questions and suggestions.
Reviews
There are no reviews yet.