This course prepares working professionals to pass the AWS Certified Security – Specialty (SCS-C02) exam and apply advanced security techniques in AWS environments. You’ll focus on core security domains, including threat detection, infrastructure protection, identity management, data protection, and governance.
Overview
Skills Learned
After completing this online training course, students will be able to:
Design and implement incident response plans using AWS tools
Detect and respond to threats with AWS-native monitoring and analytics
Configure and troubleshoot logging, alerting, and audit pipelines
Apply network and compute-layer security controls across workloads
Manage authentication, authorization, and IAM policy structures
Encrypt data, protect keys and enforce secure data lifecycle practices
Standardize governance through multi-account strategies and secure deployments
Evaluate compliance and identify architecture-level security gaps
- Security engineers, architects, analysts, and auditors
- Individuals who are responsible for governing, auditing, and testing an organization’s IT infrastructure, as well as ensuring conformity of the infrastructure to security, risk, and compliance guidelines
- Hands-on experience securing AWS workloads
- Security controls for workloads on AWS
01. Introduction and Success Planning
- General Course Introduction
- Recommended Learning Prerequisites
- Review Exam Guide and Domains
- Additional Resources to Prepare
- Overview of the Security Pillar Design Principles
02. Review of Minimum Services Knowledge
- Management and Governance
- Networking and Content Delivery
- Security, Identity, and Compliance
03. Threat Detection and Incident Response
- Design and Implement an Incident Response Plan
- Detect Security Threats and Anomalies by Using AWS Services
- Respond to Compromised Resources and Workloads
04. Security Logging and Monitoring
- Design and Implement Monitoring and Alerting to Address Security Events
- Troubleshoot Security Monitoring and Alerting
- Troubleshoot Logging Solutions
- Design a Log Analysis Solution
05. Infrastructure Security
- Design and Implement Security Controls for Edge Services
- Design and Implement Network Security Controls
- Design and Implement Security Controls for Compute Workloads
- Troubleshoot Network Security
06. Identity And Access Management
- Design, Implement, and Troubleshoot Authentication for AWS Resources
- Design, Implement, and Troubleshoot Authorization for AWS Resources
07. Data Protection
- Design and Implement Controls That Provide Confidentiality and Integrity for Data in Transit
- Design and Implement Controls That Provide Confidentiality and Integrity for Data at Rest
- Design and Implement Controls to Manage the Lifecycle of Data at Rest
- Design and Implement Controls to Protect Credentials, Secrets, and Cryptographic Key Materials
08. Management and Security Governance
- Develop a Strategy to Centrally Deploy and Manage AWS Accounts
- Implement a Secure and Consistent Deployment Strategy for Cloud Resources
- Evaluate the Compliance of AWS Resources
- Identify Security Gaps Through Architectural Reviews and Cost Analysis
- AWS Secure Landing Zone
SKILLS LEARNED
Skills Learned
After completing this online training course, students will be able to:
Design and implement incident response plans using AWS tools
Detect and respond to threats with AWS-native monitoring and analytics
Configure and troubleshoot logging, alerting, and audit pipelines
Apply network and compute-layer security controls across workloads
Manage authentication, authorization, and IAM policy structures
Encrypt data, protect keys and enforce secure data lifecycle practices
Standardize governance through multi-account strategies and secure deployments
Evaluate compliance and identify architecture-level security gaps
WHO SHOULD ATTEND
- Security engineers, architects, analysts, and auditors
- Individuals who are responsible for governing, auditing, and testing an organization’s IT infrastructure, as well as ensuring conformity of the infrastructure to security, risk, and compliance guidelines
PREREQUISITES
- Hands-on experience securing AWS workloads
- Security controls for workloads on AWS
COURSE OUTLINE
01. Introduction and Success Planning
- General Course Introduction
- Recommended Learning Prerequisites
- Review Exam Guide and Domains
- Additional Resources to Prepare
- Overview of the Security Pillar Design Principles
02. Review of Minimum Services Knowledge
- Management and Governance
- Networking and Content Delivery
- Security, Identity, and Compliance
03. Threat Detection and Incident Response
- Design and Implement an Incident Response Plan
- Detect Security Threats and Anomalies by Using AWS Services
- Respond to Compromised Resources and Workloads
04. Security Logging and Monitoring
- Design and Implement Monitoring and Alerting to Address Security Events
- Troubleshoot Security Monitoring and Alerting
- Troubleshoot Logging Solutions
- Design a Log Analysis Solution
05. Infrastructure Security
- Design and Implement Security Controls for Edge Services
- Design and Implement Network Security Controls
- Design and Implement Security Controls for Compute Workloads
- Troubleshoot Network Security
06. Identity And Access Management
- Design, Implement, and Troubleshoot Authentication for AWS Resources
- Design, Implement, and Troubleshoot Authorization for AWS Resources
07. Data Protection
- Design and Implement Controls That Provide Confidentiality and Integrity for Data in Transit
- Design and Implement Controls That Provide Confidentiality and Integrity for Data at Rest
- Design and Implement Controls to Manage the Lifecycle of Data at Rest
- Design and Implement Controls to Protect Credentials, Secrets, and Cryptographic Key Materials
08. Management and Security Governance
- Develop a Strategy to Centrally Deploy and Manage AWS Accounts
- Implement a Secure and Consistent Deployment Strategy for Cloud Resources
- Evaluate the Compliance of AWS Resources
- Identify Security Gaps Through Architectural Reviews and Cost Analysis
- AWS Secure Landing Zone