Home
Courses
Practice Exams
Pricing
Blog
Tools
Cheat Sheets
Full Stack Generator
Cloud Experts
BlowStack logoBlowStack logo
  • BlowStack
  • Courses
  • AWS Certified Security - Specialty - SCS-C02

AWS Certified Security Specialty Interactive Course

Secure your cloud environment with our specialized interactive course for the AWS Certified Security - Specialty exam. Master advanced security concepts, protect AWS infrastructures, and confidently achieve your certification.

Course update: Sep 01 2024

Lessons count: 175

Domains: 6

Tasks: 22

Difficulty

Course Scope

The Interactive Course is fully compatible with the official exam scope and covers all concepts, services, domains and tasks specified in the official exam guide.

AWS Certified Security - Specialty - SCS-C02 - official exam guide

AWS best practices for incident response

Lesson

Cloud incidents

Lesson

Roles and responsibilities in the incident response plan

Lesson

AWS Security Finding Format

Lesson

Implementing credential invalidation and rotation strategies in response to compromises

Lesson

Isolating AWS resources

Lesson

Designing and implementing playbooks and runbooks for responses to security incidents

Lesson

Deploying security services

Lesson

Configuring integrations with native AWS services and third-party services

Lesson

AWS managed security services that detect threats

Lesson

Anomaly and correlation techniques to join data across services

Lesson

Visualizations to identify anomalies

Lesson

Strategies to centralize security findings

Lesson

Evaluating findings from security services

Lesson

Searching and correlating security threats across AWS services

Lesson

Performing queries to validate security events

Lesson

Creating metric filters and dashboards to detect anomalous activity

Lesson

AWS Security Incident Response Guide

Lesson

Resource isolation mechanisms

Lesson

Techniques for root cause analysis

Lesson

Data capture mechanisms

Lesson

Log analysis for event validation

Lesson

Responding to compromised resources

Lesson

Automating remediation by using AWS services

Lesson

Investigating and analyzing to conduct root cause analysis

Lesson

Capturing relevant forensics data from a compromised resource

Lesson

Querying logs in Amazon S3 for contextual information related to security events

Lesson

Protecting and preserving forensic artifacts

Lesson

Preparing services for incidents and recovering services after incidents

Lesson

AWS services that monitor events and provide alarms

Lesson

AWS services that automate alerting

Lesson

Tools that monitor metrics and baselines

Lesson

Analyzing architectures to identify monitoring requirements and sources of data for security monitoring

Lesson

Analyzing environments and workloads to determine monitoring requirements

Lesson

Designing environment monitoring and workload monitoring based on business and security requirements

Lesson

Setting up automated tools and scripts to perform regular audits

Lesson

Defining the metrics and thresholds that generate alerts

Lesson

Configuration of monitoring services

Lesson

Relevant data that indicates security events

Lesson

Analyzing the service functionality, permissions, and configuration of resources after an event that did not provide visibility or alerting

Lesson

Analyzing and remediating the configuration of a custom application that is not reporting its statistics

Lesson

Evaluating logging and monitoring services for alignment with security requirements

Lesson

AWS services and features that provide logging capabilities

Lesson

Attributes of logging capabilities

Lesson

Log destinations and lifecycle management

Lesson

Configuring logging for services and applications

Lesson

Identifying logging requirements and sources for log ingestion

Lesson

Implementing log storage and lifecycle management according to AWS best practices and organizational requirements

Lesson

Capabilities and use cases of AWS services that provide data sources

Lesson

AWS services and features that provide logging capabilities

Lesson

Access permissions that are necessary for logging

Lesson

Identifying misconfiguration and determining remediation steps for absent access permissions that are necessary for logging

Lesson

Determining the cause of missing logs and performing remediation steps

Lesson

Services and tools to analyze captured logs

Lesson

Log analysis features of AWS services

Lesson

Log format and components

Lesson

Identifying patterns in logs to indicate anomalies and known threats

Lesson

Normalizing, parsing, and correlating logs

Lesson

Security features on edge services

Lesson

Common attacks, threats, and exploits

Lesson

Layered web application architecture

Lesson

Defining edge security strategies for common use cases

Lesson

Selecting appropriate edge services based on anticipated threats and attacks

Lesson

Selecting appropriate protections based on anticipated vulnerabilities and risks

Lesson

Defining layers of defense by combining edge security services

Lesson

Applying restrictions at the edge based on various criteria

Lesson

Activating logs, metrics, and monitoring around edge services to indicate attacks

Lesson

VPC security mechanisms

Lesson

Inter-VPC connectivity

Lesson

Security telemetry sources

Lesson

VPN technology, terminology, and usage

Lesson

On-premises connectivity options

Lesson

Implementing network segmentation based on security requirements

Lesson

Designing network controls to permit or prevent network traffic as required

Lesson

Designing network flows to keep data off the public internet

Lesson

Determining which telemetry sources to monitor based on network design, threats, and attacks

Lesson

Determining redundancy and security workload requirements for communication between on-premises environments and the AWS Cloud

Lesson

Identifying and removing unnecessary network access

Lesson

Managing network configurations as requirements change

Lesson

Provisioning and maintenance of EC2 instances

Lesson

IAM instance roles and IAM service roles

Lesson

Services that scan for vulnerabilities in compute workloads

Lesson

Host-based security

Lesson

Creating hardened EC2 AMIs

Lesson

Applying instance roles and service roles as appropriate to authorize compute workloads

Lesson

Scanning EC2 instances and container images for known vulnerabilities

Lesson

Applying patches across a fleet of EC2 instances or container images

Lesson

Activating host-based security mechanisms

Lesson

Analyzing Amazon Inspector findings and determining appropriate mitigation techniques

Lesson

Passing secrets and credentials securely to compute workloads

Lesson

How to analyze reachability

Lesson

Fundamental TCP/IP networking concepts

Lesson

How to read relevant log sources

Lesson

Identifying, interpreting, and prioritizing problems in network connectivity

Lesson

Determining solutions to produce desired network behavior

Lesson

Analyzing log sources to identify problems

Lesson

Capturing traffic samples for problem analysis

Lesson

Methods and services for creating and managing identities

Lesson

Long-term and temporary credentialing mechanisms

Lesson

How to troubleshoot authentication issues

Lesson

Establishing identity through an authentication system, based on requirements

Lesson

Setting up multi-factor authentication

Lesson

Determining when to use AWS Security Token Service to issue temporary credentials

Lesson

Different IAM policies

Lesson

Components and impact of a policy

Lesson

How to troubleshoot authorization issues

Lesson

Constructing attribute-based access control and role-based access control strategies

Lesson

Evaluating IAM policy types for given requirements and workloads

Lesson

Interpreting an IAM policy’s effect on environments and workloads

Lesson

Applying the principle of least privilege across an environment

Lesson

Enforcing proper separation of duties

Lesson

Investigating unintended permissions, authorization, or privileges granted to a resource, service, or entity

Lesson

Analyzing access or authorization errors to determine cause or effect

Lesson

TLS concepts

Lesson

VPN concepts

Lesson

Secure remote access methods

Lesson

Systems Manager Session Manager concepts

Lesson

How TLS certificates work with various network services and resources

Lesson

Designing secure connectivity between AWS and on-premises networks

Lesson

Designing mechanisms to require encryption when connecting to resources

Lesson

Requiring TLS for AWS API calls

Lesson

Designing mechanisms to forward traffic over secure connections

Lesson

Designing cross-Region networking by using private VIFs and public VIFs

Lesson

Encryption technique selection

Lesson

Integrity-checking techniques

Lesson

Resource policies

Lesson

IAM roles and policies

Lesson

Designing resource policies to restrict access to authorized users

Lesson

Designing mechanisms to prevent unauthorized public access

Lesson

Configuring services to activate encryption of data at rest

Lesson

Designing mechanisms to protect data integrity by preventing modifications

Lesson

Designing encryption at rest by using AWS CloudHSM for relational databases

Lesson

Choosing encryption techniques based on business requirements

Lesson

Lifecycle policies

Lesson

Data retention standards

Lesson

Designing S3 Lifecycle mechanisms to retain data for required retention periods

Lesson

Designing automatic lifecycle management for AWS services and resources

Lesson

Establishing schedules and retention for AWS Backup across AWS services

Lesson

Secrets Manager

Lesson

Systems Manager Parameter Store

Lesson

Usage and management of symmetric keys and asymmetric keys

Lesson

Designing management and rotation of secrets for workloads

Lesson

Designing KMS key policies to limit key usage to authorized users

Lesson

Establishing mechanisms to import and remove customer-provided key material

Lesson


Multi-account strategies

Lesson

Managed services that allow delegated administration

Lesson

Policy-defined guardrails

Lesson

Root account best practices

Lesson

Cross-account roles

Lesson

Deploying and configuring AWS Organizations

Lesson

Determining when and how to deploy AWS Control Tower

Lesson

Implementing SCPs as a technical solution to enforce a policy

Lesson

Centrally managing security services and aggregating findings

Lesson

Securing AWS account root user credentials

Lesson

Deployment best practices with infrastructure as code

Lesson

Best practices for tagging

Lesson

Centralized management, deployment, and versioning of AWS services

Lesson

Visibility and control over AWS infrastructure

Lesson

Using CloudFormation to deploy cloud resources consistently and securely

Lesson

Implementing and enforcing multi-account tagging strategies

Lesson

Configuring and deploying portfolios of approved AWS services

Lesson

Organizing AWS resources into different groups for management

Lesson

Deploying Firewall Manager to enforce policies

Lesson

Securely sharing resources across AWS accounts

Lesson

Data classification by using AWS services

Lesson

How to assess, audit, and evaluate the configurations of AWS resources

Lesson

Identifying sensitive data by using Macie

Lesson

Creating AWS Config rules for detection of noncompliant AWS resources

Lesson

Collecting and organizing evidence by using Security Hub and AWS Audit Manager

Lesson

AWS cost and usage for anomaly identification

Lesson

Strategies to reduce attack surfaces

Lesson

AWS Well-Architected Framework

Lesson

Identifying anomalies based on resource utilization and trends

Lesson

Identifying unused resources by using AWS services and tools

Lesson

Using the AWS Well-Architected Tool to identify security gaps

Lesson


AWS Interactive Courses

AWS Certified Cloud Practitioner - CLF-C02
Interactive Course

Unlock your cloud computing potential with our interactive AWS course designed for the AWS Certified Cloud Practitioner exam. Gain hands-on experience, understand core AWS services, and confidently ace your certification.

AWS Certified Solutions Architect - Associate - SAA-C03
Interactive Course

Master cloud architecture with our comprehensive interactive course tailored for the AWS Certified Solutions Architect - Associate exam. Learn to design scalable, cost-effective AWS solutions.

AWS Certified Solutions Architect - Professional - SAP-C02
Interactive Course

Elevate your expertise with our advanced interactive course for the AWS Certified Solutions Architect - Professional exam. Master complex AWS architecture, design scalable solutions, and optimize performance.

AWS Certified Developer - Associate - DVA-C02
Interactive Course

Boost your cloud development skills with our interactive course for the AWS Certified Developer - Associate exam. Learn to build and deploy robust applications on AWS, master key services, and gain confidence to pass your certification

AWS Certified DevOps Engineer - Professional - DOP-C02
Interactive Course

Master the AWS Certified DevOps Engineer - Professional (DOP-C02) exam with our interactive course. Engage with hands-on labs, real-world scenarios, and expert guidance to enhance your skills. Learn at your own pace and ensure exam success.

AWS Certified Data Engineer - Associate - DEA-C01
Interactive Course

Master the AWS Certified Data Engineer - Associate exam with our interactive course. Explore real-world scenarios and expert guidance to build your skills and pass with confidence. Start your certification journey now!

AWS Certified Advanced Networking - Specialty - ANS-C01
Interactive Course

The AWS Certified Advanced Networking - Specialty interactive course offers in-depth tutorials and targeted exercises to help you master advanced networking concepts on AWS, making it an ideal resource for effective exam preparation.

© 2024 BlowStack - AWS App Development and Interactive E-Learning
BlowStack logo
Powered by AWS Cloud Computing
info@blowstack.com

AWS App Development

Full Stack Generator
Cloud Experts

AWS Academy

Practice Exams
Interactive Courses
Pricing

Resources

Blog
Tools
Cheat Sheets

Other

Contact
Conditions & Terms
AWS Certified Data Engineer - AssociateAWS Certified Advanced Networking - SpecialtyAWS Certified DevOps Engineer - ProfessionalAWS Certified Solutions Architect - AssociateAWS Certified Cloud PractitionerAWS Certified Developer - AssociateAWS Certified Solutions Architect - ProfessionalAWS Certified Security - Specialty