Getting started with the course
  • Understanding AWS Security Specialty exams
Domain 1 - Incident Response
  • Introduction to Domain 1
  • Case Study of Hacked Server
  • Dealing with AWS Abuse Notice
  • AWS GuardDuty
  • Whitelisting Alerts in AWS GuardDuty
  • Document - GuardDuty Alert Lists
  • Centralized Dashboards for GuardDuty Findings
  • Understanding Incident Response Terminology
  • Incident Response Use-Cases for Exams
  • Use Case - Dealing with Exposed Access Keys
  • Use Case - Dealing with compromised EC2 Instances
  • Incident Response in Cloud
  • Penetration Testing in AWS (New)
  • Quiz - Domain 1: Incident Response
  • Notes - Domain 1
Domain 2 - Logging & Monitoring
  • Introduction to Vulnerability, Exploit, Payload
  • VEP Practical - Hacking inside a test farm
  • Understanding Automated Vulnerability Scanners
  • Common Vulnerabilities Exposures & CVSS
  • Introduction to AWS Inspector
  • AWS Inspector Vulnerability Scans
  • AWS Security Hub
  • Overview of Layer 7 Firewalls
  • Understanding AWS WAF
  • Implementing AWS WAF with ALB
  • Overview of AWS Systems Manager
  • Configuring SSM Agent
  • Overview of Sessions Manager
  • SSM - Run Command
  • Overview of Patch Manager
  • Implementing Compliance and Patch Baselines
  • EC2 Systems Manager - Parameter Store
  • Understanding CloudWatch Logs
  • Pushing Linux system logs to CloudWatch
  • Document - CloudWatch Logs Policies
  • CloudWatch Events
  • AWS Athena
  • Athena - Code Samples
  • Overview of AWS CloudTrail
  • Improved Governance - AWS Config 01
  • Improved Governance - AWS Config 02
  • Trusted Advisor
  • CloudTrail - Log File Integrity Validation
  • Document - S3 Log File Validation
  • Digest Delivery Times
  • Overview of AWS Macie (New)
  • Creating our First Alert with AWS Macie (New)
  • S3 Event Notification
  • VPC Flow Logs
  • Centralized Logging Architecture
  • Cross-Account Logging for CloudTrail and Config
  • Document - Centralized Logging Policy
  • Overview of Cross-Account Log Data Sharing
  • Cross-Account CloudWatch Logs - Part 01
  • Cross-Account CloudWatch Logs - Part 02
  • AWS SNS
  • Document - Cross Account CloudWatch Logs
  • Quiz - Domain 2: Logging & Monitoring
  • Notes - Domain 2
Domain 3 - Infrastructure Security
  • Implementing Bastion Hosts
  • Introduction to Virtual Private Networks
  • OpenVPN is Awesome
  • OpenVPN - Part 02
  • Overview of AWS VPN Tunnels
  • Using AWS VPN for On-Premise to AWS connectivity
  • Configuring first IPSec tunnel with OpenSwan - Part 01
  • Document - IPSec Configuration
  • Configuring first IPSec tunnel with OpenSwan - Part 02
  • VPC Peering
  • VPC Endpoints
  • VPC Endpoints - Architectural Perspective
  • Gateway VPC Endpoints - Access Control
  • Gateway Endpoint ACL (Resource)
  • Understanding Interface VPC Endpoints
  • Implementing Interface Endpoints
  • Network ACL
  • Understanding Stateful vs Stateless Firewalls
  • IDS / IPS in AWS
  • EBS Architecture & Secure Data Wiping
  • Understanding the Content Delivery Networks
  • Demo - CloudFront Distribution
  • Understanding Edge Locations
  • Deploying Cloudfront Distribution - Part 01
  • Deploying Cloudfront Distribution - Part 02
  • Understanding the Origin Access Identity
  • Understanding importance of SNI in TLS protocol
  • Overview of CloudFront Signed URLs
  • Implementing CloudFront Signed URLs
  • Real World example on DOS Implementation
  • AWS Shield
  • Mitigating DDOS Attacks
  • Document - DDoS References
  • Introduction to Application Programming Interface (API)
  • Understanding the working of API
  • Building Lambda Function for our API