Exclusive SALE Offer Today

AWS Certified Security - Specialty: AWS Certified Security - Specialty (SCS-C01)

Best Seller 164 Lectures 21h 14m 4s
Prepare for your Amazon AWS examination with our training course. The AWS-Certified-Security-Specialty-SCS-C01 course contains a complete batch of videos that will provide you with profound and thorough knowledge related to Amazon AWS certification exam. Pass the Amazon AWS AWS-Certified-Security-Specialty-SCS-C01 test with flying colors.
$14.99$24.99
Curriculum For This Course

  • 1. Introduction to Domain 1 3m 18s
  • 2. Case Study of Hacked Server 7m 24s
  • 3. Dealing with AWS Abuse Notice 7m 28s
  • 4. AWS GuardDuty 8m 20s
  • 5. Whitelisting Alerts in AWS GuardDuty 4m 33s
  • 6. Understanding Incident Response Terminology 12m 19s
  • 7. Incident Response Use-Cases for Exams 2m 38s
  • 8. Use Case - Dealing with Exposed Access Keys 15m 59s
  • 9. Use Case - Dealing with compromised EC2 Instances 5m 1s
  • 10. Incident Response in Cloud 11m 18s
  • 11. Penetration Testing in AWS (New) 6m 27s
  • 1. Introduction to Vulnerability, Exploit, Payload 5m 17s
  • 2. VEP Practical - Hacking inside a test farm 8m 2s
  • 3. Understanding Automated Vulnerability Scanners 8m 23s
  • 4. Common Vulnerabilities Exposures & CVSS 8m 38s
  • 5. Introduction to AWS Inspector 6m 5s
  • 6. Configuring AWS Inspector 6m 42s
  • 7. AWS Inspector & Nessus - CVE scans 9m 4s
  • 8. Best Practices in Vulnerability Assessments 7m 53s
  • 9. Overview of Layer 7 Firewalls 6m 20s
  • 10. Understanding AWS WAF 12m 47s
  • 11. Implementing AWS WAF with ALB 6m 6s
  • 12. Understanding EC2 Run Command 4m 22s
  • 13. Deploying our first RunCommand 10m 38s
  • 14. Patch Compliance with SSM 3m 38s
  • 15. EC2 Systems Manager - Parameter Store 8m
  • 16. Understanding CloudWatch Logs 4m 15s
  • 17. Pushing Linux system logs to CloudWatch 7m 53s
  • 18. CloudWatch Events 8m 54s
  • 19. AWS Athena 11m 54s
  • 20. Overview of AWS CloudTrail 9m 21s
  • 21. Improved Governance - AWS Config 01 13m 20s
  • 22. Improved Governance - AWS Config 02 9m 17s
  • 23. Trusted Advisor 9m 17s
  • 24. CloudTrail - Log File Integrity Validation 8m 40s
  • 25. Digest Delivery Times 2m 18s
  • 26. Overview of AWS Macie (New) 8m 39s
  • 27. Creating our First Alert with AWS Macie (New) 7m 52s
  • 28. S3 Event Notification 7m 15s
  • 29. VPC Flow Logs 13m 41s
  • 1. Implementing Bastion Hosts 11m 1s
  • 2. Introduction to Virtual Private Networks 5m 45s
  • 3. OpenVPN is Awesome 5m 12s
  • 4. OpenVPN - Part 02 3m 19s
  • 5. Overview of AWS VPN Tunnels 6m 15s
  • 6. Using AWS VPN for On-Premise to AWS connectivity 9m 26s
  • 7. Configuring first IPSec tunnel with OpenSwan - Part 01 13m 49s
  • 8. Configuring first IPSec tunnel with OpenSwan - Part 02 4m 43s
  • 9. Inter-Region VPC Peering 7m 40s
  • 10. VPC Endpoints 12m 56s
  • 11. Network ACL 9m 17s
  • 12. Understanding Stateful vs Stateless Firewalls 13m 39s
  • 13. Understanding Networking Sockets 10m 50s
  • 14. Revising Security Groups 4m 51s
  • 15. Connection of Security Group & NIC Cards 6m 30s
  • 16. Egress Rules - The Real Challenge 12m 38s
  • 17. IPTABLES & Instance Metadata 11m 57s
  • 18. IDS / IPS in AWS 5m 15s
  • 19. EBS Architecture & Secure Data Wiping 13m 48s
  • 20. Introduction to Reverse Proxies 7m 54s
  • 21. Understanding the Content Delivery Networks 5m 31s
  • 22. Understanding Edge Locations 7m 47s
  • 23. Deploying Cloudfront Distribution - Part 01 7m 22s
  • 24. Understanding the Origin Access Identity 5m 23s
  • 25. Understanding importance of SNI in TLS protocol 9m 7s
  • 26. CloudFront Signed URL - 01 6m 53s
  • 27. CloudFront Signed URL - 02 9m 55s
  • 28. Real World example on DOS Implementation 8m 20s
  • 29. AWS Shield 4m 5s
  • 30. Mitigating DDOS Attacks 9m 50s
  • 31. Introduction to Application Programming Interface (API) 15m 12s
  • 32. Understanding the working of API 9m 32s
  • 33. Building Lambda Function for our API 4m 18s
  • 34. Building our first API with API Gateway 5m 46s
  • 35. API Gateway - Important Pointers for Exams 4m 24s
  • 36. Lambda & S3 5m 42s
  • 37. EC2 Key-Pair Troubleshooting 10m 48s
  • 38. EC2 Tenancy Attribute 5m 36s
  • 39. AWS Artifact 2m 45s
  • 40. Lambda@Edge 10m 48s
  • 41. AWS Simple Email Service (SES) (New) 6m 15s
  • 1. Understanding AWS Organizations 6m 17s
  • 2. AWS Organizations - Practical 8m 34s
