Learn your way! Get started

SCS-C01: AWS Certified Security Specialist, Part 5 of 6: Data Protection

with expert Zeal Vora


Watch trailer


Course at a glance

Included in these subscriptions:

  • Dev & IT Pro Video
  • Dev & IT Pro Power Pack

Release date 8/11/2022
Level Advanced
Runtime 5h 31m
Closed captioning N/A
Transcript N/A
eBooks / courseware N/A
Hands-on labs N/A
Sample code Included
Exams N/A


Enterprise Solutions

Need reporting, custom learning tracks, or SCORM? Learn More



Course description

Amazon Web Services Certified Security Specialty is an exam intended to validate an individuals experience in a security role. This course covers Domain 5 Incident Response which counts for 22% of the exam.

Prerequisites

two years of hands-on experience securing AWS and 5 years or more in IT security experience designing and implementing security solutions.

Meet the expert

Zeal works primarily as a Cloud Security Consultant guiding organizations to re-build their infrastructure with security in mind. Zeal also holds more then 13+ certifications ranging from RedHat Certified Architect to AWS Security.

Course outline



Module 16

Cryptography (31:45)
  • Introduction (00:08)
  • Cryptography (11:38)
  • Protocols (04:08)
  • Plain Text vs Encrypted Text Protocols - (07:07)
  • Disk Level Encryption (08:34)
  • Summary (00:08)
CloudHSM (33:09)
  • Introduction (00:08)
  • CloudHSM (05:49)
  • CloudHSM Pointers (03:10)
  • AWS KMS (05:37)
  • Demo: KMS (11:26)
  • KMS Architecture (06:50)
  • Summary (00:08)

Module 17

Schedule Key Deletion (37:47)
  • Introduction (00:08)
  • Schedule Key Deletion (07:04)
  • Asymmetric Key Encryption (11:10)
  • Asymmetric Key with KMS (10:40)
  • Digital Signing with KMS (08:36)
  • Summary (00:08)
Data Key caching (22:14)
  • Introduction (00:08)
  • Data Key Caching (08:44)
  • AWS KMS - Key Deletion EBS Use-Case (04:44)
  • Unmanageable CMK (03:10)
  • KMS - Authentication and Access Control (05:18)
  • Summary (00:08)
KMS Policy Evaluation Logic (35:14)
  • Introduction (00:08)
  • KMS Policy Evaluation Logic - Use Case 01 (03:01)
  • KMS Policy Evaluation Logic - Use Case Answer 01 (04:25)
  • KMS Policy Evaluation Logic - Use Case 02 (01:56)
  • KMS Policy Evaluation Logic - Use Case Answer 02 (03:08)
  • KMS Policy Evaluation Logic - Use Case 03 (00:44)
  • KMS Policy Evaluation Logic - Use Case Answer 03 (01:56)
  • KMS Grants (12:00)
  • KMS Imported Key Material (07:44)
  • Summary (00:08)

Module 18

S3 Encryption (31:27)
  • Introduction (00:08)
  • S3 Encryption (13:11)
  • Migrating KMS Encrypted Data Across Regions (07:19)
  • Multi-Region KMS (10:41)
  • Summary (00:08)
Benefits of CloudHSM over KMS (30:42)
  • Introduction (00:08)
  • Benefits of CloudHSM over KMS (02:19)
  • S3 Encryption (13:11)
  • Classic Load Balancer (10:26)
  • Load Balancer Types NE (04:29)
  • Summary (00:08)
Overview of Application Load Balancer (29:00)
  • Introduction (00:08)
  • Overview of ALB (07:31)
  • ALB - Path Based Routing (10:35)
  • ELB Access Logs (10:37)
  • Summary (00:08)

Module 19

Understanding HTTPS connections (30:01)
  • Introduction (00:08)
  • HTTPS (16:53)
  • AWS Certificate Manager (09:46)
  • Demo: AWS Certificate Manager (03:05)
  • Summary (00:08)
Glacier Vault (27:23)
  • Introduction (00:08)
  • Glacier Vault (07:40)
  • DynamoDB Encryption Client (02:57)
  • AWS Secrets Manager (05:59)
  • Encrypted Context (10:28)
  • Summary (00:08)
DNS Cache Poisioning (22:43)
  • Introduction (00:08)
  • DNS Cache Poisoning (04:16)
  • DNS SEC Overview (10:12)
  • Demo: DNS SEC (07:57)
  • Summary (00:08)