Autoplay
Autocomplete
Previous Lesson
Complete and Continue
AWS Certified Security Specialty
Introduction to Security Models
Shared Responsibility Model
Client Security Responsibility Model
Our Lab Setup
ROOT MFA - First Setup
VPC & Networking
VPC, Subnets & EC2
Internet Gateways
NAT Gateways
Interface Level Flow Logs
Network ACL
Introduction to Firewalls
Understanding Stateful vs Stateless Firewalls
2 modes of Firewalls
Understanding Networking Sockets
Introduction to Security Groups
Connection of Security Group & NIC Cards
Egress Rules - The Real Challenge
IPTABLES & Instance Metadata
IDS / IPS in AWS
Security Logging & Monitoring
Introduction to Security Operations Center
Introduction to Security Logging & Monitoring
Understanding CloudTrail - Part 01
More insights into CloudTrail - Part 02
Getting Started with CloudWatch
Understanding CIS Benchmarks
Security Monitoring with CIS Benchmarks - 01
Security Monitoring with CIS Benchmarks - 02
S3 Masterclass
S3 Bucket Policies
Durability vs Availability
S3 Storage Classes
S3 Lifecycle Policies
S3 - Versioning
S3 - Cross Region Replication
Understanding Signed URL's
The Cryptography KungFu
Introduction to Cryptography
Plain Text vs Encrypted Text Based Algorithms
Challenge with storing encryption Keys & Intro to CloudHSM
AWS Key Management Service
AWS Key Management Service - Part 02
AWS Key Management Service - Part 03
Identity Access Management
Understanding the Principle of Least Privilage
Revising IAM
IAM Best Practices - Part 01
IAM Best Practices - Part 02
Delegation - Cross Account Trust - Part 01
Delegation - Cross Account Trust - Part 02
AWS Security Token Service
AWS STS - Migrating the EC2 Credentials
AWS STS - Architecting IAM User Keys the right way
AWS STS - Automating the temporary credentials
Understanding Federation - Part 01
Understanding Federation - Part 02
Understanding SAML for SSO
Capturing SAML Assertion packets with Tracer
Establishing trust between IdP & SP
Choosing right IdP
Content Delivery Networks
Introduction to Reverse Proxies
Understanding the Content Delivery Networks
Understanding Edge Locations
Deploying CloudFront Distribution - Part 01
Understanding Origin Access Identity
Understanding the Cache Hits / Misses in CDN
Mitigating the DDOS Attacks
CloudFront - Signed URL - 01
CloudFront Signed URL - 02
Trusted Advisor
Governance, Risk & Compliance
Let's Understand need of Compliance
The need of PCI DSS
Improved Governance - AWS Config 01
Improved Governance - AWS Config 02
Intermediary Node for Routing Traffic
Introduction to Virtual Private Networks
OpenVPN is Awesome
OpenVPN - Part 02
VPC Peering
VPC Peering - Part 02 (New)
IPSec Tunnels for Site to Site VPN
Transit VPC
Posture of Vulnerability Assessment in Cloud
Introduction to Vulnerability, Exploit, Payload
Understanding Automated Vulnerability Scanners
Common Vulnerability Exposures & CVSS
Introduction to AWS Inspector
Configure AWS Inspector
AWS Inspector & Nessus - CVE Scans
Best Practices
Important Points for Exams
Exam Preparation
Getting Started with CloudWatch
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock