Security - Specialty Certification Preparation for AWS
Training content
Please note that this learning path has been replaced with a new version designed to prepare you for the AWS Certified Security – Specialty (SCS-C02) exam. The new learning path can be found here: /learning-paths/aws-security-specialty-scs-c02-certification-preparation-1-10926/
Designed specifically for students looking to gain a deep understanding of AWS security services, including the many different security mechanisms and techniques that AWS offers to secure your infrastructure and data from both internal and external threats and exposures. The AWS Certified Security - Specialty certification allows you to demonstrate and validate your AWS knowledge across security topics such as data protection and encryption, infrastructure security, incident response, identity, and access management, monitoring, and logging. With a blend of instructional courses, hands-on labs, quizzes, and a preparation exam, this Learning Path helps you prepare and master the AWS Certified Security - Specialty exam.
Benefits of Achieving this Certification
- Cloud security is crucial to ALL use cases
- AWS certifications provide a reputable benchmark for AWS partners and practitioners
- Ensures team members are following security best practices
- Provides professional progression for team members
- Contributes to AWS partner certification requirements
Learning Path Agenda
This learning path has been designed to take you through the numerous security services along with the different security features that are available within other AWS services.
It begins with an introduction to the most common security service that is available, Identity & Access Management (IAM). During the first few courses and labs, it looks at access management and identities, both internally and externally, covering different authentication and authorization methods.
Next, it introduces a number of AWS security services related to auditing and compliance some of which are based on Machine Learning, such as Amazon GuardDuty and Amazon Macie. Monitoring and logging are then covered, examining how you can use the different AWS services to monitor and track log data and use it to help you find vulnerabilities.
Next, there are a number of courses and labs that look into encryption and data protection using different services and techniques. Different encryption mechanisms are covered here across a range of common AWS services. Application and Network security are covered next, looking at different services and techniques that can be implemented to help protect your Web Apps along with your VPC infrastructure, again from both internal and external threats.
Finally, there are a number of courses and labs covering security best practices, governance, and risk.
Intended Audience
This learning path is ideal for anyone interested in learning to recognize, explain, and implement solutions to enforce strict security controls across all levels of AWS infrastructure deployments.
Learning Objectives
This learning path will enable you to:
- Understand the differences between each of the security services offered by AWS and how they can be used within your environment
- Select the appropriate level of security based on your deployments and the sensitivity of your data using a variety of services
- Implement the correct security services and mechanisms to meet business objectives and requirements
- Understand how to select the most appropriate data protection techniques including encryption mechanisms
- Implement logging and monitoring solutions to detect and analyze security vulnerabilities and weaknesses within your infrastructure
Prerequisites
Prior to taking this Security Specialty certification, you must have passed the AWS Cloud Practitioner certification or ANY of the AWS Associate level certifications.
Feedback
We welcome all feedback so if you are unsure about where to start or if would like help getting started please direct any comments or questions to us at support@cloudacademy.com.
Updates
07/06/18: Added Lab - Detecting EC2 Threats with Amazon GuardDuty
06/29/18:
Added: How to implement & enable logging Across AWS Services (Part 1 of 2)
Added: How to implement & enable logging Across AWS Services (Part 2 of 2)
09/21/18
Added: Understanding S3 Encryption Mechanisms to secure your data
About the Author
Stuart has been working within the IT industry for two decades covering a huge range of topic areas and technologies, from data center and network infrastructure design, to cloud architecture and implementation.
To date, Stuart has created 250+ courses relating to cloud computing reaching over 1 million+ students.
Stuart is a member of the AWS Community Builders Program for his contributions towards AWS.
He is AWS certified and accredited in addition to being a published author covering topics across the AWS landscape.
Stuart enjoys writing about cloud technologies and you will find many of his articles within our blog pages.