- Understanding AWS Security Specialty exams
- Introduction to Domain 1
- Case Study of Hacked Server
- Dealing with AWS Abuse Notice
- AWS GuardDuty
- Whitelisting Alerts in AWS GuardDuty
- Document - GuardDuty Alert Lists
- Centralized Dashboards for GuardDuty Findings
- Understanding Incident Response Terminology
- Incident Response Use-Cases for Exams
- Use Case - Dealing with Exposed Access Keys
- Use Case - Dealing with compromised EC2 Instances
- Incident Response in Cloud
- Penetration Testing in AWS (New)
- Quiz - Domain 1: Incident Response
- Notes - Domain 1
- Introduction to Vulnerability, Exploit, Payload
- VEP Practical - Hacking inside a test farm
- Understanding Automated Vulnerability Scanners
- Common Vulnerabilities Exposures & CVSS
- Introduction to AWS Inspector
- AWS Inspector Vulnerability Scans
- AWS Security Hub
- Overview of Layer 7 Firewalls
- Understanding AWS WAF
- Implementing AWS WAF with ALB
- Overview of AWS Systems Manager
- Configuring SSM Agent
- Overview of Sessions Manager
- SSM - Run Command
- Overview of Patch Manager
- Implementing Compliance and Patch Baselines
- EC2 Systems Manager - Parameter Store
- Understanding CloudWatch Logs
- Pushing Linux system logs to CloudWatch
- Document - CloudWatch Logs Policies
- CloudWatch Events
- AWS Athena
- Athena - Code Samples
- Overview of AWS CloudTrail
- Improved Governance - AWS Config 01
- Improved Governance - AWS Config 02
- Trusted Advisor
- CloudTrail - Log File Integrity Validation
- Document - S3 Log File Validation
- Digest Delivery Times
- Overview of AWS Macie (New)
- Creating our First Alert with AWS Macie (New)
- S3 Event Notification
- VPC Flow Logs
- Centralized Logging Architecture
- Cross-Account Logging for CloudTrail and Config
- Document - Centralized Logging Policy
- Overview of Cross-Account Log Data Sharing
- Cross-Account CloudWatch Logs - Part 01
- Cross-Account CloudWatch Logs - Part 02
- AWS SNS
- Document - Cross Account CloudWatch Logs
- Quiz - Domain 2: Logging & Monitoring
- Notes - Domain 2
- Implementing Bastion Hosts
- Introduction to Virtual Private Networks
- OpenVPN is Awesome
- OpenVPN - Part 02
- Overview of AWS VPN Tunnels
- Using AWS VPN for On-Premise to AWS connectivity
- Configuring first IPSec tunnel with OpenSwan - Part 01
- Document - IPSec Configuration
- Configuring first IPSec tunnel with OpenSwan - Part 02
- VPC Peering
- VPC Endpoints
- VPC Endpoints - Architectural Perspective
- Gateway VPC Endpoints - Access Control
- Gateway Endpoint ACL (Resource)
- Understanding Interface VPC Endpoints
- Implementing Interface Endpoints
- Network ACL
- Understanding Stateful vs Stateless Firewalls
- IDS / IPS in AWS
- EBS Architecture & Secure Data Wiping
- Understanding the Content Delivery Networks
- Demo - CloudFront Distribution
- Understanding Edge Locations
- Deploying Cloudfront Distribution - Part 01
- Deploying Cloudfront Distribution - Part 02
- Understanding the Origin Access Identity
- Understanding importance of SNI in TLS protocol
- Overview of CloudFront Signed URLs
- Implementing CloudFront Signed URLs
- Real World example on DOS Implementation
- AWS Shield
- Mitigating DDOS Attacks
- Document - DDoS References
- Introduction to Application Programming Interface (API)
- Understanding the working of API
- Building Lambda Function for our API