AWS Certified Security Study Guide Specialty (SCS-C01) Exam

Get prepared for the AWS Certified Security Specialty certification with this excellent resource By earning the AWS Certified Security Specialty certification, IT professionals can gain valuable recognition as cloud security experts. The AWS Certified Security Study Guide: Specialty (SCS-C01) Exam h...

Full description

Bibliographic Details
Main Author: Neto, Marcello Zillo
Other Authors: Santana, Gustavo Alessandro Andrade, Sapata, Fernando, Munoz, Mauricio
Format: eBook
Language:English
Published: Indianapolis Sybex 2021
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
Table of Contents:
  • Access Management in Amazon S3
  • Policy Conflicts
  • Secure Data Transport in Amazon S3
  • Cross-Region Replication in Amazon S3
  • Amazon S3 Pre-signed URLs
  • Identity Federation
  • Amazon Cognito
  • Multi-Account Management with AWS Organizations
  • Service Control Policies
  • AWS Single Sign-On
  • Microsoft AD Federation with AWS
  • Protecting Credentials with AWS Secrets Manager
  • Secrets Permission Management
  • Automatic Secrets Rotation
  • Choosing between AWS Secrets Manager and AWS Systems Manager Parameter Store
  • Summary
  • Exam Essentials
  • Review Questions
  • Cover
  • Title Page
  • Copyright Page
  • Acknowledgments
  • About the Authors
  • About the Technical Editors
  • Contents at a Glance
  • Contents
  • Table of Exercises
  • Introduction
  • Assessment Test
  • Chapter 1 Security Fundamentals
  • Introduction
  • Understanding Security
  • Basic Security Concepts
  • Vulnerability, Threat, and Security Risk
  • Security Countermeasures and Enforcement
  • Confidentiality, Integrity, and Availability
  • Accountability and Nonrepudiation
  • Authentication, Authorization, and Accounting
  • Visibility and Context
  • Foundational Networking Concepts
  • The OSI Reference Model
  • The TCP/IP Protocol Stack
  • Main Classes of Attacks
  • Reconnaissance
  • Password Attacks
  • Eavesdropping Attacks
  • IP Spoofing Attacks
  • Man-in-the-Middle Attacks
  • Denial-of-Service Attacks
  • Malware Attacks
  • Phishing Attacks
  • Risk Management
  • Important Security Solutions and Services
  • Well-Known Security Frameworks and Models
  • Sample Practical Models for Guiding Security Design and Operations
  • The Security Wheel
  • The Attack Continuum Model
  • The Zero-Trust Model
  • Summary
  • Exam Essentials
  • Review Questions
  • Chapter 4 Detective Controls
  • Introduction
  • Stage 1: Resources State
  • AWS Config
  • AWS Systems Manager
  • Stage 2: Events Collection
  • AWS CloudTrail
  • Amazon CloudWatch Logs
  • Amazon CloudWatch
  • AWS Health
  • Stage 3: Events Analysis
  • AWS Config Rules
  • Amazon Inspector
  • Amazon GuardDuty
  • AWS Security Hub
  • AWS Systems Manager: State Manager, Patch Manager, and Compliance
  • AWS Trusted Advisor
  • Stage 4: Action
  • AWS Systems Manager: Automation
  • AWS Config Rules: Remediation
  • Amazon EventBridge
  • Summary
  • Exam Essentials
  • Review Questions
  • Chapter 2 Cloud Security Principles and Frameworks
  • Introduction
  • Cloud Security Principles Overview
  • The Shared Responsibility Model
  • Different Powers, Different Responsibilities
  • AWS Compliance Programs
  • AWS Artifact Portal
  • AWS Well-Architected Framework
  • Using the AWS Well-Architected Tool
  • AWS Marketplace
  • Summary
  • Exam Essentials
  • Review Questions
  • Chapter 3 Identity and Access Management
  • Introduction
  • IAM Overview
  • How AWS IAM Works
  • Principals
  • IAM Roles
  • AWS Security Token Services
  • Access Management with Policies and Permissions