وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

AWS Certified Security – Specialty (SCS-C02)

سرفصل های دوره
  • 1.1 Introduction
  • 1.2 Target Candidate Description
  • 1.3 Exam Content
  • 1.4 Exam Question Domains
  • 1. Learning objecties
  • 2.2 Incident Response Preparation
  • 2.3 Security Serice Deployment Part 1
  • 2.4 Security Serice Deployment Part 2
  • 2.5 Question Breakdown
  • 2. Learning objecties
  • 3.1 Incident Response Detection and Analysis
  • 3.2 Alert Sources
  • 3.3 Security Alerting Types
  • 3.4 Question Breakdown 1
  • 3.5 Incident Response Containment
  • 3.6 Source, Access, and Destination Containment
  • 3.7 Incident Response Eradication
  • 3.8 Incident Response Recoery
  • 3.9 Incident Response Post-Incident Actiity
  • 3.10 Question Breakdown 2
  • 3. Learning objecties
  • 4.1 CloudWatch Alarms
  • 4.2 EentBridge Rules
  • 4.3 Security Alert Automation
  • 4.4 Question Breakdown 1
  • 4.5 Troubleshooting Scenario 1
  • 4.6 Troubleshooting Scenario 2
  • 4.7 Question Breakdown 2
  • 4. Learning objecties
  • 5.1 AWS Security Log Sources
  • 5.2 Security Log Deliery, Storage, and Retention
  • 5.3 Question Breakdown 1
  • 5.4 Troubleshooting Logging Permissions
  • 5.5 CloudTrail Troubleshooting Scenario
  • 5.6 Question Breakdown 2
  • 5.7 Log Analysis Options
  • 5.8 Question Breakdown 3
  • 5. Learning objecties
  • 6.1 Edge Security Serices
  • 6.2 Defense in Depth Example
  • 6.3 Question Breakdown 1
  • 6.4 VPC Security
  • 6.5 Network Encryption Options
  • 6.6 AWS Network Firewall
  • 6.7 Question Breakdown 2
  • 6. Learning objecties
  • 7.1 EC2 Vulnerability Management
  • 7.2 Secure Credentials and Secrets
  • 7.3 Question Breakdown 1
  • 7.4 Network Connectiity Scenarios
  • 7.5 Extended Troubleshooting Scenario
  • 7.6 Question Breakdown 2
  • 7. Learning objecties
  • 8.1 Strong Sign-in Mechanisms
  • 8.2 Temporary Credentials - Account Federation
  • 8.3 Temporary Credentials - Application Federation
  • 8.4 Temporary Credentials - Machine Identities
  • 8.5 Question Breakdown 1
  • 8.6 Store and Use Secrets Securely
  • 8.7 Identity Proider Centralization
  • 8.8 Audit and Rotate Credentials
  • 8.9 User Groups and Attributes
  • 8.10 Question Breakdown 2
  • 8. Learning objecties
  • 9.1 AWS Policy Types
  • 9.2 Access Requirements
  • 9.3 Permission Policy Elements
  • 9.4 AWS Policy Ealuation Logic
  • 9.5 Emergency Access Strategies
  • 9.6 Question Breakdown 1
  • 9.7 Permissions Reduction Strategies
  • 9.8 Permissions Guardrails
  • 9.9 Access Management Lifecycles
  • 9.10 Cross-Account Access
  • 9.11 AWS Organizations Sharing
  • 9.12 Third-party Sharing
  • 9.13 Question Breakdown 2
  • 9. Learning objecties
  • 10.1 Three Goals of Data Encryption
  • 10.2 Network Traffic Encryption Options
  • 10.3 Cross-region Data Protection
  • 10.4 AWS Certificate Manager
  • 10.5 AWS Priate Certificate Authority
  • 10.6 In-transit Encryption Enforcement
  • 10.7 Question Breakdown
  • 10. Learning objecties
  • 11.1 Data Integrity Strategies
  • 11.2 At-rest Encryption Examples
  • 11.3 Symmetric Data Encryption
  • 11.4 KMS Features
  • 11.5 KMS Key Types
  • 11.6 KMS Access Control
  • 11.7 Other At-rest Encryption Strategies
  • 11.8 Data Modification Preention
  • 11.9 Question Breakdown
  • 11. Learning objecties
  • 12.1 Data Retention Strategies
  • 12.2 Data Retention Serices and Features
  • 12.3 Question Breakdown 1
  • 12.4 KMS Asymmetric Keys
  • 12.5 Credential and Secret Rotation
  • 12.6 Secrets Manager Access Control
  • 12.7 Question Breakdown 2
  • 12. Learning objecties
  • 13.1 AWS Organizations
  • 13.2 AWS Control Tower
  • 13.3 Question Breakdown 1
  • 13.4 AWS Control Tower Account Factory
  • 13.5 AWS Resource Groups
  • 13.6 AWS Organizations Tag Policies
  • 13.7 AWS Firewall Manager
  • 13.8 Resource Access Manager
  • 13.9 Question Breakdown 2
  • 13. Learning objecties
  • 14.1 AWS Macie
  • 14.2 AWS Config, CloudWatch Logs, and Security Hub
  • 14.3 AWS Audit Manager
  • 14.4 Question Breakdown 1
  • 14.5 Well-Architected Framework and Tool
  • 14.6 Cost Analysis and Anomalies
  • 14.7 Question Breakdown 2
  • 14. Learning objecties
  • 15.1 Documentation
  • 15.2 Hands-on Learning
  • 15.3 Sample Questions
  • 15. Learning objecties
  • Introduction
  • Summary
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 38802
    حجم: 14667 مگابایت
    مدت زمان: 498 دقیقه
    تاریخ انتشار: ۱۰ مرداد ۱۴۰۳
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید