Curriculum For This Course
Video tutorials list
-
Getting started with the course
Video Name Time 1. Understanding AWS Security Specialty exams 04:32 -
Domain 1 - Incident Response
Video Name Time 1. Introduction to Domain 1 03:18 2. Case Study of Hacked Server 07:24 3. Dealing with AWS Abuse Notice 07:28 4. AWS GuardDuty 08:20 5. Whitelisting Alerts in AWS GuardDuty 04:33 6. Understanding Incident Response Terminology 12:19 7. Incident Response Use-Cases for Exams 02:38 8. Use Case - Dealing with Exposed Access Keys 15:59 9. Use Case - Dealing with compromised EC2 Instances 05:01 10. Incident Response in Cloud 11:18 11. Penetration Testing in AWS (New) 06:27 -
Domain 2 - Logging & Monitoring
Video Name Time 1. Introduction to Vulnerability, Exploit, Payload 05:17 2. VEP Practical - Hacking inside a test farm 08:02 3. Understanding Automated Vulnerability Scanners 08:23 4. Common Vulnerabilities Exposures & CVSS 08:38 5. Introduction to AWS Inspector 06:05 6. Configuring AWS Inspector 06:42 7. AWS Inspector & Nessus - CVE scans 09:04 8. Best Practices in Vulnerability Assessments 07:53 9. Overview of Layer 7 Firewalls 06:20 10. Understanding AWS WAF 12:47 11. Implementing AWS WAF with ALB 06:06 12. Understanding EC2 Run Command 04:22 13. Deploying our first RunCommand 10:38 14. Patch Compliance with SSM 03:38 15. EC2 Systems Manager - Parameter Store 08:00 16. Understanding CloudWatch Logs 04:15 17. Pushing Linux system logs to CloudWatch 07:53 18. CloudWatch Events 08:54 19. AWS Athena 11:54 20. Overview of AWS CloudTrail 09:21 21. Improved Governance - AWS Config 01 13:20 22. Improved Governance - AWS Config 02 09:17 23. Trusted Advisor 09:17 24. CloudTrail - Log File Integrity Validation 08:40 25. Digest Delivery Times 02:18 26. Overview of AWS Macie (New) 08:39 27. Creating our First Alert with AWS Macie (New) 07:52 28. S3 Event Notification 07:15 29. VPC Flow Logs 13:41 -
Domain 3 - Infrastructure Security
Video Name Time 1. Implementing Bastion Hosts 11:01 2. Introduction to Virtual Private Networks 05:45 3. OpenVPN is Awesome 05:12 4. OpenVPN - Part 02 03:19 5. Overview of AWS VPN Tunnels 06:15 6. Using AWS VPN for On-Premise to AWS connectivity 09:26 7. Configuring first IPSec tunnel with OpenSwan - Part 01 13:49 8. Configuring first IPSec tunnel with OpenSwan - Part 02 04:43 9. Inter-Region VPC Peering 07:40 10. VPC Endpoints 12:56 11. Network ACL 09:17 12. Understanding Stateful vs Stateless Firewalls 13:39 13. Understanding Networking Sockets 10:50 14. Revising Security Groups 04:51 15. Connection of Security Group & NIC Cards 06:30 16. Egress Rules - The Real Challenge 12:38 17. IPTABLES & Instance Metadata 11:57 18. IDS / IPS in AWS 05:15 19. EBS Architecture & Secure Data Wiping 13:48 20. Introduction to Reverse Proxies 07:54 21. Understanding the Content Delivery Networks 05:31 22. Understanding Edge Locations 07:47 23. Deploying Cloudfront Distribution - Part 01 07:22 24. Understanding the Origin Access Identity 05:23 25. Understanding importance of SNI in TLS protocol 09:07 26. CloudFront Signed URL - 01 06:53 27. CloudFront Signed URL - 02 09:55 28. Real World example on DOS Implementation 08:20 29. AWS Shield 04:05 30. Mitigating DDOS Attacks 09:50 31. Introduction to Application Programming Interface (API) 15:12 32. Understanding the working of API 09:32 33. Building Lambda Function for our API 04:18 34. Building our first API with API Gateway 05:46 35. API Gateway - Important Pointers for Exams 04:24 36. Lambda & S3 05:42 37. EC2 Key-Pair Troubleshooting 10:48 38. EC2 Tenancy Attribute 05:36 39. AWS Artifact 02:45 40. [email protected] 10:48 41. AWS Simple Email Service (SES) (New) 06:15 -
Domain 4 - Identity & Access Management
Video Name Time 1. Understanding AWS Organizations 06:17 2. AWS Organizations - Practical 08:34 3. Organizational Unit (OU) in AWS organization 05:15 4. IAM Policy Evaluation Logic 11:33 5. Understanding IAM Policies 15:06 6. IAM Policies - Part 02 11:56 7. Delegation - Cross Account Trust - Part 1 07:02 8. Delegation - Cross Account Trust - Part 2 10:02 9. Revising AWS CLI 11:54 10. Revising IAM Role 10:56 11. EC2 Instance Meta-Data 07:56 12. Understanding working of an IAM role 07:52 13. IAM - Version Element 09:56 14. IAM Policy Variables 04:15 15. Principal and NotPrincipal Element 07:24 16. Implementing NotPrincipal Element 03:55 17. Conditionl Element 07:08 18. AWS Security Token Service 07:24 19. AWS STS - Migrating the EC2 Role Credentials - Part 2 04:21 20. AWS STS - Architecturing IAM user keys the right way - Part 3 16:55 21. AWS STS - Automate the temporary credentials - Part 4 04:18 22. Understanding Federation - Part 01 06:08 23. Understanding Federation - Part 02 08:02 24. Understanding SAML for SSO 14:09 25. Capturing SAML Assertion Packets with Tracer 07:19 26. Establishing trust between IdP and SP 20:33 27. Choosing a right IdP 06:15 28. AWS Cognito 11:23 29. Introduction to AWS Directory Service 10:28 30. Understanding Active Directory 04:13 31. Deploy our first SimpleAD based directory service 04:16 32. Domain Joining EC2 instance with Directory Service 09:17 33. Trusts in Active Directory 07:25 34. IAM & S3 10:34 35. S3 Bucket Policies 07:31 36. Cross Account S3 Bucket Configuration 10:59 37. Canned ACL's 09:05 38. Understanding Signed URL's 13:47 39. S3 - Versioning 06:02 40. S3 - Cross Region Replication 07:37 41. IAM Permission Boundaries (New) 09:38 42. Troubleshooting IAM Policies 01:47 43. Troubleshooting Answers - Solution 01 04:46 44. Troubleshooting Answers - Solution 02 05:28 45. Troubleshooting Answers - Solution 03 04:24 46. Troubleshooting Answers - Solution 04 01:24 47. Troubleshooting Answers - Solution 05 03:32 -
Domain 5 - Data Protection
Video Name Time 1. Introduction to Cryptography 12:15 2. Plain Text vs Encrypted Text Based Algorithms 07:07 3. CloudHSM 06:36 4. AWS Key Management Service 09:14 5. AWS Key Management Service - Part 02 08:20 6. AWS Key Management Service - Part 03 07:26 7. AWS Key Management Service - Data Key Caching 09:26 8. AWS Key Management Service - Scheduled CMK Deletion 04:00 9. AWS Key Management Service - CMK Deletion & EBS Use-Case 04:51 10. Reducing Risk of Unmanageable CMK 03:21 11. KMS - Authentication and Access Control 05:35 12. KMS Policy Evaluation Logic - Use Case Solution - 01 03:01 13. KMS Policy Evaluation Logic - Use Case Solution - 01 04:25 14. KMS Policy Evaluation Logic - Use Case 02 01:56 15. KMS Policy Evaluation Logic - Use Case Solution - 02 03:08 16. KMS Policy Evaluation Logic - Use Case - 03 00:44 17. KMS Policy Evaluation Logic - Use Case Solution - 03 (New) 01:41 18. KMS Grants 12:08 19. Importing Key Material to KMS 07:45 20. KMS ViaService 08:20 21. Migrating Encrypted KMS Data Across Regions 07:32 22. S3 Encryption 11:55 23. Revising ELB Listener Configuration 08:42 24. ELB Listeners - Understanding HTTP vs TCP Listeners 08:59 25. Understanding AWS Certificate Manager 05:23 26. Deploying SSL/TLS certificate with ACM 03:08 27. Configuring ELB with HTTPS for SSL Offloading 04:54 28. Glacier Vault and Vault Lock 07:40 29. DynamoDB Encryption 02:57 30. Overview of AWS Secrets Manager 05:59 31. RDS Integration with AWS Secrets Manager 10:07 -
Important points for Exams
Video Name Time 1. Important Pointers - Domain 1 05:49 2. Important Pointers - Domain 2 08:16 3. Important Pointers - Domain 3 09:21 4. Important Pointers - Domain 4 05:45 5. Important Pointers - Domain 5 08:50
Add Comment