TOIT Training
(909) 252-7584
[email protected]
Search
Log in
Menu
Home
Library
IT Library
Developer Courses
User Cuorses
Plans & Pricing
Features
About Us
Contact Sales
Roadmap
Home
Courses
AWS
AWS Certified Security – Specialty (SCS-C02)
Curriculum
8 Sections
30 Lessons
13 Hours
Expand all sections
Collapse all sections
Introduction and Success Planning
5
1.1
General Course Introduction
1.2
Review Exam Guide and Domains
1.3
Recommended Learning Prerequisites
1.4
Additional Resources to Prepare
1.5
Overview of the Security Pillar Design Principles
Review of Minimum Services Knowledge
3
2.1
Security, Identity, and Compliance
2.2
Networking and Content Delivery
2.3
Management and Governance
Threat Detection and Incident Response
3
3.1
Design and Implement an Incident Response Plan
3.2
Detect Security Threats and Anomalies by Using AWS Services
3.3
Respond to Compromised Resources and Workloads
Security Logging and Monitoring
4
4.1
Design a Log Analysis Solution
4.2
Troubleshoot Logging Solutions
4.3
Troubleshoot Security Monitoring and Alerting
4.4
Design and Implement Monitoring and Alerting to Address Security Events
Infrastructure Security
4
5.1
Troubleshoot Network Security
5.2
Design and Implement Network Security Controls
5.3
Design and Implement Security Controls for Compute Workloads
5.4
Design and Implement Security Controls for Edge Services
Identity And Access Management
2
6.1
Design, Implement, and Troubleshoot Authentication for AWS Resources
6.2
Design, Implement, and Troubleshoot Authorization for AWS Resources
Data Protection
4
7.1
Design and Implement Controls That Provide Confidentiality and Integrity for Data in Transit
7.2
Design and Implement Controls to Protect Credentials, Secrets, and Cryptographic Key Materials
7.3
Design and Implement Controls to Manage the Lifecycle of Data at Rest
7.4
Design and Implement Controls That Provide Confidentiality and Integrity for Data at Rest
Management and Security Governance
5
8.1
AWS Secure Landing Zone
8.2
Identify Security Gaps Through Architectural Reviews and Cost Analysis
8.3
Implement a Secure and Consistent Deployment Strategy for Cloud Resources
8.4
Evaluate the Compliance of AWS Resources
8.5
Develop a Strategy to Centrally Deploy and Manage AWS Accounts
This content is protected, please
login
and
enroll
in the course to view this content!