AWS Certified Security-Specialty Certification
- Offered byVepsun Technologies
AWS Certified Security-Specialty Certification at Vepsun Technologies Overview
Duration | 2 months |
Total fee | ₹6,000 |
Mode of learning | Online |
Credential | Certificate |
AWS Certified Security-Specialty Certification at Vepsun Technologies Highlights
- Earn a certificate from Vepsun
- Get a dedicated Student Success Manager
- Learn from Real-life Case Studies & Assignments
- Gain from 1-on-1 Industry Mentor
- Get personalised Resume Feedback
AWS Certified Security-Specialty Certification at Vepsun Technologies Course details
- For Working Professionals/Students
- AWS EC2
- AWS-RDS
- Dynomo DB
- AWS-VPC
- Route53
- EBS(Elestic Block Storage)
- AWS stands for Amazon Web Service; it is a collection of remote computing services also known as a cloud computing platform
- This new realm of cloud computing is also known as IaaS or Infrastructure as a Service
AWS Certified Security-Specialty Certification at Vepsun Technologies Curriculum
Cloud Security Introduction
Cloud Security fundamentals
AWS security model
Shared Responsibility
Exam Outline
Incident Response
Given an AWS abuse notice, evaluate the suspected compromised instance or exposed access keys.
Preparation stages for incident response
Mitigation steps to perform Incident response steps
Verify that the Incident Response plan includes relevant AWS services.
Dealing with exposed access keys
Evaluated suspected compromised EC2 Instances
Evaluate the configuration of automated alerting, and execute possible remediation of security-related incidents and emerging issues.
AWS Guard duty
Penetration testing
Logging and Monitoring (VPC)
Design and implement security monitoring and alerting.
Design and implement a logging solution.
Continuous Security Monitoring
Introduction to Vulnerability Assessment
AWS Inspector
AWS Inspector Assessment targets
AWS EC2 systems manager
AWS Config
Understanding CloudWatch
VPC Flow Logs
CloudWatch Events
AWS Cloud Trail
AWS Macie
AWS Detective
AWS Security Hub
S3 Event notifications
Trusted advisor recommendations
Troubleshoot security monitoring and alerting.
Troubleshoot logging solutions.
Infrastructure Security
Design edge security on AWS.
Design and implement a secure network infrastructure.
AWS Organizations
Managing OUs
CloudFront
AWS CloudFront Custom SSL
Firewalls
Security groups
Network ACLs
IPS/IDS concepts in cloud
AWS Web Application Firewall (WAF)
AWS Shield concepts
DDoS Mitigation
Network Segmentation
Bastion Hosts
Virtual Private Cloud (VPC)
VPC Endpoints
EC2 Tenancy
Compliance Frameworks
AWS lambda fundamentals
AWS Simple Email Service
AWS Route53 DNS
Troubleshoot a secure network infrastructure
Design and implement host-based security
Identity and Access Management
Design and implement a scalable authorization and authentication system to access AWS resources.
Understand the Principle of Least Privilege
IAM Policies
IAM JSON Policy Elements
IAM Roles
IAM Permission boundaries
Evaluating effective permissions
Understanding Delegation
Cross account policies & roles
Understanding Federation
AWS Directory services
AWS Organizations
Single Sign-On
SAML Overview Concepts
S3 Security
Cross Account S3 access
S3 Versioning
S3 MFA delete
AWS License manager
Troubleshoot an authorization and authentication system to access AWS resources
Identity and Access Management
Design and implement a scalable authorization and authentication system to access AWS resources.
Understand the Principle of Least Privilege
IAM Policies
IAM JSON Policy Elements
IAM Roles
IAM Permission boundaries
Evaluating effective permissions
Understanding Delegation
Cross account policies & roles
Understanding Federation
AWS Directory services
AWS Organizations
Single Sign-On
SAML Overview Concepts
S3 Security
Cross Account S3 access
S3 Versioning
S3 MFA delete
AWS License manager
Troubleshoot an authorization and authentication system to access AWS resources.