Book description
This self-study resource offers complete coverage of every topic on the AWS Certified Security Specialty exam
Take the AWS Certified Security – Specialty exam with confidence using the detailed information contained in this effective self-study resource. Written by a team of AWS insiders, the book shows how to develop, deploy, and maintain robust security protocols on Amazon Web Services. AWS Certified Security Specialty All-in-One Exam Guide (Exam SCS-C01) covers every objective for the exam and provides comprehensive content on cloud-based security. To aid in study, each chapter includes exam tips, chapter summaries, and practice questions that simulate those on the live test. Designed to help you pass the exam with ease, this hands-on guide also serves as an ideal on-the-job reference.
Covers all exam topics, including:
- Cloud security event investigation
- Cloud security event remediation and planning
- Monitoring with Amazon CloudWatch
- Enhanced security monitoring and compliance with AWS services
- Logging on AWS
- AWS cryptographic services and tools
- Designing edge security on AWS
- Designing and implementing a secure network infrastructure
- Troubleshooting a secure network infrastructure
- Designing and implementing host-based security
- AWS identity and access management
- Troubleshooting authorization and authentication services
Online content includes:
- 130 practice exam questions
- Fully customizable exam engine
- Downloadable code
Publisher resources
Table of contents
- Cover
- Title Page
- Copyright Page
- Dedication
- Contents
- Acknowledgments
- Introduction
- Chapter 1 Introduction to AWS Security
- Chapter 2 Cloud Security Event Investigation
-
Chapter 3 Cloud Security Event Remediation and Planning
- Automating Alerts and Remediation
-
Remediation of a Cloud Security Event
- Responding to an AWS Abuse Notice
- Exercise 3-1: Automating PHD Alerts Through Amazon EventBridge
- Remediating Compromised EC2 Instances
- Exercise 3-2: Automating Compromised Amazon EC2 Instance Response
- Remediating Compromised Security Credentials
- Exercise 3-3: Preventing Accidental Commits of Sensitive Information to GitHub
- Best Practices to Avoid Security Incidents
- Chapter Review
- Additional Resources
- Chapter 4 Monitor with Amazon CloudWatch
-
Chapter 5 Enhanced Security Monitoring and Compliance with AWS Services
- Monitoring Resource Configuration Using AWS Config
- Threat Detection Using Amazon GuardDuty
-
Discover, Classify, and Protect Sensitive Data with Amazon Macie
- Exercise 5-7: Discovering, Classifying, and Protecting Sensitive Data Using the New Amazon Macie
- Customize Data Identifiers for Your Intellectual Property in the New Amazon Macie
- Exercise 5-8: Discovering S3 Objects with IP Addresses Using the New Amazon Macie
- Monitoring and Processing Macie Findings in the New Amazon Macie
- Introduction to AWS Security Hub
- Introduction to Amazon Trusted Advisor
- Chapter Review
- Additional Resources
-
Chapter 6 Log on AWS
- Introduction to Logging on AWS
-
Implement Governance and Risk Auditing of AWS Accounts with AWS CloudTrail
- AWS CloudTrail Building Blocks
- Configuring AWS CloudTrail
- Controlling Access to AWS CloudTrail Logs Using AWS IAM and S3 Bucket Policies
- Configure AWS CloudTrail to Deliver Log Files from Multiple Regions
- Sharing CloudTrail Log Files Between AWS Accounts
- Exercise 6-1: Sharing CloudTrail Log Files Between AWS Accounts
- Securing CloudTrail Logs
- Validating CloudTrail Log File Integrity
- Monitoring CloudTrail Logs with Amazon CloudWatch Logs
- Application and System Monitoring with Amazon CloudWatch Logs
- Logging of AWS Services
- Chapter Review
- Additional Resources
- Chapter 7 AWS Cryptographic Services
-
Chapter 8 AWS Cryptographic-Related Services
-
AWS Secrets Manager
- AWS Secrets Manager Concepts
- Managing Secrets, Authentication, and Access Control
- Exercise 8-1: Creating a Basic Secret
- Exercise 8-2: Modifying a Secret’s Resource-Based Policy
- Rotating and Replicating Secrets
- Exercise 8-3: Enabling Secret Rotation for an Amazon RDS Database
- Monitoring
- Exercise 8-4: Creating an AWS Config Rule to Ensure Rotation Is Enabled
- AWS Certificate Manager
- Chapter Review
- Additional Resources
-
AWS Secrets Manager
- Chapter 9 AWS Cryptographic Tools
-
Chapter 10 Design Edge Security on AWS
- Introduction
- Amazon Route 53
-
Amazon CloudFront
- Behaviors
- Origins
- Alternate Domain Names and SSL Certificates
- Using Signed Cookies or Signed URLs to Restrict Access to Content
- Caching Content on Amazon CloudFront
- Less Attack Surface
- Using Amazon CloudFront to Protect Against DDoS Attacks
- Using CloudFront with S3 Securely
- CloudFront Geo Restriction
- Lambda@Edge
- Amazon API Gateway
- Elastic Load Balancer
- AWS Web Application Firewall
- AWS Shield
- Chapter Review
- Additional Resources
- Chapter 11 Design and Implement a Secure Network Infrastructure
- Chapter 12 Troubleshoot a Secure Network Infrastructure
- Chapter 13 Design and Implement Host-Based Security
- Chapter 14 Identity and Access Management on AWS
- Chapter 15 Troubleshoot Authorization and Authentication Systems
- Appendix A Objective Map
- Appendix B About the Online Content
- Glossary Acronyms and Glossary
- Index
Product information
- Title: AWS Certified Security Specialty All-in-One Exam Guide (Exam SCS-C01)
- Author(s):
- Release date: February 2021
- Publisher(s): McGraw-Hill
- ISBN: 9781260461732
You might also like
book
Container Security
To facilitate scalability and resilience, many organizations now run applications in cloud native environments using containers …
book
Infrastructure as Code, 2nd Edition
Six years ago, Infrastructure as Code was a new concept. Today, as even banks and other …
book
Cloud Security Handbook
A comprehensive reference guide to securing the basic building blocks of cloud services, with actual examples …
book
Practical Industrial Cybersecurity
A practical roadmap to protecting against cyberattacks in industrial environments In Practical Industrial Cybersecurity: ICS, Industry …