AWS Certified Security - Specialty Training (SCS-C02)

BY
Infosec Train

Join Infosec Train’s AWS Certified Security - Specialty Training (SCS-C02) for hands-on experience in advanced cloud security.

Mode

Online

Quick Facts

particular details
Medium of instructions English
Mode of learning Self study, Virtual Classroom
Mode of Delivery Video Based

Course overview

The AWS Certified Security - Specialty Training (SCS-C02) by Infosec Train aims to equip you with the required expertise to clear the AWS Certified Security Specialty test. In doing so, you’ll gain the industry-recognised AWS Security Certification to pursue reputed job roles. In addition, this curriculum will also make you a proficient AWS security specialist to operate skilfully in real-world environments. 

The instructor-led AWS Certified Security - Specialty (SCS-C02) programme will explore real-time scenarios to explain the reasons behind website hacking and how to tackle it. The course syllabus includes AWS environment security’s best practices, along with the incident response, monitoring, logging, infrastructure security, and other relevant topics. 

Infosec Train offers 30 hours of content and certified trainers’ mentorship to help you clear the advanced-level AWS certification exam. Furthermore, the AWS Certified Security - Specialty course (SCS-C02) features additional benefits like a blended learning model, post-training support, Infosec Train’s accreditation, and a valuable training certificate. You can also request a free demo class for the AWS Certified Security - Specialty online course (SCS-C01). If you like it, you can choose from 3 learning options to enrol.

The highlights

  • Customised training available
  • Free demo class
  • 3 learning options 
  • Post-training guidance
  • Access to recorded classes 
  • Virtual programme
  • Certified trainers
  • 30 hours of studying 
  • Instructor-led course structure
  • Blended learning model
  • Training certificate
  • Infosec Train’s accreditation 
  • Experienced curriculum advisor

Program offerings

  • In-depth syllabus
  • Experienced and certified trainers
  • Flexible learning modes
  • Blended learning delivery model
  • Training certificate
  • Post-completion support
  • 30 hours of content
  • Instructor-led programme.

Course and certificate fees

certificate availability

Yes

certificate providing authority

Infosec Train

Who it is for

The AWS Certified Security - Specialty (SCS-C02) training is ideal for: -

  • Those interested in obtaining the AWS Security Specialty certificate
  • Those wanting to get a better deep security knowledge regarding AWS

Eligibility criteria

There are a few prerequisites to undertake the AWS Certified Security - Specialty Training (SCS-C02) by Infosec Train. Firstly, you must have 2+ years of AWS Cloud platform experience. You must also know the basic security practices and concepts. Secondly, you must be fluent in the security controls for AWS workloads. Thirdly, a skillset equivalent to the AWS Associate level certification is required. However, the certificate itself isn’t compulsory. 

To earn the AWS Certified Security - Specialty Training (SCS-C02) certificate, you must clear the in-course test with a passing score.

What you will learn

Knowledge of aws technology

The AWS Certified Security - Specialty course syllabus (SCS-C02) covers cloud security and 5 domains of AWS technology. Completing these, you’ll be adept in the following areas: -

  • Cloud security
  • Incident response
  • Access management
  • Identity management
  • Infrastructure security
  • AWS
  • Data projection
  • Monitoring
  • Logging

The syllabus

Domain 1: Threat Detection and Incident Response

Design and implement an incident response plan

  • Incident Response Strategy
  • Roles and responsibilities in IR plan specific to cloud incidents.
  • Use case 1: Credentials compromise.
  • Use case 2: Compromised EC2 Instances
  • Playbooks and Runbooks for IR
  • AWS Specific services helpful in Incident Response
  • Third-party integration concepts
  • Centralize security finding with security hub

Detect security threats and anomalies by using AWS services

  • Threat detection services specific to AWS
  • Visualizing and Detecting anomalies and correlation techniques
  • Evaluate finding from security services
  • Performing queries for validating security events
  • Create metrics filters and dashboards to detect Anomalous activity

Respond to compromised resources and workloads

  • AWS Security IR Guide
  • Automating remediation by using AWS services
  • Compromised resource management.
  • Investigating and analyzing to conduct Root cause and log analysis.
  • Capturing relevant forensics data from a compromised resource
  • Protecting and preserving forensic artifacts
  • Post-incident recovery

Domain 2: Security Logging and Monitoring

  • Design and Implement monitoring and alerting to address security events
  • Key AWS services for monitoring and alerting
  • Monitoring metrics and baselines
  • Analyzing environments and workloads to determine monitoring requirements according to
  • business and security requirements
  • Setting up tools and scripts to perform regular audits

Troubleshoot security monitoring and alerting

  • Configuring of monitoring services and collecting event data
  • Application monitoring, alerting, and visibility challenges

Design and implement a logging solution

  • Key logging services and attributes
  • Log destinations, Ingestion points and lifecycle management
  • Logging specific to services and applications

Troubleshoot logging solutions

  • AWS services that provide data sources and logging capabilities
  • Access permissions that are necessary for logging
  • Identifying misconfigurations and remediations specific to logging
  • Reasons for missing logs and performing remediation steps

Design a log analysis solution

  • Services and tools to analyze captured logs
  • Identifying patterns in logs to indicate anomalies and known threats
  • Log analysis features for AWS services
  • Log format and components
  • Normalizing, parsing, and correlating logs

Domain 3: Infrastructure Security

Design and implement security controls for edge services

  • Define edge security strategies and security features
  • Select proper edge services based on anticipated threats and attacks and define proper
  • protection mechanisms based on that
  • Define layered Defense (Defense in Depth) mechanisms
  • Applying restrictions based on different criteria
  • Enable logging and monitoring across edge services to indicate attacks

Design and implement network security controls

  • VPC security mechanisms including Security Groups, NACLs, and Network firewall
  • Traffic Mirroring and VPC Flow Logs
  • VPC Security mechanisms and implement network segmentation based on security requirements
  • Network traffic management and segmentation
  • Inter-VPC connectivity, Traffic isolation, and VPN concepts and deployment
  • Peering and Transit Gateway
  • AWS Point to Site and Site to Site VPN, Direct Connect
  • Continuous optimization by identifying and removing unnecessary network access

Design and implement security controls for compute workloads

  • Provisioning and maintenance of EC2 instances
  • Create hardened images and backups
  • Applying instance and service roles for defining permissions
  • Host-based security mechanisms
  • Vulnerability assessment using AWS Inspector
  • Passing secrets and credentials security to computing workloads

Troubleshoot network security
Identifying, interpreting, and prioritizing network connectivity and analyzing reachability
Analyse log sources to identify problems
Network traffic sampling using traffic mirroring

Domain 4: Identity and Access Management

Design, implement and troubleshoot authentication for AWS resources

  • Identity and Access Management
  • Establish identity through an authentication system based on requirements.
  • Managed Identities, Identity federation
  • AWS Identity center, IAM and Cognito
  • MFA, Conditional access, STS
  • Troubleshoot authentication issues

Design, implement and troubleshoot authorization for AWS resources

  • IAM policies and types
  • Policy structure and troubleshooting
  • Troubleshoot authorization issues
  • ABAC and RBAC strategies
  • Principle of least privilege and Separation of duties
  • Investigate unintended permissions, authorization, or privileges

Domain 5: Data Protection

Design and implement controls that provide confidentiality and integrity for data in transit

  • Design secure connectivity between AWS and on-premises networks
  • Design mechanisms to require encryption when connecting to resources.
  • Requiring DIT encryption for AWS API calls.
  • Design mechanisms to forward traffic over secure connections.
  • Designing cross-region networking

Design and implement controls that provide confidentiality and integrity for data at rest

  • Encryption and integrity concepts
  • Resource policies
  • Configure services to activate encryption for data at rest and to protect data integrity by preventing
  • modifications.
  • Cloud HSM and KMS

Design and implement controls to manage the data lifecycle at rest

  • Lifecycle policies and configurations
  • Automated life cycle management
  • Establishing schedules and retention for AWS backup across AWS services.

Design and implement controls to protect credentials, secrets, and cryptographic key materials

  • Designing management and rotation of secrets for workloads using a secret manager
  • Designing KMS key policies to limit key usage to authorized users.
  • Establishing mechanisms to import and remove customer-provider key material.

Domain 6: Management and Security Governance

Design and strategy to centrally deploy and manage AWS accounts

  • Multi account strategies using AWS organization and Control tower
  • SCPs and Policy multi-account policy enforcement
  • Centralized management of security services and aggregation of findings
  • Securing root account access

Implement a secure and consistent deployment strategy for cloud resources

  • Deployment best practices with Infrastructure as a code
  • Tagging and metadata
  • Configure and deploy portfolios of approved AWS services.
  • Securely sharing resources across AWS accounts
  • Visibility and control over AWS infrastructure

Evaluate compliance of AWS resources

  • Data classification by using AWS services
  • Define config rules for detection of non-compliant AWS resources.
  • Collecting and organizing evidence by using Security Hub and AWS audit manager

Identify security gaps through architectural reviews and cost analysis

  • AWS cost and usage anomaly identification
  • Strategies to reduce attack surfaces
  • AWS well-architected framework to identify security gaps

Admission details

  • Visit on link https://www.infosectrain.com/courses/aws-certified-security-specialty-training/  to reach the AWS Certified Security - Specialty course (SCS-C02) portal.
  • Click on ‘Enrol Now’. 
  • Provide the required information and tap the ‘Submit Now’ button.
  • Infosec Train’s course officials will contact you regarding admission.

Filling the form

There’s no AWS Certified Security - Specialty (SCS-C02) course application form. You can submit a request to enrol by providing details such as your full name, phone number, email address, country of residence, and training needed/comment. If you want the ‘corporate’ training, you must also mention your employee strength and company name. 

Evaluation process

The AWS Certified Security - Specialty (SCS-C02) programme includes a term-end test to grant the training certificate. This 170-minute exam will comprise 65 MCQ questions with multiple answers. The examination is available in English, Korean, Japanese, and Simplified Chinese. 

How it helps

The AWS Certified Security - Specialty (SCS-C02) course benefits you by offering an extensive, content-rich programme to receive practical expertise in advanced cloud security. Through the curriculum learnings, you’ll gain the required proficiency to clear the highly valuable AWS Certified Security Specialty examination and become an in-demand AWS security specialist. To this end, Infosec Train also provides a training certificate upon completion. 

Instructors

Mr Abhy
Head of Security Testing
Freelancer

Mr Krish 1
Instructor
Freelancer

FAQs

Does the course exam support multiple languages?

Yes. You can undertake it in English, Simplified Chinese, Korean, or Japanese.

How can I book my seat for a free demo session?

You can visit the curriculum portal by visiting the official link, scroll to the ‘Get a Free Demo Class’ section, fill in your details, and secure your seat. 

Can I request a batch for a customised curriculum?

Yes.

What are the available learning modes?

You can choose from corporate training, online training, and 1-on-1 training mode. 

Will I get a certificate if I finish the programme?

Yes. Infosec Train will award you with a training certificate.

Trending Courses

Popular Courses

Popular Platforms

Learn more about the Courses

Download the Careers360 App on your Android phone

Regular exam updates, QnA, Predictors, College Applications & E-books now on your Mobile

Careers360 App
150M+ Students
30,000+ Colleges
500+ Exams
1500+ E-books