Autoplay
Autocomplete
Previous Lesson
Complete and Continue
AWS Certified Security Specialty
Introduction to Security Models
Shared Responsibility Model (13:26)
Client Security Responsibility Model (8:38)
Our Lab Setup (4:43)
ROOT MFA - First Setup (6:31)
VPC & Networking
VPC, Subnets & EC2 (18:14)
Internet Gateways (4:47)
NAT Gateways (8:16)
Interface Level Flow Logs (14:06)
Network ACL (7:56)
Introduction to Firewalls (15:31)
Understanding Stateful vs Stateless Firewalls (9:30)
2 modes of Firewalls (5:46)
Understanding Networking Sockets (11:07)
Introduction to Security Groups (4:51)
Connection of Security Group & NIC Cards (6:29)
Egress Rules - The Real Challenge (12:38)
IPTABLES & Instance Metadata (11:57)
IDS / IPS in AWS (8:23)
Security Logging & Monitoring
Introduction to Security Operations Center (5:39)
Introduction to Security Logging & Monitoring (8:28)
Understanding CloudTrail - Part 01 (10:46)
More insights into CloudTrail - Part 02 (8:19)
Getting Started with CloudWatch (5:43)
Understanding CIS Benchmarks (6:05)
Security Monitoring with CIS Benchmarks - 01 (9:08)
Security Monitoring with CIS Benchmarks - 02 (10:18)
S3 Masterclass
S3 Bucket Policies (7:18)
Durability vs Availability (7:53)
S3 Storage Classes (8:25)
S3 Lifecycle Policies (8:43)
S3 - Versioning (6:02)
S3 - Cross Region Replication (7:37)
Understanding Signed URL's (13:47)
The Cryptography KungFu
Introduction to Cryptography (12:14)
Plain Text vs Encrypted Text Based Algorithms (7:07)
Challenge with storing encryption Keys & Intro to CloudHSM (9:44)
AWS Key Management Service (10:25)
AWS Key Management Service - Part 02 (8:42)
AWS Key Management Service - Part 03 (10:24)
Identity Access Management
Understanding the Principle of Least Privilage (10:40)
Revising IAM (4:16)
IAM Best Practices - Part 01 (11:51)
IAM Best Practices - Part 02 (9:53)
Delegation - Cross Account Trust - Part 01 (5:07)
Delegation - Cross Account Trust - Part 02 (12:07)
AWS Security Token Service (7:46)
AWS STS - Migrating the EC2 Credentials (4:21)
AWS STS - Architecting IAM User Keys the right way (16:55)
AWS STS - Automating the temporary credentials (4:27)
Understanding Federation - Part 01 (6:30)
Understanding Federation - Part 02 (8:10)
Understanding SAML for SSO (14:38)
Capturing SAML Assertion packets with Tracer (7:19)
Establishing trust between IdP & SP (20:32)
Choosing right IdP (6:15)
Content Delivery Networks
Introduction to Reverse Proxies (10:15)
Understanding the Content Delivery Networks (5:30)
Understanding Edge Locations (7:47)
Deploying CloudFront Distribution - Part 01 (10:53)
Understanding Origin Access Identity (10:53)
Understanding the Cache Hits / Misses in CDN (9:18)
Mitigating the DDOS Attacks (9:50)
CloudFront - Signed URL - 01 (6:53)
CloudFront Signed URL - 02 (9:55)
Trusted Advisor (8:39)
Governance, Risk & Compliance
Let's Understand need of Compliance (7:35)
The need of PCI DSS (8:49)
Improved Governance - AWS Config 01 (13:46)
Improved Governance - AWS Config 02 (9:16)
Intermediary Node for Routing Traffic
Introduction to Virtual Private Networks (8:43)
OpenVPN is Awesome (8:16)
OpenVPN - Part 02 (5:24)
VPC Peering (4:56)
VPC Peering - Part 02 (New) (8:50)
IPSec Tunnels for Site to Site VPN (6:05)
Transit VPC (7:04)
Posture of Vulnerability Assessment in Cloud
Introduction to Vulnerability, Exploit, Payload (5:26)
Understanding Automated Vulnerability Scanners (8:23)
Common Vulnerability Exposures & CVSS (8:38)
Introduction to AWS Inspector (7:25)
Configure AWS Inspector (6:42)
AWS Inspector & Nessus - CVE Scans (9:04)
Best Practices (8:12)
Important Points for Exams
Exam Preparation (7:55)
ROOT MFA - First Setup
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock