Search icon
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
AWS Certified Security – Specialty (SCS-C02) Exam Guide - Second Edition

You're reading from  AWS Certified Security – Specialty (SCS-C02) Exam Guide - Second Edition

Product type Book
Published in Apr 2024
Publisher Packt
ISBN-13 9781837633982
Pages 614 pages
Edition 2nd Edition
Languages
Authors (2):
Adam Book Adam Book
Profile icon Adam Book
Stuart Scott Stuart Scott
Profile icon Stuart Scott
View More author details

Table of Contents (29) Chapters

Preface 1. Section 1: AWS Security Fundamentals
2. Chapter 1: AWS Shared Responsibility Model 3. Chapter 2: Fundamental AWS Services 4. Chapter 3: Understanding Attacks on Cloud Environments 5. Section 2: Incident Response
6. Chapter 4: Incident Response 7. Chapter 5: Managing Your Environment with AWS Config 8. Chapter 6: Event Management with Security Hub and GuardDuty 9. Section 3: Logging and Monitoring
10. Chapter 7: Logs Generated by AWS Services 11. Chapter 8: CloudWatch and CloudWatch Metrics 12. Chapter 9: Parsing Logs and Events with AWS Native Tools 13. Section 4: Infrastructure Security
14. Chapter 10: Configuring Infrastructure Security 15. Chapter 11: Securing EC2 Instances 16. Chapter 12: Managing Key Infrastructure 17. Chapter 13: Access Management 18. Section 5: Identity and Access Management
19. Chapter 14: Working with Access Policies 20. Chapter 15: Federated and Mobile Access 21. Chapter 16: Using Active Directory Services to Manage Access 22. Section 6: Data Protection
23. Chapter 17: Protecting Data in Flight and at Rest 24. Chapter 18: Securely Connecting to Your AWS Environment 25. Chapter 19: Using Certificates and Certificate Services in AWS 26. Chapter 20: Managing Secrets Securely in AWS 27. Chapter 21: Accessing the Online Practice Resources 28. Other Books You May Enjoy

Summary

In this chapter, you learned how to create key pairs for your EC2 instances so that you could securely access your instances over either the SSH or RDP protocols. Then, you examined how to securely access your private AWS infrastructure using a hardened bastion server or the AWS Session Manager service.

You also saw how to take your previously configured EC2 instance and then install the Amazon Inspector agent on it so that the latter can inform you if it finds any vulnerabilities.

In Chapter 12, Managing Key Infrastructure, you will examine the Amazon-managed encryption service KMS. You will go through steps to create your customer-managed keys and learn how different permissions can be set so that users from various groups in your organization can access data using those keys. You will also see how keys can be either rotated automatically or manually based on the needs of your organization.

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime}