Table of contents
Introduction
27mins
Lock icon
Course Introduction | 2m
Lock icon
Exploring the Cloud Playground | 4m
Lock icon
About the Exam | 9m
Lock icon
Using the AWS CLI and AWS SDK | 3m
Lock icon
Shared Responsibility Model | 5m
Lock icon
Course Updates and Changelogs | 1m
Threat Detection and Incident Response Domain
129mins
Lock icon
Recording AWS Resource Changes with AWS Config | 14m
Lock icon
Demo: Analyzing Environments with AWS Trusted Advisor | 10m
Lock icon
Threat Detection with Amazon GuardDuty | 7m
Lock icon
Demo: Viewing Amazon GuardDuty Findings | 4m
Lock icon
Remediating Amazon GuardDuty Findings | 5m
Lock icon
Demo: Account Checkups with the AWS Health Dashboard | 7m
Lock icon
Assessing EC2 Instances with Amazon Inspector | 9m
Lock icon
Demo: Inspecting EC2 Instances | 6m
Lock icon
Automated Patching Using AWS Systems Manager | 15m
Lock icon
Demo: Incident Response and Recovery with AWS Systems Manager | 10m
Lock icon
Security Compliance Reporting Using AWS Artifact | 5m
Lock icon
Responding to AWS Abuse Notices | 4m
Lock icon
AWS Incident Response | 9m
Lock icon
Amazon Detective | 5m
Lock icon
Section Summary | 10m
Lock icon
| 0m
Security Logging and Monitoring Domain
324mins
Lock icon
Logging and Metrics Using Amazon CloudWatch | 14m
Lock icon
Demo: Sending Custom Logs to CloudWatch | 14m
Lock icon
Using CloudWatch for Resource Monitoring | 1h 0m
Lock icon
Auditing AWS Accounts with AWS CloudTrail | 14m
Lock icon
Demo: Examining CloudTrail Events | 11m
Lock icon
Remediating EC2 Auto Scaling Group Modifications with EventBridge | 45m
Lock icon
Logging with Amazon Kinesis and Amazon OpenSearch (Elasticsearch) | 11m
Lock icon
Demo: Querying Data with Amazon Athena | 9m
Lock icon
Demo: Enabling VPC Flow Logs Part 1 | 6m
Lock icon
Demo: Enabling VPC Flow Logs Part 2 | 11m
Lock icon
Work with AWS VPC Flow Logs for Network Monitoring | 1h 45m
Lock icon
Continuously Auditing AWS with AWS Audit Manager | 9m
Lock icon
Section Summary | 11m
Lock icon
| 0m
Infrastructure Security Domain
338mins
Lock icon
AWS Key Management Service (KMS) Fundamentals | 13m
Lock icon
Implementing Envelope Encryption with AWS KMS | 8m
Lock icon
Demo: Generating Data Keys for Envelope Encryption | 10m
Lock icon
Demo: Multi-Region Keys, Imports, and Deletion with AWS KMS | 8m
Lock icon
Creating and Securing Customer Managed Keys with AWS KMS | 1h 0m
Lock icon
Creating More Secure Keys with AWS CloudHSM | 10m
Lock icon
Blocking Malicious Traffic with AWS WAF and AWS Firewall Manager | 14m
Lock icon
Demo: Implementing AWS WAF on Application Load Balancers | 11m
Lock icon
Intrusion Detection and Prevention via AWS Network Firewall | 10m
Lock icon
Locking Down CloudFront Distributions Integrated with Amazon S3 | 13m
Lock icon
Origin Access Control (OAC) | 4m
Lock icon
Configuring an Origin Access Control for an AWS CloudFront Distribution | 1h 0m
Lock icon
Securing HTTP Calls with Lambda@Edge | 10m
Lock icon
Preventing DDoS Attacks with AWS Shield | 6m
Lock icon
Auditing Compromised Resources with AWS Security Hub | 8m
Lock icon
Demo: Exploring Security Scores in AWS Security Hub | 4m
Lock icon
Network Security via VPNs | 8m
Lock icon
Customizing VPCs, Routing, and Security Controls - Part 1 | 8m
Lock icon
Customizing VPCs, Routing, and Security Controls - Part 2 | 10m
Lock icon
Securely Connecting to VPCs | 12m
Lock icon
Private Service Connections via VPC Endpoints | 7m
Lock icon
AWS KMS Key Types | 9m
Lock icon
Web App Attacks | 10m
Lock icon
Section Summary | 14m
Lock icon
| 0m
Identity and Access Management Domain
434mins
Lock icon
IAM Refresher | 9m
Lock icon
Important AWS Root User Account Concepts | 4m
Lock icon
Exploring AWS Identities - Part 1 | 8m
Lock icon
Exploring AWS Identities - Part 2 | 10m
Lock icon
Granting and Denying Access via IAM Policies | 14m
Lock icon
Interpreting IAM Policies | 13m
Lock icon
Create and Assume Roles in AWS | 1h 0m
Lock icon
Demo: Troubleshooting Conflicting IAM Policies | 14m
Lock icon
Demo: Setting Permissions Boundaries | 14m
Lock icon
Demo: Generating IAM Credential Reports | 7m
Lock icon
Create Users and Manage Permissions Using Groups and Policies in IAM | 1h 0m
Lock icon
Importance of AWS Security Token Service (STS) | 12m
Lock icon
Demo: Using Different STS Sources | 17m
Lock icon
Using EC2 Roles and Instance Profiles in AWS | 1h 45m
Lock icon
Using Web Identity Federation | 7m
Lock icon
Creating User Pools and Identity Pools in Amazon Cognito | 10m
Lock icon
Authentication with AWS Directory Service - Part 1 | 10m
Lock icon
Authentication with AWS Directory Service - Part 2 | 10m
Lock icon
Demo: Logging In to AWS via AWS Single Sign-On (SSO) | 11m
Lock icon
Leveraging AWS Organizations for AWS Account Access | 16m
Lock icon
Section Summary | 15m
Lock icon
| 0m
Data Protection Domain
229mins
Lock icon
TLS Certificate Management with AWS Certificate Manager (ACM) | 14m
Lock icon
Secure Elastic Load Balancing (ELB) - Part 1 | 13m
Lock icon
Secure Elastic Load Balancing (ELB) - Part 2 | 5m
Lock icon
Demo: Deploying a TLS-Secured Application Load Balancer | 9m
Lock icon
Demo: Increasing Security within DynamoDB | 9m
Lock icon
Controlling Sensitive Data with Amazon Macie | 9m
Lock icon
Data Lifecycle | 9m
Lock icon
Secure Storage with Amazon S3 | 13m
Lock icon
Advanced S3 Security Configuration | 1h 30m
Lock icon
Creating a Basic Amazon S3 Lifecycle Policy | 45m
Lock icon
Section Summary | 10m
Lock icon
| 0m
Management and Security Governance (and Miscellaneous)
56mins
Lock icon
Section Overview | 1m
Lock icon
Controlling Access to Amazon QuickSight | 7m
Lock icon
Demo: Complicated KMS-Related Issues - Recovering Encrypted EBS Volumes | 10m
Lock icon
Parameter Store and Secrets Manager for Sensitive Data | 14m
Lock icon
Filtering and Rejecting EC2 Instance Traffic | 3m
Lock icon
Kinesis Encryption | 5m
Lock icon
Cross-Region Networking | 5m
Lock icon
Section Summary | 8m
Lock icon
| 0m
Conclusion
1min
Lock icon
Congratulations! What's Next? | 1m
Lock icon
| 0m
Lock icon
| 0m
Lock icon
| 0m
About the author
Andru Estes
Andru has been working within the IT industry for just under 15 years. He started off in Systems Administration and Systems Engineering within virtualization platforms like VMware and Hyper-V. Soon after that, he began his journey into the public cloud, where he quickly dove headfirst into AWS and Azure.
After working as a Cloud Architect and Consultant for the past 7 years, Andru found his other passion in being able to help students learn about the public cloud and general DevOps methodologies. If it involves public cloud, DevOps, or Python, then Andru is all about it!
More Courses by Andru E.
Get access now
Sign up to get immediate access to this course plus thousands more you can watch anytime, anywhere
Cancel
Close button icon