وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

AWS Certified Security – Specialty (SCS-C02)

سرفصل های دوره
  • 1.1 Introduction
  • 1.2 Target Candidate Description
  • 1.3 Exam Content
  • 1.4 Exam Question Domains
  • 1. Learning objecties
  • 2.2 Incident Response Preparation
  • 2.3 Security Serice Deployment Part 1
  • 2.4 Security Serice Deployment Part 2
  • 2.5 Question Breakdown
  • 2. Learning objecties
  • 3.1 Incident Response Detection and Analysis
  • 3.2 Alert Sources
  • 3.3 Security Alerting Types
  • 3.4 Question Breakdown 1
  • 3.5 Incident Response Containment
  • 3.6 Source, Access, and Destination Containment
  • 3.7 Incident Response Eradication
  • 3.8 Incident Response Recoery
  • 3.9 Incident Response Post-Incident Actiity
  • 3.10 Question Breakdown 2
  • 3. Learning objecties
  • 4.1 CloudWatch Alarms
  • 4.2 EentBridge Rules
  • 4.3 Security Alert Automation
  • 4.4 Question Breakdown 1
  • 4.5 Troubleshooting Scenario 1
  • 4.6 Troubleshooting Scenario 2
  • 4.7 Question Breakdown 2
  • 4. Learning objecties
  • 5.1 AWS Security Log Sources
  • 5.2 Security Log Deliery, Storage, and Retention
  • 5.3 Question Breakdown 1
  • 5.4 Troubleshooting Logging Permissions
  • 5.5 CloudTrail Troubleshooting Scenario
  • 5.6 Question Breakdown 2
  • 5.7 Log Analysis Options
  • 5.8 Question Breakdown 3
  • 5. Learning objecties
  • 6.1 Edge Security Serices
  • 6.2 Defense in Depth Example
  • 6.3 Question Breakdown 1
  • 6.4 VPC Security
  • 6.5 Network Encryption Options
  • 6.6 AWS Network Firewall
  • 6.7 Question Breakdown 2
  • 6. Learning objecties
  • 7.1 EC2 Vulnerability Management
  • 7.2 Secure Credentials and Secrets
  • 7.3 Question Breakdown 1
  • 7.4 Network Connectiity Scenarios
  • 7.5 Extended Troubleshooting Scenario
  • 7.6 Question Breakdown 2
  • 7. Learning objecties
  • 8.1 Strong Sign-in Mechanisms
  • 8.2 Temporary Credentials - Account Federation
  • 8.3 Temporary Credentials - Application Federation
  • 8.4 Temporary Credentials - Machine Identities
  • 8.5 Question Breakdown 1
  • 8.6 Store and Use Secrets Securely
  • 8.7 Identity Proider Centralization
  • 8.8 Audit and Rotate Credentials
  • 8.9 User Groups and Attributes
  • 8.10 Question Breakdown 2
  • 8. Learning objecties
  • 9.1 AWS Policy Types
  • 9.2 Access Requirements
  • 9.3 Permission Policy Elements
  • 9.4 AWS Policy Ealuation Logic
  • 9.5 Emergency Access Strategies
  • 9.6 Question Breakdown 1
  • 9.7 Permissions Reduction Strategies
  • 9.8 Permissions Guardrails
  • 9.9 Access Management Lifecycles
  • 9.10 Cross-Account Access
  • 9.11 AWS Organizations Sharing
  • 9.12 Third-party Sharing
  • 9.13 Question Breakdown 2
  • 9. Learning objecties
  • 10.1 Three Goals of Data Encryption
  • 10.2 Network Traffic Encryption Options
  • 10.3 Cross-region Data Protection
  • 10.4 AWS Certificate Manager
  • 10.5 AWS Priate Certificate Authority
  • 10.6 In-transit Encryption Enforcement
  • 10.7 Question Breakdown
  • 10. Learning objecties
  • 11.1 Data Integrity Strategies
  • 11.2 At-rest Encryption Examples
  • 11.3 Symmetric Data Encryption
  • 11.4 KMS Features
  • 11.5 KMS Key Types
  • 11.6 KMS Access Control
  • 11.7 Other At-rest Encryption Strategies
  • 11.8 Data Modification Preention
  • 11.9 Question Breakdown
  • 11. Learning objecties
  • 12.1 Data Retention Strategies
  • 12.2 Data Retention Serices and Features
  • 12.3 Question Breakdown 1
  • 12.4 KMS Asymmetric Keys
  • 12.5 Credential and Secret Rotation
  • 12.6 Secrets Manager Access Control
  • 12.7 Question Breakdown 2
  • 12. Learning objecties
  • 13.1 AWS Organizations
  • 13.2 AWS Control Tower
  • 13.3 Question Breakdown 1
  • 13.4 AWS Control Tower Account Factory
  • 13.5 AWS Resource Groups
  • 13.6 AWS Organizations Tag Policies
  • 13.7 AWS Firewall Manager
  • 13.8 Resource Access Manager
  • 13.9 Question Breakdown 2
  • 13. Learning objecties
  • 14.1 AWS Macie
  • 14.2 AWS Config, CloudWatch Logs, and Security Hub
  • 14.3 AWS Audit Manager
  • 14.4 Question Breakdown 1
  • 14.5 Well-Architected Framework and Tool
  • 14.6 Cost Analysis and Anomalies
  • 14.7 Question Breakdown 2
  • 14. Learning objecties
  • 15.1 Documentation
  • 15.2 Hands-on Learning
  • 15.3 Sample Questions
  • 15. Learning objecties
  • Introduction
  • Summary
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 38802
    حجم: 14667 مگابایت
    مدت زمان: 498 دقیقه
    تاریخ انتشار: 10 مرداد 1403
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید