Autoplay
Autocomplete
Previous Lesson
Complete and Continue
AWS Certified Security - Specialty
INTRODUCTION & SCENARIO
Public Introduction (6:00)
Finding and Using the Course Resources (14:31)
Site tools and features (8:36)
Scenario - Animals4life (13:28)
Connect with other students and your instructor (3:10)
COURSE UPGRADES - SAVE $ WHEN ADDING MORE COURSES
SHARED LESSONS [SHAREDALL] [ASSOCIATESHARED] etc...
🚨 READ ME 🚨 - ENABLE EMAIL UPDATES (IT'S WORTH IT)
Course Fundamentals and AWS Accounts
AWS Accounts - The Basics (11:33)
[DEMO] ACCOUNTS - STEP1 - Creating GENERAL AWS Account (14:44)
Multi-factor Authentication (MFA) (8:25)
[DEMO] ACCOUNTS - STEP2 - Securing GENERAL AWS Account (9:44)
[DEMO] ACCOUNTS - STEP3 - Creating a Budget (6:46)
[DOITYOURSELF] Creating the Production Account (4:59)
Identity and Access Management (IAM) Basics (13:01)
[DEMO] ACCOUNTS - STEP4 - Adding IAMADMIN to GENERAL Account (12:36)
[DEMO] ACCOUNTS - STEP4 - Adding IAMADMIN to PRODUCTION Account (10:17)
IAM Access Keys (7:10)
[DEMO] Creating Access keys and setting up AWS CLI v2 tools (17:43)
Networking and Technical Fundamentals (moved to dedicated course)
TECH FUNDAMENTALS CONTENT (!!PLEASE READ ME!!)
Domain 6: Management and Security Governance [SCS-C02]
AWS Organizations (12:56)
[SHAREDALL] [DEMO] AWS Organizations (19:48)
Service Control Policies (SCP) (12:43)
[SHAREDALL] [DEMO] Using Service Control Policies (16:45)
AWS Control Tower (15:42)
AWS Config (6:13)
AWS Service Catalog (7:07)
AWS Resource Access Manager (RAM) (14:43)
Trusted Advisor (8:54)
CloudFormation Physical & Logical Resources (7:30)
CloudFormation Template and Pseudo Parameters (6:53)
CloudFormation Intrinsic Functions (14:28)
CloudFormation Mappings (4:30)
CloudFormation Outputs (3:37)
CloudFormation Conditions (7:24)
CloudFormation DependsOn (7:14)
CloudFormation Wait Conditions & cfn-signal (11:52)
CloudFormation Nested Stacks (13:55)
CloudFormation Cross-Stack References (10:05)
CloudFormation Deletion Policy (5:24)
CloudFormation Stack Roles (6:47)
CloudFormation ChangeSets (11:03)
CloudFormation Custom Resources (11:03)
Domain 4: Identity and Access Management
[ASSOCIATESHARED] IAM Identity Policies (15:51)
[ASSOCIATESHARED] IAM Users and ARNs (13:49)
[ASSOCIATESHARED] IAM Groups (7:48)
[ASSOCIATESHARED] IAM Roles - The Tech (8:13)
[ASSOCIATESHARED] When to use IAM Roles (15:27)
Service-linked Roles and PassRole (5:16)
Security Token Service (STS) (6:53)
[ASSOCIATESHARED] EC2 Instance Roles & Profile (4:18)
IAM Policy Variables (4:58)
Policy Interpretation Deep Dive - Example 1 (10:23)
Policy Interpretation Deep Dive - Example 2 (9:11)
Policy Interpretation Deep Dive - Example 3 (10:59)
AWS Permissions Evaluation (10:25)
IAM Permissions Boundaries and Delegation (17:28)
External ID … confused deputy (9:07)
Directory Service Deep Dive (Microsoft AD) (10:11)
Directory Service Deep Dive (AD Connector) (7:37)
What is ID Federation? (6:08)
Amazon Cognito - User and Identity Pools (14:44)
[MINIPROJECT] Implementing Web Identity Federation (WEBIDF) - PART1 (14:56)
[MINIPROJECT] Implementing Web Identity Federation (WEBIDF) - PART2 (14:32)
[MINIPROJECT] Implementing Web Identity Federation (WEBIDF) - PART3 (16:32)
[MINIPROJECT] Implementing Web Identity Federation (WEBIDF) - PART4 (24:20)
