aws-certified-security-specialty

1: Incident Response

  • Case Study of Hacked Server
  • Dealing with AWS Abuse Notice
  • AWS GuardDuty
  • Whitelisting Alerts in AWS GuardDuty
  • Centralized Dashboards for GuardDuty Findings
  • Understanding Incident Response Terminology
  • Incident Response Use-Cases for Exams
  • Use Case – Dealing with Exposed Access Keys
  • Use Case – Dealing with compromised EC2 Instances
  • Incident Response in Cloud
  • Penetration Testing in AWS (New)

3:  Infrastructure Security

  • Implementing Bastion Hosts
  • Introduction to Virtual Private Networks
  • OpenVPN
  • Overview of AWS VPN Tunnels
  • Using AWS VPN for On-Premise to AWS connectivity
  • Configuring first IPSec tunnel with OpenSwan
  • VPC Peering
  • VPC Endpoints
  • VPC Endpoints – Architectural Perspective
  • Gateway VPC Endpoints – Access Control
  • Gateway Endpoint ACL (Resource)
  • Understanding Interface VPC Endpoints
  • Implementing Interface Endpoints
  • Network ACL
  • Understanding Stateful vs Stateless Firewalls
  • IDS / IPS in AWS
  • EBS Architecture & Secure Data Wiping
  • Understanding the Content Delivery Networks
  • Demo – CloudFront Distribution
  • Understanding Edge Locations
  • Deploying Cloudfront Distribution
  • Understanding the Origin Access Identity
  • Understanding importance of SNI in TLS protocol
  • Overview of CloudFront Signed URLs
  • Implementing CloudFront Signed URLs
  • Real World example on DOS Implementation
  • AWS Shield
  • Mitigating DDOS Attacks
  • Introduction to Application Programming Interface (API)
  • Understanding the working of API
  • Building Lambda Function for our API
  • Building our first API with API Gateway
  • Lambda & S3
  • EC2 Key-Pair Troubleshooting
  • EC2 Tenancy Attribute
  • AWS Artifact
  • [email protected] with Practical
  • AWS Simple Email Service (SES) (New)
  • DNS Resolution in VPC

5: Data Protection

  • Introduction to Cryptography
  • Plain Text vs Encrypted Text Based Algorithms
  • CloudHSM
  • AWS Key Management Service
  • Overview of Asymmetric Key Encryption
  • Asymmetric Keys with KMS
  • Digital Signing with KMS
  • AWS Key Management Service – Data Key Caching, Scheduled CMK Deletion, CMK Deletion & EBS Use-Case
  • Reducing Risk of Unmanageable CMK
  • KMS – Authentication and Access Control
  • KMS Grants
  • Importing Key Material to KMS
  • KMS ViaService
  • Migrating Encrypted KMS Data Across Regions
  • Benefits of CloudHSM over KMS
  • S3 Encryption
  • Revising Classic Load Balancers
  • Overview of Load Balancer Types
  • Overview of Application Load Balancer
  • Path Based Routing in ALB
  • Revising ELB Listener Configuration
  • ELB Listeners – Understanding HTTP vs TCP Listeners
  • Understanding AWS Certificate Manager
  • Deploying SSL/TLS certificate with ACM
  • Configuring ELB with HTTPS for SSL Offloading
  • Glacier Vault and Vault Lock
  • DynamoDB Encryption
  • Overview of AWS Secrets Manager
  • RDS Integration with AWS Secrets Manager
  • Encryption Context in KMS

2: Logging & Monitoring

  • Introduction to Vulnerability, Exploit, Payload
  • VEP Practical – Hacking inside a test farm
  • Understanding Automated Vulnerability Scanners
  • Common Vulnerabilities Exposures & CVSS
  • Introduction to AWS Inspector
  • AWS Inspector Vulnerability Scans
  • AWS Security Hub
  • Overview of Layer 7 Firewalls
  • Understanding AWS WAF
  • Implementing AWS WAF with ALB
  • Overview of AWS Systems Manager
  • Configuring SSM Agent
  • Overview of Sessions Manager
  • SSM – Run Command
  • Overview of Patch Manager
  • Implementing Compliance and Patch Baselines
  • EC2 Systems Manager – Parameter Store
  • Understanding CloudWatch Logs
  • Pushing Linux system logs to CloudWatch
  • CloudWatch Events
  • AWS Athena
  • Athena – Code Samples
  • Overview of AWS CloudTrail
  • Improved Governance – AWS Config 01
  • Improved Governance – AWS Config 02
  • Trusted Advisor
  • CloudTrail – Log File Integrity Validation
  • Digest Delivery Times
  • Overview of AWS Macie (New)
  • Creating our First Alert with AWS Macie (New)
  • S3 Event Notification
  • VPC Flow Logs
  • Centralized Logging Architecture
  • Cross-Account Logging for CloudTrail and Config
  • Overview of Cross-Account Log Data Sharing
  • Cross-Account CloudWatch Logs
  • AWS SNS

4: Identity & Access Management

  • Understanding AWS Organizations with Practical
  • Organizational Unit (OU) in AWS organization
  • IAM Policy Evaluation Logic
  • Identity and Resource Based Policies
  • Understanding IAM Policies
  • Delegation – Cross Account Trust
  • Cross Account IAM Policy Document
  • External ID in Delegation
  • EC2 Instance Meta-Data
  • Revising IAM Role
  • Understanding working of an IAM role
  • IPTABLES & Instance Meta-Data
  • IAM – Version Element
  • IAM Policy Variables
  • Principal and NotPrincipal Element
  • Implementing NotPrincipal Element
  • Conditionl Element
  • AWS Security Token Service
  • Understanding Federation
  • Understanding SAML for SSO
  • Overview of AWS Single Sign-On
  • Implementing AWS SSO
  • Integrating AWS SSO with AWS CLI
  • AWS Cognito
  • Understanding Active Directory
  • Introduction to AWS Directory Service
  • Domain Joining EC2 instance with Directory Service
  • Trusts in Active Directory
  • S3 Bucket Policies
  • Cross Account S3 Bucket Configuration
  • Canned ACL’s
  • Understanding Presigned URLs
  • S3 – Versioning
  • S3 – Cross Region Replication
  • S3 Object Lock
  • MFA Protected API Access
  • IAM Permission Boundaries
  • IAM and S3
  • Troubleshooting IAM Policies
Menu