Header Fragment
Logo

A career growth machine

Home All Students Certifications Training Interview Plans Contact Us
  
× Home All Students
AI Resume Builder & Interview
Certifications Training
Books
Interview Plans Contact Us
FAQ
Login

Chapter 1: Threat Detection and Incident ResponsExam-Designing an Incident Response Plan
Chapter 2: Threat Detection and Incident ResponsExam-Roles and Responsibilities in Incident ResponsExam
Chapter 5: Threat Detection and Incident ResponsExam-Credential Invalidation and Rotation Strategies
Chapter 6: Threat Detection and Incident ResponsExam-Isolating and Containing Compromised AWS Resources
Chapter 7: Threat Detection and Incident ResponsExam-Playbooks and Runbooks for Security Incidents
Chapter 8: Threat Detection and Incident ResponsExam-Deploying AWS Security Services for Threat Detection
Chapter 9: Threat Detection and Incident ResponsExam-Configuring Integrations with AWS and Third-Party Services
Chapter 10: Threat Detection and Incident ResponsExam-AWS-Managed Security Services for Threat Detection
Chapter 14: Threat Detection and Incident ResponsExam-Evaluating Findings from GuardDuty, Security Hub, and MaciExam
Chapter 15: Threat Detection and Incident ResponsExam-Searching and Correlating Threats with Amazon DetectivExam
Chapter 17: Threat Detection and Incident ResponsExam-Creating Metric Filters and Dashboards in Amazon CloudWatch
Chapter 18: Threat Detection and Incident ResponsExam-AWS Security Incident Response Guide Deep DivExam
Chapter 20: Threat Detection and Incident ResponsExam-Forensic Data Collection: Snapshots, Memory Dumps, and MorExam
Chapter 22: Threat Detection and Incident ResponsExam-Protecting and Preserving Forensic Artifacts
Chapter 23: Threat Detection and Incident ResponsExam-Preparing for and Recovering from Security Incidents
Chapter 25: Security Logging and Monitoring-AWS Services for Monitoring Events (CloudWatch, EventBridge, SNS)
Chapter 26: Security Logging and Monitoring-Security Metrics and Baselines (GuardDuty, Systems Manager)
Chapter 27: Security Logging and Monitoring-Identifying Monitoring Requirements and Data Sources
Chapter 28: Security Logging and Monitoring-Defining Metrics and Thresholds That Generate Alerts
Chapter 30: Security Logging and Monitoring-Troubleshooting Security Monitoring and Alerting
Chapter 33: Security Logging and Monitoring-Designing a Logging Solution in AWS
Chapter 34: Security Logging and Monitoring-AWS Logging Capabilities (VPC Flow Logs, DNS Logs, CloudTrail, CloudWatch Logs)
Chapter 36: Security Logging and Monitoring-Troubleshooting Logging Solutions and Permissions
Chapter 38: Security Logging and Monitoring-Designing a Log Analysis Solution
Chapter 39: Security Logging and Monitoring-Tools and Services for Log Analysis (Athena, CloudWatch Logs Insights)
Chapter 40: Security Logging and Monitoring-Log Format, Components, and Correlation
Chapter 42: Infrastructure Security-AWS WAF, AWS Shield, and Load Balancers Fundamentals
Chapter 43: Infrastructure Security-Amazon CloudFront and Route 53 Security Features
Chapter 44: Infrastructure Security-Common Threats and Exploits (OWASP Top 10, DDoS)
Chapter 45: Infrastructure Security-Layered Web Application Architectures and Edge Security
Chapter 50: Infrastructure Security-VPC Security Mechanisms (Security Groups, NACLs, Network Firewall)
Chapter 51: Infrastructure Security-Inter-VPC Connectivity and AWS Transit Gateway
Chapter 54: Infrastructure Security-Network Segmentation Best Practices (Public, Private, Sensitive VPCs)
Chapter 56: Infrastructure Security-Monitoring Network Telemetry Sources for Threats
Chapter 57: Infrastructure Security-On-Premises to AWS Cloud: Redundancy and Security Requirements
Chapter 59: Infrastructure Security-Security Controls for Compute Workloads
Chapter 60: Infrastructure Security-Provisioning and Maintenance of Amazon EC2 Instances