[MINIPROJECT] Implementing Web Identity Federation (WEBIDF) - PART5 (5:02)
SAML Federation (this is the old way of doing things, but you need to know the architecture) (12:21)
IAM Identity Center (formally AWS SSO) (9:32)
[DEMO] Adding Single Sign-on to the Animals4life ORG - PART1 (14:53)
[DEMO] Adding Single Sign-on to the Animals4life ORG - PART2 (12:23)
[ASSOCIATESHARED] S3 PreSigned URLs (11:11)
[SHAREDALL] [DEMO] Creating and using PresignedURLs (18:23)
[ASSOCIATESHARED] S3 Security (Resource Policies & ACLs) (18:19)
S3 Object Lock (9:52)
S3 Versioning & MFA (7:41)
[DEMO] Cross Account Access to S3 - SETUP - STAGE1 (4:29)
[DEMO] Cross Account Access to S3 - ACL - STAGE2 (9:39)
[DEMO] Cross Account Access to S3 - BUCKET POLICY - STAGE3 (9:38)
[DEMO] Cross Account Access to S3 - ROLE - STAGE4 (8:17)
EC2 Instance Metadata (15:46)
Domain 1: Threat Detection and Incident Response
AWS Abuse Notice, UAP & Penetration Testing (7:18)
AWS Guardduty 101 (4:14)
AWS Security Hub (5:02)
Amazon Detective (3:12)
Revoking IAM Role Temporary Security Credentials (9:23)
[DEMO] Revoking Temporary Credentials - PART1 (12:12)
[DEMO] Revoking Temporary Credentials - PART2 (10:20)
Domain 3: Infrastructure Security
Public and Private AWS Services (7:04)
[SHAREDALL] Custom VPCs - PART1 - THEORY (10:10)
[SHAREDALL] [DEMO] Custom VPCs - PART2 - DEMO [UPDATED20231129] (5:40)
[ASSOCIATESHARED] VPC Subnets (10:42)
[SHAREDALL] [DEMO] Implement multi-tier VPC subnets [UPDATED20231129] (15:03)
DHCP in a VPC (7:02)
VPC Router Deep Dive (13:21)
Stateful vs Stateless firewalls (14:04)
Network Access Control lists (NACL) (12:38)
Security Groups (SG) (11:48)
Internet Gateway (IGW) Ipv4 and IPv6 (15:52)
Egress Only Internet gateway (6:46)
Bastion Hosts & Authentication (6:16)
[ASSOCIATESHARED] [DEMO] Configuring A4L public subnets and Jumpbox - PART1 [UPDATED20231119] (13:45)
[ASSOCIATESHARED] [DEMO] Configuring A4L public subnets and Jumpbox - PART2 [UPDATED20231119] (11:35)
Port Forwarding (3:33)
Nat Instance (9:41)
Nat Gateway (15:24)
[ASSOCIATESHARED] [DEMO] Implementing private internet access using NAT Gateways (19:25)
IP Sec VPN Fundamentals (14:54)
Virtual Private Gateway Deep Dive (VGW) (8:04)
AWS Site-to-Site VPN (18:05)
[DEMO] Simple Site2Site VPN - STAGE0 - SETUP (4:52)
[DEMO] Simple Site2Site VPN - STAGE1 - AWS VPN (10:01)
[DEMO] Simple Site2Site VPN - STAGE2 - onprep pfSense Config (17:09)
[DEMO] Simple Site2Site VPN - STAGE3 - Routing & Security (10:29)
[DEMO] Simple Site2Site VPN - STAGE4 - Testing (5:42)
[DEMO] Simple Site2Site VPN - STAGE5 - Cleanup (1:50)
Client VPN (6:31)
Gateway VPC Endpoints (11:14)
Interface VPC Endpoints (11:25)
[SHAREDALL] [DEMO] VPC Endpoints - Interface - PART1 (11:59)
[SHAREDALL] [DEMO] VPC Endpoints - Gateway - PART2 (9:59)
[SHAREDALL] [DEMO] Egress-Only Internet Gateway - PART3 (7:57)
Endpoint Policies (12:11)
[DEMO] Private S3 Buckets - PART1 - SETUP (8:15)
[DEMO] Private S3 Buckets - PART2 (17:02)
Advanced VPC DNS & DNS Endpoints (15:01)
VPC Peering (9:04)
[DEMO] VPC Peering (22:38)
EBS Encryption Architecture (8:22)
[ASSOCIATESHARED] [DEMO] EBS Volumes - PART1 (15:16)
[ASSOCIATESHARED] [DEMO] EBS Volumes - PART2 (14:13)
[ASSOCIATESHARED] [DEMO] EBS Volumes - PART3 (14:27)
EBS Volume Secure wipes (4:12)
S3 Access Points (5:52)
CloudFront - Architecture (14:56)
AWS Certificate Manager (ACM) (11:21)
CloudFront - SSL/TLS & SNI (14:59)
CloudFront - Security - OAI/OAC & Custom Origins (8:50)
CloudFront - Georestrictions (9:40)
CloudFront - Private Behaviours, Signed URL & Cookies (7:49)
CloudFront - Field Level Encryption (9:00)
Lambda@edge (8:03)
DDOS 101 (14:38)
AWS Shield (9:47)
AWS Network Firewall - 101 (14:18)
Implementing DNSSEC using Route53 (17:43)
Domain 2: Security Logging and Monitoring [SCS-C02]
Cloudwatch 101 - PART1 (9:44)
Cloudwatch 101 - PART2 (9:19)
CloudWatch Logs Architecture (13:44)
CloudWatch Events and EventBridge (6:54)
S3 Events (4:32)
[DEMO] S3 Events + Lambda (Pixelator) - PART1 (18:03)
[DEMO] S3 Events + Lambda (Pixelator) - PART2 (17:43)
SNS Architecture (7:49)
Amazon Inspector (6:28)
AWS Trusted Advisor (8:54)
VPC Flow Logs (9:56)
Application Layer (7) Firewalls (7:44)
Web Application Firewall (WAF), WEBACLs, Rule Groups and Rules (19:18)
[ASSOCIATESHARED] [DEMO] Logging and Metrics with CloudWatch Agent-PART1 (11:51)
[ASSOCIATESHARED] [DEMO] Logging and Metrics with CloudWatch Agent-PART2 (8:08)
CloudTrail Architecture (11:40)
[SHAREDALL] [DEMO] Implementing an Organizational Trail (18:23)
CloudTrail log file integrity validation (6:28)
AWS Athena 101 (8:19)
[DEMO] Athena Demo - PART1 (13:31)
[DEMO] Athena Demo - PART2 (11:37)
Amazon Macie 101 (12:04)
[DEMO] Amazon Macie (15:35)
AWS Glue 101 (6:23)
AWS Artifact (1:47)
Domain 5: Data Protection
What is a hardware security Module (HSM) (6:40)
AWS Key Management Service (KMS) 101 (18:38)
CloudHSM (14:36)
[SHAREDALL] S3 Object Encryption CSE/SSE (23:31)
[SHAREDALL] [DEMO] Object Encryption and Role Separation (14:50)
Envelope Encryption (8:06)
Bucket Keys (5:59)
AWS Managed Keys vs Customer managed Keys (6:45)
[SHAREDALL] [DEMO] KMS - Encrypting the battleplans with KMS (12:43)
Importing Key Material vs Generated Key Material (7:37)
Asymmetric keys in KMS (3:25)
Digital Signing using KMS (4:16)
Encryption SDK - Data Key Caching (6:27)
KMS security Model & Key Policies (5:51)
KMS Grants (7:16)
KMS Multi-region keys (5:29)
CloudHSM vs KMS (3:22)
KMS Custom Key Stores (4:49)
AWS Secrets Manager 101 (7:44)
RDS Encryption & IAM Authentication (7:03)
DynamoDB Encryption (5:21)
KMS encryption context (8:13)
[SHAREDALL] Elastic Load Balancer Architecture - PART1 (10:18)
Elastic Load Balancer Architecture (ELB) - PART2 (12:32)
[SHAREDALL] Application Load balancing (ALB) vs Network Load Balancing (NLB) (16:20)
ELB : SSL Offload and Session Stickiness (12:11)
[SHAREDALL] [DEMO] Seeing Session Stickiness in Action (12:57)
Load Balancer Security Policies (3:28)
EXAM PREP
General AWS Exam Technique - 3 Phase Approach (8:56)
General AWS Question Technique - PART1 (14:12)
General AWS Question Technique - PART2 (9:01)
Exam Question Walkthrough #1 (8:16)
Exam Question Walkthrough #2 (4:53)
Practice Exam #1 - PART1 (1-20)
Practice Exam #1 - PART2 (21-40)
Practice Exam #1 - PART3 (41-60)
CONGRATULATIONS - YOU'VE FINISHED
Thanks and a Favour (3:15)
COURSE UPGRADES - SAVE $ WHEN ADDING MORE COURSES
Teach online with
SAML Federation (this is the old way of doing things, but you need to know the architecture)
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock