📁 Folder Tree
- 📁 AWS Certified Security - Specialty (SCS-C01)
- 📂 CHAPTER 01 Introduction
- 📂 01-01 Course Introduction
- 📂 01-02 Exploring the Cloud Playground
- 📂 01-03 About the Exam
- 📂 01-04 Using the AWS CLI and AWS SDK
- 📂 01-05 Shared Responsibility Model
- 📂 CHAPTER 02 Identity and Access Management Domain
- 📂 02-01 IAM Refresher
- 📂 02-02 Important AWS Root User Account Concepts
- 📂 02-03 Exploring AWS Identities - Part 1
- 📂 02-04 Exploring AWS Identities - Part 2
- 📂 02-05 Granting and Denying Access via IAM Policies
- 📂 02-06 Interpreting IAM Policies
- 📂 02-09 Demo Setting Permissions Boundaries
- 📂 02-10 Demo Generating IAM Credential Reports
- 📂 02-13 Demo Using Different STS Sources
- 📂 02-16 Creating User Pools and Identity Pools in Amazon Cognito
- 📂 02-17 Authentication with AWS Directory Service - Part 1
- 📂 02-18 Authentication with AWS Directory Service - Part 2
- 📂 02-19 Demo Logging In to AWS via AWS Single Sign-On (SSO)
- 📂 02-20 Leveraging AWS Organizations for AWS Account Access
- 📂 02-21 Section Summary
- 📂 CHAPTER 03 Security Logging and Monitoring Domain
- 📂 03-02 Demo Sending Custom Logs to CloudWatch
- 📂 03-05 Demo Examining CloudTrail Events
- 📂 03-06 Logging with Amazon Kinesis and Amazon OpenSearch (Elasticsearch)
- 📂 03-07 Demo Querying Data with Amazon Athena
- 📂 03-08 Demo Enabling VPC Flow Logs Part 1
- 📂 03-09 Demo Enabling VPC Flow Logs Part 2
- 📂 03-12 Section Summary
- 📂 CHAPTER 04 Threat Detection and Incident Response Domain
- 📂 04-04 Threat Detection with Amazon GuardDuty
- 📂 04-05 Demo Viewing Amazon GuardDuty Findings
- 📂 04-06 Remediating Amazon GuardDuty Findings
- 📂 04-07 Demo Account Checkups with the AWS Health Dashboard
- 📂 04-08 Assessing EC2 Instances with Amazon Inspector
- 📂 04-09 Demo Inspecting EC2 Instances
- 📂 04-10 Automated Patching Using AWS Systems Manager
- 📂 04-11 Demo Incident Response and Recovery with AWS Systems Manager
- 📂 04-12 Security Compliance Reporting Using AWS Artifact
- 📂 04-13 Responding to AWS Abuse Notices
- 📂 04-14 Section Summary
- 📂 CHAPTER 05 Infrastructure Security Domain
- 📂 05-02 Implementing Envelope Encryption with AWS KMS
- 📂 05-03 Demo Generating Data Keys for Envelope Encryption
- 📂 05-04 Demo Multi-Region Keys, Imports, and Deletion with AWS KMS
- 📂 05-07 Blocking Malicious Traffic with AWS WAF and AWS Firewall Manager
- 📂 05-08 Demo Implementing AWS WAF on Application Load Balancers
- 📂 05-09 Intrusion Detection and Prevention via AWS Network Firewall
- 📂 05-10 Locking Down CloudFront Distributions Integrated with Amazon S3
- 📂 05-13 Preventing DDoS Attacks with AWS Shield
- 📂 05-14 Auditing Compromised Resources with AWS Security Hub
- 📂 05-15 Demo Exploring Security Scores in AWS Security Hub
- 📂 05-16 Network Security via VPNs
- 📂 05-17 Customizing VPCs, Routing, and Security Controls - Part 1
- 📂 05-18 Customizing VPCs, Routing, and Security Controls - Part 2
- 📂 05-19 Securely Connecting to VPCs
- 📂 05-20 Private Service Connections via VPC Endpoints
- 📂 05-21 Section Summary
- 📂 CHAPTER 06 Data Protection Domain
- 📂 06-02 Secure Elastic Load Balancing (ELB) - Part 1
- 📂 06-03 Secure Elastic Load Balancing (ELB) - Part 2
- 📂 06-04 Demo Deploying a TLS-Secured Application Load Balancer
- 📂 06-05 Demo Increasing Security within DynamoDB
- 📂 06-06 Controlling Sensitive Data with Amazon Macie
- 📂 06-07 Secure Storage with Amazon S3
- 📂 CHAPTER 07 Miscellaneous Services and Concepts
- 📂 07-02 Controlling Access to Amazon QuickSight
- 📂 07-03 Demo Complicated KMS-Related Issues - Recovering Encrypted EBS Volumes
- 📂 07-04 Parameter Store and Secrets Manager for Sensitive Data
- 📂 07-05 Filtering and Rejecting EC2 Instance Traffic
- 📂 07-06 Kinesis Encryption
- 📂 07-07 Section Summary
- 📂 CHAPTER 09 SCS-C02 Updates
- 📂 09-01 SCS-C02 Update
- 📂 09-02 AWS Incident Response
- 📂 09-03 Amazon Detective
- 📂 09-04 AWS KMS Key Types
- 📂 09-05 Web App Attacks
- 📂 09-06 Data Lifecycle
- 📂 09-07 Cross-Region Networking
- 📂 09-08 Origin Access Control (OAC)