Section 1 : Introduction

Lecture 1 Introduction copy 1:13
Lecture 2 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM Pdf
Lecture 3 Getting Certified 6:7
Lecture 4 Connect with Me! 0:28
Lecture 5 Using the AWS Free Tier and Billing Alerts 4:35
Lecture 6 Disclaimer 1:30
Lecture 7 Demo Create a Billing Alert 4:49

Section 2 : Identity and Access Management (IAM)

Lecture 8 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM Pdf
Lecture 9 The Shared Responsibility Model and IAM 8:43
Lecture 10 Demo Day 1 AWS Account Security 7:35
Lecture 11 Demo Managing IAM Users and Groups 5:38
Lecture 12 Demo IAM Managed, Customer Managed, and Inline Policies 5:17
Lecture 13 Demo Working with AWS IAM Policies 10:2
Lecture 14 AWS Organizations Security 12:16
Lecture 15 AWS Organizations and the Root User 1:34

Section 3 : S3 Security

Lecture 16 S3 Bucket Policies and IAM Introduction 0:50
Lecture 17 Demo Controlling S3 Access with IAM and Bucket Policies - Part 1 12:2
Lecture 18 Demo Controlling S3 Access with IAM and Bucket Policies - Part 2 14:13
Lecture 19 Demo S3 Bucket Access Lists 15:26
Lecture 20 Demo S3 Policy Conflicts in Action 9:31
Lecture 21 Demo S3 Encryption in Transit 6:34
Lecture 22 S3 Cross-Region Replication Security 11:10
Lecture 23 Demo Create an EC2 Instance with S3 Access 3:51
Lecture 24 Demo S3 Object Pre-Signed URLs 6:31
Lecture 25 Demo Glacier Vault Lock 6:15
Lecture 26 Exam Scenario EC2 Instance with S3 Access 4:51
Lecture 27 Using a CloudFront OAI to Protect S3

Section 4 : Identity Federations

Lecture 28 AWS Security Token Service (STS) 6:57
Lecture 29 Demo AWS Cross-Account Access 21:15
Lecture 30 Third Party Access to AWS with External IDs 2:28
Lecture 31 Introduction to AWS Cognito 2:19
Lecture 32 Demo Configure AWS Cognito 10:1
Lecture 33 AWS Secrets Manager with RDS, EC2, and Lambda 4:1
Lecture 34 Demo AWS Systems Manager Parameter Store 4:47
Lecture 35 Active Directory Federation (ADFS) with AWS 10:6

Section 5 : Monitoring, Logging, and Auditing

Lecture 36 AWS CloudTrail for Security 8:13
Lecture 37 Demo AWS CloudTrail Configuration 12:26
Lecture 38 Demo Securing AWS CloudTrail Logs 11:34
Lecture 39 AWS CloudWatch for Security 6:57
Lecture 40 Demo Create a CloudWatch Dashboard 7:17
Lecture 41 Demo AWS CloudWatch Logs 3:0
Lecture 42 Demo CloudWatch Events Configuration 4:35
Lecture 43 Creating CloudWatch Alarms for CloudTrail Events 14:22
Lecture 44 AWS CloudWatch and CloudTrail FAQs 0:52
Lecture 45 AWS Config for Security 7:4
Lecture 46 Demo Configuring Rules for AWS Config 17:18
Lecture 47 AWS Inspector 17:27
Lecture 48 AWS Trusted Advisor
Lecture 49 EC2 Instance Metadata 3:15

Section 6 : Key Management

Lecture 50 Introduction to AWS Key Management Service (KMS) 12:36
Lecture 51 AWS KMS Example - Encrypting EBS Volumes with the CMK 9:51
Lecture 52 Demo Monitoring for Disabled Keys with AWS CloudWatch 4:30
Lecture 53 Review - Create an EC2 Instance with S3 Access 3:54
Lecture 54 Demo Using AWS KMS to Protect Objects in S3 26:27
Lecture 55 Uploading an External Keys into AWS KMS 10:8
Lecture 56 Demo AWS EC2 Instances and Key Pairs 8:44
Lecture 57 Demo Adding a New Key Pair to an EC2 Instance
Lecture 58 Demo Deleting Key Pairs from an EC2 Instance 10:31
Lecture 59 AWS KMS Grants 2:0

Section 7 : VPC Security and Monitoring

Lecture 60 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM Pdf
Lecture 61 AWS VPC Concepts Review 6:35
Lecture 62 Demo Create an AWS VPC with Security in Mind 10:31
Lecture 63 Demo Create an Internet Gateway for an AWS VPC 3:58
Lecture 64 Demo Create Public and Private Subnets in an AWS VPC 7:16
Lecture 65 Demo Create a Bastion Host to Access Private Instances
Lecture 66 NAT Gateways in an AWS VPC
Lecture 67 Demo Create a NAT Gateway in the AWS Console 8:40
Lecture 68 Introduction to Security Groups as Stateful Firewalls 6:29
Lecture 69 Security Groups and Network ACLs 6:57
Lecture 70 Demo Configure VPC Flow Logs to Monitor AWS VPC Traffic 14:2

Section 8 : Security Solutions

Lecture 71 SSL and Elastic Load Balancers 9:37
Lecture 72 Demo AWS Web Application Firewall (WAF) 19:27
Lecture 73 Introduction AWS Shield 3:23
Lecture 74 Third-Party Web Application Firewalls in the AWS Marketplace 3:13
Lecture 75 Using VPC Endpoints with S3 and DynamoDB 10:18
Lecture 76 VPC Endpoints and AWS KMS 1:16
Lecture 77 AWS Athena 3:4
Lecture 78 AWS Macie 3:9
Lecture 79 AWS GuardDuty 9:7
Lecture 80 AWS Artifact 3:29
Lecture 81 Demo Session Manager 11:38

Section 9 : Security Incident Response

Lecture 82 AWS DDoS Resiliency 16:8
Lecture 83 Incident Response EC2 Compromise 7:45
Lecture 84 Incident Response Access Keys Exposed 7:7
Lecture 85 Performing Penetration Tests on an AWS Account 3:58
Lecture 86 AWS Certificate Manager 12:59

Section 10 : Container Security

Lecture 87 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM Pdf
Lecture 88 Introduction to Microservices 5:51
Lecture 89 Introduction to Containers 7:43
Lecture 90 Demo Introduction to AWS Elastic Container Service (ECS) 10:22
Lecture 91 ECS Security Best Practices 4:21
Lecture 92 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM Pdf

Section 11 : Practice Tests

Lecture 93 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM Pdf