Training Video Course

AWS Certified Security - Specialty: AWS Certified Security - Specialty (SCS-C01)

PDFs and exam guides are not so efficient, right? Prepare for your Amazon examination with our training course. The AWS Certified Security - Specialty course contains a complete batch of videos that will provide you with profound and thorough knowledge related to Amazon certification exam. Pass the Amazon AWS Certified Security - Specialty test with flying colors.

Rating
4.46rating
Students
135
Duration
21:41:00 h
$16.49
$14.99

Curriculum for AWS Certified Security - Specialty Certification Video Course

Name of Video Time
Play Video: Understanding AWS Security Specialty exams
1. Understanding AWS Security Specialty exams
04:32
Name of Video Time
Play Video: Introduction to Domain 1
1. Introduction to Domain 1
03:18
Play Video: Case Study of Hacked Server
2. Case Study of Hacked Server
07:24
Play Video: Dealing with AWS Abuse Notice
3. Dealing with AWS Abuse Notice
07:28
Play Video: AWS GuardDuty
4. AWS GuardDuty
08:20
Play Video: Whitelisting Alerts in AWS GuardDuty
5. Whitelisting Alerts in AWS GuardDuty
04:33
Play Video: Understanding Incident Response Terminology
6. Understanding Incident Response Terminology
12:19
Play Video: Incident Response Use-Cases for Exams
7. Incident Response Use-Cases for Exams
02:38
Play Video: Use Case - Dealing with Exposed Access Keys
8. Use Case - Dealing with Exposed Access Keys
15:59
Play Video: Use Case - Dealing with compromised EC2 Instances
9. Use Case - Dealing with compromised EC2 Instances
05:01
Play Video: Incident Response in Cloud
10. Incident Response in Cloud
11:18
Play Video: Penetration Testing in AWS (New)
11. Penetration Testing in AWS (New)
06:27
Name of Video Time
Play Video: Introduction to Vulnerability, Exploit, Payload
1. Introduction to Vulnerability, Exploit, Payload
05:17
Play Video: VEP Practical - Hacking inside a test farm
2. VEP Practical - Hacking inside a test farm
08:02
Play Video: Understanding Automated Vulnerability Scanners
3. Understanding Automated Vulnerability Scanners
08:23
Play Video: Common Vulnerabilities Exposures & CVSS
4. Common Vulnerabilities Exposures & CVSS
08:38
Play Video: Introduction to AWS Inspector
5. Introduction to AWS Inspector
06:05
Play Video: Configuring AWS Inspector
6. Configuring AWS Inspector
06:42
Play Video: AWS Inspector & Nessus - CVE scans
7. AWS Inspector & Nessus - CVE scans
09:04
Play Video: Best Practices in Vulnerability Assessments
8. Best Practices in Vulnerability Assessments
07:53
Play Video: Overview of Layer 7 Firewalls
9. Overview of Layer 7 Firewalls
06:20
Play Video: Understanding AWS WAF
10. Understanding AWS WAF
12:47
Play Video: Implementing AWS WAF with ALB
11. Implementing AWS WAF with ALB
06:06
Play Video: Understanding EC2 Run Command
12. Understanding EC2 Run Command
04:22
Play Video: Deploying our first RunCommand
13. Deploying our first RunCommand
10:38
Play Video: Patch Compliance with SSM
14. Patch Compliance with SSM
03:38
Play Video: EC2 Systems Manager - Parameter Store
15. EC2 Systems Manager - Parameter Store
08:00
Play Video: Understanding CloudWatch Logs
16. Understanding CloudWatch Logs
04:15
Play Video: Pushing Linux system logs to CloudWatch
17. Pushing Linux system logs to CloudWatch
07:53
Play Video: CloudWatch Events
18. CloudWatch Events
08:54
Play Video: AWS Athena
19. AWS Athena
11:54
Play Video: Overview of AWS CloudTrail
20. Overview of AWS CloudTrail
09:21
Play Video: Improved Governance - AWS Config 01
21. Improved Governance - AWS Config 01
13:20
Play Video: Improved Governance - AWS Config 02
22. Improved Governance - AWS Config 02
09:17
Play Video: Trusted Advisor
23. Trusted Advisor
09:17
Play Video: CloudTrail - Log File Integrity Validation
24. CloudTrail - Log File Integrity Validation
08:40
Play Video: Digest Delivery Times
25. Digest Delivery Times
02:18
Play Video: Overview of AWS Macie (New)
26. Overview of AWS Macie (New)
08:39
Play Video: Creating our First Alert with AWS Macie (New)
27. Creating our First Alert with AWS Macie (New)
07:52
Play Video: S3 Event Notification
28. S3 Event Notification
07:15
Play Video: VPC Flow Logs
29. VPC Flow Logs
13:41
Name of Video Time
Play Video: Implementing Bastion Hosts
1. Implementing Bastion Hosts
11:01
Play Video: Introduction to Virtual Private Networks
2. Introduction to Virtual Private Networks
05:45
Play Video: OpenVPN is Awesome
3. OpenVPN is Awesome
05:12
Play Video: OpenVPN - Part 02
4. OpenVPN - Part 02
03:19
Play Video: Overview of AWS VPN Tunnels
5. Overview of AWS VPN Tunnels
06:15
Play Video: Using AWS VPN for On-Premise to AWS connectivity
6. Using AWS VPN for On-Premise to AWS connectivity
09:26
Play Video: Configuring first IPSec tunnel with OpenSwan - Part 01
7. Configuring first IPSec tunnel with OpenSwan - Part 01
13:49
Play Video: Configuring first IPSec tunnel with OpenSwan - Part 02
8. Configuring first IPSec tunnel with OpenSwan - Part 02
04:43
Play Video: Inter-Region VPC Peering
9. Inter-Region VPC Peering
07:40
Play Video: VPC Endpoints
10. VPC Endpoints
12:56
Play Video: Network ACL
11. Network ACL
09:17
Play Video: Understanding Stateful vs Stateless Firewalls
12. Understanding Stateful vs Stateless Firewalls
13:39
Play Video: Understanding Networking Sockets
13. Understanding Networking Sockets
10:50
Play Video: Revising Security Groups
14. Revising Security Groups
04:51
Play Video: Connection of Security Group & NIC Cards
15. Connection of Security Group & NIC Cards
06:30
Play Video: Egress Rules - The Real Challenge
16. Egress Rules - The Real Challenge
12:38
Play Video: IPTABLES & Instance Metadata
17. IPTABLES & Instance Metadata
11:57
Play Video: IDS / IPS in AWS
18. IDS / IPS in AWS
05:15
Play Video: EBS Architecture & Secure Data Wiping
19. EBS Architecture & Secure Data Wiping
13:48
Play Video: Introduction to Reverse Proxies
20. Introduction to Reverse Proxies
07:54
Play Video: Understanding the Content Delivery Networks
21. Understanding the Content Delivery Networks
05:31
Play Video: Understanding Edge Locations
22. Understanding Edge Locations
07:47
Play Video: Deploying Cloudfront Distribution - Part 01
23. Deploying Cloudfront Distribution - Part 01
07:22
Play Video: Understanding the Origin Access Identity
24. Understanding the Origin Access Identity
05:23
Play Video: Understanding importance of SNI in TLS protocol
25. Understanding importance of SNI in TLS protocol
09:07
Play Video: CloudFront Signed URL - 01
26. CloudFront Signed URL - 01
06:53
Play Video: CloudFront Signed URL - 02
27. CloudFront Signed URL - 02
09:55
Play Video: Real World example on DOS Implementation
28. Real World example on DOS Implementation
08:20
Play Video: AWS Shield
29. AWS Shield
04:05
Play Video: Mitigating DDOS Attacks
30. Mitigating DDOS Attacks
09:50
Play Video: Introduction to Application Programming Interface (API)
31. Introduction to Application Programming Interface (API)
15:12
Play Video: Understanding the working of API
32. Understanding the working of API
09:32
Play Video: Building Lambda Function for our API
33. Building Lambda Function for our API
04:18
Play Video: Building our first API with API Gateway
34. Building our first API with API Gateway
05:46
Play Video: API Gateway - Important Pointers for Exams
35. API Gateway - Important Pointers for Exams
04:24
Play Video: Lambda & S3
36. Lambda & S3
05:42
Play Video: EC2 Key-Pair Troubleshooting
37. EC2 Key-Pair Troubleshooting
10:48
Play Video: EC2 Tenancy Attribute
38. EC2 Tenancy Attribute
05:36
Play Video: AWS Artifact
39. AWS Artifact
02:45
Play Video: Lambda@Edge
40. Lambda@Edge
10:48
Play Video: AWS Simple Email Service (SES) (New)
41. AWS Simple Email Service (SES) (New)
06:15