Chapter 62: Infrastructure Security-IAM Instance Roles and Service Roles
Chapter 64: Infrastructure Security-Host-Based Security (Firewalls, Hardening)
Chapter 65: Infrastructure Security-Analyzing and Mitigating Amazon Inspector Findings
Chapter 66: Infrastructure Security-Passing Secrets and Credentials Securely to ComputExam
Chapter 68: Infrastructure Security-Using VPC Reachability Analyzer and Amazon Inspector
Chapter 69: Infrastructure Security-Fundamental TCP/IP Concepts and Common Network Utilities
Chapter 70: Infrastructure Security-Reading and Interpreting Route 53, AWS WAF, and VPC Flow Logs
Chapter 71: Infrastructure Security-Capturing Traffic Samples for Deeper Analysis
Chapter 72: Identity and Access Management-Designing and Implementing Authentication for AWS Resources
Chapter 74: Identity and Access Management-Long-Term vs. Temporary Credential Mechanisms
Chapter 75: Identity and Access Management-Troubleshooting Authentication (CloudTrail, IAM Access Advisor, Policy Simulator)
Chapter 76: Identity and Access Management-Setting Up Multi-Factor Authentication (MFA)
Chapter 77: Identity and Access Management-Using AWS STS for Temporary Credentials
Chapter 80: Identity and Access Management-Policy Components: Principal, Action, Resource, Condition
Chapter 82: Identity and Access Management-Applying the Principle of Least Privilege in AWS
Chapter 85: Identity and Access Management-Investigating Unintended Permissions and Privileges
Chapter 87: Data Protection-TLS Fundamentals and Certificate Management
Chapter 90: Data Protection-Requiring Encryption for AWS Services (S3, RDS, DynamoDB, etc.)
Chapter 93: Data Protection-Encryption Techniques (Client-Side, Server-Side, Symmetric, Asymmetric)
Chapter 96: Data Protection-Preventing Unauthorized Public Access (S3 Block Public Access, Snapshots)
Chapter 97: Data Protection-Enabling Encryption at Rest (S3, RDS, DynamoDB, EBS, EFS, SQS)
Chapter 98: Data Protection-Protecting Data Integrity (S3 Object Lock, Glacier Vault Lock, Backup Vault Lock)
Chapter 103: Data Protection-Lifecycle Management for Snapshots, AMIs, and Logs
Chapter 107: Data Protection-Rotating Secrets and Keys (KMS Customer Managed Keys)
Chapter 110: Management and Security GovernancExam-Developing a Multi-Account Strategy in AWS
Chapter 112: Management and Security GovernancExam-Policy-Defined Guardrails and Service Control Policies (SCPs)
Chapter 114: Management and Security GovernancExam-Deploying and Configuring AWS Control Tower
Chapter 116: Management and Security GovernancExam-Centrally Managing Security Services and Aggregating Findings
Chapter 117: Management and Security GovernancExam-Securing AWS Account Root User Credentials
Chapter 118: Management and Security GovernancExam-Secure and Consistent Deployment Strategies
Chapter 119: Management and Security GovernancExam-Infrastructure as Code (IaC) Best Practices with AWS CloudFormation
Chapter 120: Management and Security GovernancExam-Tagging Strategies for Management and GovernancExam
Chapter 121: Management and Security GovernancExam-Centralized Deployment and Versioning of AWS Services
Chapter 122: Management and Security GovernancExam-Enforcing Policies with AWS Firewall Manager
Chapter 123: Management and Security GovernancExam-Secure Resource Sharing with AWS Resource Access Manager
Chapter 124: Management and Security GovernancExam-Evaluating Compliance of AWS Resources
Chapter 125: Management and Security GovernancExam-Data Classification and Automated Discovery with Amazon MaciExam
Chapter 127: Management and Security GovernancExam-Collecting and Organizing Evidence with Security Hub and Audit Manager
Chapter 128: Management and Security GovernancExam-Identifying Security Gaps Through Architectural Reviews

Combo Packages at a Discount: Get one that best fits your learning needs.