Curriculum
Course:
AWS Certified Security Specialty
Login
Curriculum
AWS Certified Security Specialty
Domain 1: Threat Detection and Incident Response
0/3
Design and implement an incident response plan
Text lesson
Preview
Detect security threats and anomalies by using AWS services
Text lesson
Preview
Respond to compromised resources and workloads
Text lesson
Preview
Domain 2: Security Logging and Monitoring
0/5
Design and implement monitoring and alerting to address security events
Text lesson
Preview
Troubleshoot security monitoring and alerting
Text lesson
Preview
Design and implement a logging solution
Text lesson
Preview
Troubleshoot logging solutions
Text lesson
Preview
Design a log analysis solution
Text lesson
Preview
Domain 3: Infrastructure Security
0/4
Design and implement security controls for edge services
Text lesson
Preview
Design and implement network security controls
Text lesson
Preview
Design and implement security controls for compute workloads
Text lesson
Preview
Troubleshoot network security
Text lesson
Preview
Domain 4: Identity & Access Management
0/2
Design, implement, and troubleshoot authentication for AWS resources
Text lesson
Preview
Design, implement, and troubleshoot authorization for AWS resources
Text lesson
Preview
Domain 5: Data Protection
0/4
Design and implement controls that provide confidentiality and integrity for data in transit
Text lesson
Preview
Design and implement controls that provide confidentiality and integrity for data at rest
Text lesson
Preview
Design and implement controls to manage the lifecycle of data at rest
Text lesson
Preview
Design and implement controls to protect credentials, secrets, and cryptographic key materials
Text lesson
Preview
Domain 6: Management and Security Governance
0/4
Develop a strategy to centrally deploy and manage AWS accounts
Text lesson
Preview
Implement a secure and consistent deployment strategy for cloud resources
Text lesson
Preview
Evaluate the compliance of AWS resources
Text lesson
Preview
Identify security gaps through architectural reviews and cost analysis
Text lesson
Preview
Text lesson
Design and implement controls that provide confidentiality and integrity for data in transit
TLS concepts
VPN concepts (IPsec)
Secure remote access methods (SSH, RDP over Systems Manager Session Manager)
Systems Manager Session Manager concepts
How TLS certificates work with various network services and resources (CloudFront, load balancers)
Sign In
The password must have a minimum of 8 characters of numbers and letters, contain at least 1 capital letter
Remember me
Sign In
Sign Up
Restore password
Send reset link
Password reset link sent
to your email
Close
Your application is sent
We'll send you an email as soon as your application is approved.
Go to Profile
No account?
Sign Up
Sign In
Lost Password?