AWS Certified Security Specialty All-In-One Exam Guide (Exam SCS-C01).
This self-study resource offers complete coverage of every topic on the AWS Certified Security Specialty exam Take the AWS Certified Security - Specialty exam with confidence using the detailed information contained in this effective self-study resource. Written by a team of AWS insiders, the book s...
Clasificación: | Libro Electrónico |
---|---|
Autores principales: | , |
Otros Autores: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
New York :
McGraw-Hill Education,
2021.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Cover
- Title Page
- Copyright Page
- Dedication
- About The Authors
- Contents at a Glance
- Contents
- Acknowledgments
- Introduction
- Chapter 1 Introduction to AWS Security
- The Five Pillars of the Well-Architected Framework
- Focusing on the Security Pillar and the Shared Responsibility Model
- Chapter Review
- Additional Resources
- Chapter 2 Cloud Security Event Investigation
- What AWS Services Should I Consider for an Incident Response Plan?
- What to Look for as an Indicator of a Cloud Security Event
- Determining the RCA of a Cloud Security Event
- Chapter Review
- Additional Resources
- Chapter 3 Cloud Security Event Remediation and Planning
- Automating Alerts and Remediation
- Remediation of a Cloud Security Event
- Best Practices to Avoid Security Incidents
- Utilizing Forward Secrecy and AWS ALBs
- Exercise 3-4: Setting Up an AWS Application Load Balancer with Perfect Forward Secrecy
- Exercise 3-5: Automating Amazon EC2 Commands Using AWS Systems Manager
- Chapter Review
- Additional Resources
- Chapter 4 Monitor with Amazon CloudWatch
- Introduction to Monitoring on AWS
- Monitoring the AWS Infrastructure Using Amazon CloudWatch
- Monitoring Applications Using Amazon CloudWatch
- Chapter Review
- Additional Resources
- Chapter 5 Enhanced Security Monitoring and Compliance with AWS Services
- Monitoring Resource Configuration Using AWS Config
- Threat Detection Using Amazon GuardDuty
- Discover, Classify, and Protect Sensitive Data with Amazon Macie
- Introduction to AWS Security Hub
- Introduction to Amazon Trusted Advisor
- Chapter Review
- Additional Resources
- Chapter 6 Log on AWS
- Introduction to Logging on AWS
- Implement Governance and Risk Auditing of AWS Accounts with AWS CloudTrail
- Monitoring CloudTrail Logs with Amazon CloudWatch Logs
- Application and System Monitoring with Amazon CloudWatch Logs
- Logging of AWS Services
- Chapter Review
- Additional Resources
- Chapter 7 AWS Cryptographic Services
- AWS Key Management Service
- AWS CloudHSM
- Chapter Review
- Additional Resources
- Chapter 8 AWS Cryptographic-Related Services
- AWS Secrets Manager
- AWS Certificate Manager
- Public Certificates
- Chapter Review
- Additional Resources
- Chapter 9 AWS Cryptographic Tools
- AWS Encryption SDK
- DynamoDB Encryption Client
- Chapter Review
- Additional Resources
- Chapter 10 Design Edge Security on AWS
- Introduction
- Amazon Route 53
- Amazon CloudFront
- Amazon API Gateway
- Elastic Load Balancer
- AWS Web Application Firewall
- AWS Shield
- Chapter Review
- Additional Resources
- Chapter 11 Design and Implement a Secure Network Infrastructure
- AWS Global Infrastructure
- Virtual Private Cloud
- Controlling Access to the Network
- VPC Endpoints
- Connecting a VPC to On-Premises Networks
- AWS Transit Gateway
- Chapter Review
- Chapter 12 Troubleshoot a Secure Network Infrastructure
- Troubleshooting AWS Ingress: Common Patterns
- Troubleshooting AWS Egress: Common Patterns
- Chapter Review
- Chapter 13 Design and Implement Host-Based Security
- Host-Based Security
- Exercise 13-1: Configuring a Remote Access with Session Manager
- Chapter Review
- Additional Resources
- Chapter 14 Identity and Access Management on AWS
- Authentication
- Authorization
- Temporary Credentials with STS
- Amazon Cognito
- AWS Organizations
- AWS Single Sign-On
- Chapter Review
- Additional Resources
- Chapter 15 Troubleshoot Authorization and Authentication Systems
- Troubleshooting S3 Bucket Policies
- Enforcing Security Controls with S3 Bucket Policies
- S3 Lifecycle Policies
- AWS Organizations and Secure Control Policies
- Troubleshooting Authentication
- Troubleshooting Federation
- Chapter Review
- Additional Resources
- Appendix A Objective Map
- Appendix B About the Online Content
- System Requirements
- Your Total Seminars Training Hub Account
- Single User License Terms and Conditions
- TotalTester Online
- Technical Support
- Glossary Acronyms and Glossary
- Acronyms
- Glossary
- Index.