1.1 Introduction
1.2 Target Candidate Description
1.3 Exam Content
1.4 Exam Question Domains
1. Learning objecties
2.2 Incident Response Preparation
2.3 Security Serice Deployment Part 1
2.4 Security Serice Deployment Part 2
2.5 Question Breakdown
2. Learning objecties
3.1 Incident Response Detection and Analysis
3.2 Alert Sources
3.3 Security Alerting Types
3.4 Question Breakdown 1
3.5 Incident Response Containment
3.6 Source, Access, and Destination Containment
3.7 Incident Response Eradication
3.8 Incident Response Recoery
3.9 Incident Response Post-Incident Actiity
3.10 Question Breakdown 2
3. Learning objecties
4.1 CloudWatch Alarms
4.2 EentBridge Rules
4.3 Security Alert Automation
4.4 Question Breakdown 1
4.5 Troubleshooting Scenario 1
4.6 Troubleshooting Scenario 2
4.7 Question Breakdown 2
4. Learning objecties
5.1 AWS Security Log Sources
5.2 Security Log Deliery, Storage, and Retention
5.3 Question Breakdown 1
5.4 Troubleshooting Logging Permissions
5.5 CloudTrail Troubleshooting Scenario
5.6 Question Breakdown 2
5.7 Log Analysis Options
5.8 Question Breakdown 3
5. Learning objecties
6.1 Edge Security Serices
6.2 Defense in Depth Example
6.3 Question Breakdown 1
6.4 VPC Security
6.5 Network Encryption Options
6.6 AWS Network Firewall
6.7 Question Breakdown 2
6. Learning objecties
7.1 EC2 Vulnerability Management
7.2 Secure Credentials and Secrets
7.3 Question Breakdown 1
7.4 Network Connectiity Scenarios
7.5 Extended Troubleshooting Scenario
7.6 Question Breakdown 2
7. Learning objecties
8.1 Strong Sign-in Mechanisms
8.2 Temporary Credentials - Account Federation
8.3 Temporary Credentials - Application Federation
8.4 Temporary Credentials - Machine Identities
8.5 Question Breakdown 1
8.6 Store and Use Secrets Securely
8.7 Identity Proider Centralization
8.8 Audit and Rotate Credentials
8.9 User Groups and Attributes
8.10 Question Breakdown 2
8. Learning objecties
9.1 AWS Policy Types
9.2 Access Requirements
9.3 Permission Policy Elements
9.4 AWS Policy Ealuation Logic
9.5 Emergency Access Strategies
9.6 Question Breakdown 1
9.7 Permissions Reduction Strategies
9.8 Permissions Guardrails
9.9 Access Management Lifecycles
9.10 Cross-Account Access
9.11 AWS Organizations Sharing
9.12 Third-party Sharing
9.13 Question Breakdown 2
9. Learning objecties
10.1 Three Goals of Data Encryption
10.2 Network Traffic Encryption Options
10.3 Cross-region Data Protection
10.4 AWS Certificate Manager
10.5 AWS Priate Certificate Authority
10.6 In-transit Encryption Enforcement
10.7 Question Breakdown
10. Learning objecties
11.1 Data Integrity Strategies
11.2 At-rest Encryption Examples
11.3 Symmetric Data Encryption
11.4 KMS Features
11.5 KMS Key Types
11.6 KMS Access Control
11.7 Other At-rest Encryption Strategies
11.8 Data Modification Preention
11.9 Question Breakdown
11. Learning objecties
12.1 Data Retention Strategies
12.2 Data Retention Serices and Features
12.3 Question Breakdown 1
12.4 KMS Asymmetric Keys
12.5 Credential and Secret Rotation
12.6 Secrets Manager Access Control
12.7 Question Breakdown 2
12. Learning objecties
13.1 AWS Organizations
13.2 AWS Control Tower
13.3 Question Breakdown 1
13.4 AWS Control Tower Account Factory
13.5 AWS Resource Groups
13.6 AWS Organizations Tag Policies
13.7 AWS Firewall Manager
13.8 Resource Access Manager
13.9 Question Breakdown 2
13. Learning objecties
14.1 AWS Macie
14.2 AWS Config, CloudWatch Logs, and Security Hub
14.3 AWS Audit Manager
14.4 Question Breakdown 1
14.5 Well-Architected Framework and Tool
14.6 Cost Analysis and Anomalies
14.7 Question Breakdown 2
14. Learning objecties
15.1 Documentation
15.2 Hands-on Learning
15.3 Sample Questions
15. Learning objecties
Introduction
Summary