  • 3. Organizational Unit (OU) in AWS organization 5m 15s
  • 4. IAM Policy Evaluation Logic 11m 33s
  • 5. Understanding IAM Policies 15m 6s
  • 6. IAM Policies - Part 02 11m 56s
  • 7. Delegation - Cross Account Trust - Part 1 7m 2s
  • 8. Delegation - Cross Account Trust - Part 2 10m 2s
  • 9. Revising AWS CLI 11m 54s
  • 10. Revising IAM Role 10m 56s
  • 11. EC2 Instance Meta-Data 7m 56s
  • 12. Understanding working of an IAM role 7m 52s
  • 13. IAM - Version Element 9m 56s
  • 14. IAM Policy Variables 4m 15s
  • 15. Principal and NotPrincipal Element 7m 24s
  • 16. Implementing NotPrincipal Element 3m 55s
  • 17. Conditionl Element 7m 8s
  • 18. AWS Security Token Service 7m 24s
  • 19. AWS STS - Migrating the EC2 Role Credentials - Part 2 4m 21s
  • 20. AWS STS - Architecturing IAM user keys the right way - Part 3 16m 55s
  • 21. AWS STS - Automate the temporary credentials - Part 4 4m 18s
  • 22. Understanding Federation - Part 01 6m 8s
  • 23. Understanding Federation - Part 02 8m 2s
  • 24. Understanding SAML for SSO 14m 9s
  • 25. Capturing SAML Assertion Packets with Tracer 7m 19s
  • 26. Establishing trust between IdP and SP 20m 33s
  • 27. Choosing a right IdP 6m 15s
  • 28. AWS Cognito 11m 23s
  • 29. Introduction to AWS Directory Service 10m 28s
  • 30. Understanding Active Directory 4m 13s
  • 31. Deploy our first SimpleAD based directory service 4m 16s
  • 32. Domain Joining EC2 instance with Directory Service 9m 17s
  • 33. Trusts in Active Directory 7m 25s
  • 34. IAM & S3 10m 34s
  • 35. S3 Bucket Policies 7m 31s
  • 36. Cross Account S3 Bucket Configuration 10m 59s
  • 37. Canned ACL's 9m 5s
  • 38. Understanding Signed URL's 13m 47s
  • 39. S3 - Versioning 6m 2s
  • 40. S3 - Cross Region Replication 7m 37s
  • 41. IAM Permission Boundaries (New) 9m 38s
  • 42. Troubleshooting IAM Policies 1m 47s
  • 43. Troubleshooting Answers - Solution 01 4m 46s
  • 44. Troubleshooting Answers - Solution 02 5m 28s
  • 45. Troubleshooting Answers - Solution 03 4m 24s
  • 46. Troubleshooting Answers - Solution 04 1m 24s
  • 47. Troubleshooting Answers - Solution 05 3m 32s
  • 1. Introduction to Cryptography 12m 15s
  • 2. Plain Text vs Encrypted Text Based Algorithms 7m 7s
  • 3. CloudHSM 6m 36s
  • 4. AWS Key Management Service 9m 14s
  • 5. AWS Key Management Service - Part 02 8m 20s
  • 6. AWS Key Management Service - Part 03 7m 26s
  • 7. AWS Key Management Service - Data Key Caching 9m 26s
  • 8. AWS Key Management Service - Scheduled CMK Deletion 4m
  • 9. AWS Key Management Service - CMK Deletion & EBS Use-Case 4m 51s
  • 10. Reducing Risk of Unmanageable CMK 3m 21s
  • 11. KMS - Authentication and Access Control 5m 35s
  • 12. KMS Policy Evaluation Logic - Use Case Solution - 01 3m 1s
  • 13. KMS Policy Evaluation Logic - Use Case 02 1m 56s
  • 14. KMS Policy Evaluation Logic - Use Case Solution - 02 3m 8s
  • 15. KMS Policy Evaluation Logic - Use Case - 03 44s
  • 16. KMS Policy Evaluation Logic - Use Case Solution - 03 (New) 1m 41s
  • 17. KMS Grants 12m 8s
  • 18. Importing Key Material to KMS 7m 45s
  • 19. KMS ViaService 8m 20s
  • 20. Migrating Encrypted KMS Data Across Regions 7m 32s
  • 21. S3 Encryption 11m 55s
  • 22. Revising ELB Listener Configuration 8m 42s
  • 23. ELB Listeners - Understanding HTTP vs TCP Listeners 8m 59s
  • 24. Understanding AWS Certificate Manager 5m 23s
  • 25. Deploying SSL/TLS certificate with ACM 3m 8s
  • 26. Configuring ELB with HTTPS for SSL Offloading 4m 54s
  • 27. Glacier Vault and Vault Lock 7m 40s
  • 28. DynamoDB Encryption 2m 57s
  • 29. Overview of AWS Secrets Manager 5m 59s
  • 30. RDS Integration with AWS Secrets Manager 10m 7s
  • 1. Important Pointers - Domain 1 5m 49s
  • 2. Important Pointers - Domain 2 8m 16s
  • 3. Important Pointers - Domain 3 9m 21s
  • 4. Important Pointers - Domain 4 5m 45s
  • 5. Important Pointers - Domain 5 8m 50s

How to Open Test Engine .dumpsarena Files

Use FREE DumpsArena Test Engine player to open .dumpsarena files

DumpsArena Test Engine

Windows

Refund Policy
Refund Policy

DumpsArena.com has a remarkable success record. We're confident of our products and provide a no hassle refund policy.

How our refund policy works?

safe checkout

Your purchase with DumpsArena.com is safe and fast.

The DumpsArena.com website is protected by 256-bit SSL from Cloudflare, the leader in online security.

Need Help Assistance?