Course description
Amazon Web Services Certified Security Specialty is an exam intended to validate an individuals experience in a security role. This course covers Domain 5 Incident Response which counts for 22% of the exam.
Prerequisites
two years of hands-on experience securing AWS and 5 years or more in IT security experience designing and implementing security solutions.
Meet the expert
Zeal works primarily as a Cloud Security Consultant guiding organizations to re-build their infrastructure with security in mind. Zeal also holds more then 13+ certifications ranging from RedHat Certified Architect to AWS Security.
Course outline
Module 16
Cryptography (31:45)
- Introduction (00:08)
- Cryptography (11:38)
- Protocols (04:08)
- Plain Text vs Encrypted Text Protocols - (07:07)
- Disk Level Encryption (08:34)
- Summary (00:08)
CloudHSM (33:09)
- Introduction (00:08)
- CloudHSM (05:49)
- CloudHSM Pointers (03:10)
- AWS KMS (05:37)
- Demo: KMS (11:26)
- KMS Architecture (06:50)
- Summary (00:08)
Module 17
Schedule Key Deletion (37:47)
- Introduction (00:08)
- Schedule Key Deletion (07:04)
- Asymmetric Key Encryption (11:10)
- Asymmetric Key with KMS (10:40)
- Digital Signing with KMS (08:36)
- Summary (00:08)
Data Key caching (22:14)
- Introduction (00:08)
- Data Key Caching (08:44)
- AWS KMS - Key Deletion EBS Use-Case (04:44)
- Unmanageable CMK (03:10)
- KMS - Authentication and Access Control (05:18)
- Summary (00:08)
KMS Policy Evaluation Logic (35:14)
- Introduction (00:08)
- KMS Policy Evaluation Logic - Use Case 01 (03:01)
- KMS Policy Evaluation Logic - Use Case Answer 01 (04:25)
- KMS Policy Evaluation Logic - Use Case 02 (01:56)
- KMS Policy Evaluation Logic - Use Case Answer 02 (03:08)
- KMS Policy Evaluation Logic - Use Case 03 (00:44)
- KMS Policy Evaluation Logic - Use Case Answer 03 (01:56)
- KMS Grants (12:00)
- KMS Imported Key Material (07:44)
- Summary (00:08)
Module 18
S3 Encryption (31:27)
- Introduction (00:08)
- S3 Encryption (13:11)
- Migrating KMS Encrypted Data Across Regions (07:19)
- Multi-Region KMS (10:41)
- Summary (00:08)
Benefits of CloudHSM over KMS (30:42)
- Introduction (00:08)
- Benefits of CloudHSM over KMS (02:19)
- S3 Encryption (13:11)
- Classic Load Balancer (10:26)
- Load Balancer Types NE (04:29)
- Summary (00:08)
Overview of Application Load Balancer (29:00)
- Introduction (00:08)
- Overview of ALB (07:31)
- ALB - Path Based Routing (10:35)
- ELB Access Logs (10:37)
- Summary (00:08)
Module 19
Understanding HTTPS connections (30:01)
- Introduction (00:08)
- HTTPS (16:53)
- AWS Certificate Manager (09:46)
- Demo: AWS Certificate Manager (03:05)
- Summary (00:08)
Glacier Vault (27:23)
- Introduction (00:08)
- Glacier Vault (07:40)
- DynamoDB Encryption Client (02:57)
- AWS Secrets Manager (05:59)
- Encrypted Context (10:28)
- Summary (00:08)
DNS Cache Poisioning (22:43)
- Introduction (00:08)
- DNS Cache Poisoning (04:16)
- DNS SEC Overview (10:12)
- Demo: DNS SEC (07:57)
- Summary (00:08)