Name of Video Time
Play Video: Understanding AWS Organizations
1. Understanding AWS Organizations
06:17
Play Video: AWS Organizations - Practical
2. AWS Organizations - Practical
08:34
Play Video: Organizational Unit (OU) in AWS organization
3. Organizational Unit (OU) in AWS organization
05:15
Play Video: IAM Policy Evaluation Logic
4. IAM Policy Evaluation Logic
11:33
Play Video: Understanding IAM Policies
5. Understanding IAM Policies
15:06
Play Video: IAM Policies - Part 02
6. IAM Policies - Part 02
11:56
Play Video: Delegation - Cross Account Trust - Part 1
7. Delegation - Cross Account Trust - Part 1
07:02
Play Video: Delegation - Cross Account Trust - Part 2
8. Delegation - Cross Account Trust - Part 2
10:02
Play Video: Revising AWS CLI
9. Revising AWS CLI
11:54
Play Video: Revising IAM Role
10. Revising IAM Role
10:56
Play Video: EC2 Instance Meta-Data
11. EC2 Instance Meta-Data
07:56
Play Video: Understanding working of an IAM role
12. Understanding working of an IAM role
07:52
Play Video: IAM - Version Element
13. IAM - Version Element
09:56
Play Video: IAM Policy Variables
14. IAM Policy Variables
04:15
Play Video: Principal and NotPrincipal Element
15. Principal and NotPrincipal Element
07:24
Play Video: Implementing NotPrincipal Element
16. Implementing NotPrincipal Element
03:55
Play Video: Conditionl Element
17. Conditionl Element
07:08
Play Video: AWS Security Token Service
18. AWS Security Token Service
07:24
Play Video: AWS STS - Migrating the EC2 Role Credentials - Part 2
19. AWS STS - Migrating the EC2 Role Credentials - Part 2
04:21
Play Video: AWS STS - Architecturing IAM user keys the right way - Part 3
20. AWS STS - Architecturing IAM user keys the right way - Part 3
16:55
Play Video: AWS STS - Automate the temporary credentials - Part 4
21. AWS STS - Automate the temporary credentials - Part 4
04:18
Play Video: Understanding Federation - Part 01
22. Understanding Federation - Part 01
06:08
Play Video: Understanding Federation - Part 02
23. Understanding Federation - Part 02
08:02
Play Video: Understanding SAML for SSO
24. Understanding SAML for SSO
14:09
Play Video: Capturing SAML Assertion Packets with Tracer
25. Capturing SAML Assertion Packets with Tracer
07:19
Play Video: Establishing trust between IdP and SP
26. Establishing trust between IdP and SP
20:33
Play Video: Choosing a right IdP
27. Choosing a right IdP
06:15
Play Video: AWS Cognito
28. AWS Cognito
11:23
Play Video: Introduction to AWS Directory Service
29. Introduction to AWS Directory Service
10:28
Play Video: Understanding Active Directory
30. Understanding Active Directory
04:13
Play Video: Deploy our first SimpleAD based directory service
31. Deploy our first SimpleAD based directory service
04:16
Play Video: Domain Joining EC2 instance with Directory Service
32. Domain Joining EC2 instance with Directory Service
09:17
Play Video: Trusts in Active Directory
33. Trusts in Active Directory
07:25
Play Video: IAM & S3
34. IAM & S3
10:34
Play Video: S3 Bucket Policies
35. S3 Bucket Policies
07:31
Play Video: Cross Account S3 Bucket Configuration
36. Cross Account S3 Bucket Configuration
10:59
Play Video: Canned ACL's
37. Canned ACL's
09:05
Play Video: Understanding Signed URL's
38. Understanding Signed URL's
13:47
Play Video: S3 - Versioning
39. S3 - Versioning
06:02
Play Video: S3 - Cross Region Replication
40. S3 - Cross Region Replication
07:37
Play Video: IAM Permission Boundaries (New)
41. IAM Permission Boundaries (New)
09:38
Play Video: Troubleshooting IAM Policies
42. Troubleshooting IAM Policies
01:47
Play Video: Troubleshooting Answers - Solution 01
43. Troubleshooting Answers - Solution 01
04:46
Play Video: Troubleshooting Answers - Solution 02
44. Troubleshooting Answers - Solution 02
05:28
Play Video: Troubleshooting Answers - Solution 03
45. Troubleshooting Answers - Solution 03
04:24
Play Video: Troubleshooting Answers - Solution 04
46. Troubleshooting Answers - Solution 04
01:24
Play Video: Troubleshooting Answers - Solution 05
47. Troubleshooting Answers - Solution 05
03:32
Name of Video Time
Play Video: Introduction to Cryptography
1. Introduction to Cryptography
12:15
Play Video: Plain Text vs Encrypted Text Based Algorithms
2. Plain Text vs Encrypted Text Based Algorithms
07:07
Play Video: CloudHSM
3. CloudHSM
06:36
Play Video: AWS Key Management Service
4. AWS Key Management Service
09:14
Play Video: AWS Key Management Service - Part 02
5. AWS Key Management Service - Part 02
08:20
Play Video: AWS Key Management Service - Part 03
6. AWS Key Management Service - Part 03
07:26
Play Video: AWS Key Management Service - Data Key Caching
7. AWS Key Management Service - Data Key Caching
09:26
Play Video: AWS Key Management Service - Scheduled CMK Deletion
8. AWS Key Management Service - Scheduled CMK Deletion
04:00
Play Video: AWS Key Management Service - CMK Deletion & EBS Use-Case
9. AWS Key Management Service - CMK Deletion & EBS Use-Case
04:51
Play Video: Reducing Risk of Unmanageable CMK
10. Reducing Risk of Unmanageable CMK
03:21
Play Video: KMS - Authentication and Access Control
11. KMS - Authentication and Access Control
05:35
Play Video: KMS Policy Evaluation Logic - Use Case Solution - 01
12. KMS Policy Evaluation Logic - Use Case Solution - 01
03:01
Play Video: KMS Policy Evaluation Logic - Use Case Solution - 01
13. KMS Policy Evaluation Logic - Use Case Solution - 01
04:25
Play Video: KMS Policy Evaluation Logic - Use Case 02
14. KMS Policy Evaluation Logic - Use Case 02
01:56
Play Video: KMS Policy Evaluation Logic - Use Case Solution - 02
15. KMS Policy Evaluation Logic - Use Case Solution - 02
03:08
Play Video: KMS Policy Evaluation Logic - Use Case - 03
16. KMS Policy Evaluation Logic - Use Case - 03
00:44
Play Video: KMS Policy Evaluation Logic - Use Case Solution - 03 (New)
17. KMS Policy Evaluation Logic - Use Case Solution - 03 (New)
01:41
Play Video: KMS Grants
18. KMS Grants
12:08
Play Video: Importing Key Material to KMS
19. Importing Key Material to KMS
07:45
Play Video: KMS ViaService
20. KMS ViaService
08:20
Play Video: Migrating Encrypted KMS Data Across Regions
21. Migrating Encrypted KMS Data Across Regions
07:32
Play Video: S3 Encryption
22. S3 Encryption
11:55
Play Video: Revising ELB Listener Configuration
23. Revising ELB Listener Configuration
08:42
Play Video: ELB Listeners - Understanding HTTP vs TCP Listeners
24. ELB Listeners - Understanding HTTP vs TCP Listeners
08:59
Play Video: Understanding AWS Certificate Manager
25. Understanding AWS Certificate Manager
05:23
Play Video: Deploying SSL/TLS certificate with ACM
26. Deploying SSL/TLS certificate with ACM
03:08
Play Video: Configuring ELB with HTTPS for SSL Offloading
27. Configuring ELB with HTTPS for SSL Offloading
04:54
Play Video: Glacier Vault and Vault Lock
28. Glacier Vault and Vault Lock
07:40
Play Video: DynamoDB Encryption
29. DynamoDB Encryption
02:57
Play Video: Overview of AWS Secrets Manager
30. Overview of AWS Secrets Manager
05:59
Play Video: RDS Integration with AWS Secrets Manager
31. RDS Integration with AWS Secrets Manager
10:07
Name of Video Time
Play Video: Important Pointers - Domain 1
1. Important Pointers - Domain 1
05:49
Play Video: Important Pointers - Domain 2
2. Important Pointers - Domain 2
08:16
Play Video: Important Pointers - Domain 3
3. Important Pointers - Domain 3
09:21
Play Video: Important Pointers - Domain 4
4. Important Pointers - Domain 4
05:45
Play Video: Important Pointers - Domain 5
5. Important Pointers - Domain 5
08:50

Amazon AWS Certified Security - Specialty Exam Dumps, Practice Test Questions

100% Latest & Updated Amazon AWS Certified Security - Specialty Practice Test Questions, Exam Dumps & Verified Answers!
30 Days Free Updates, Instant Download!

Amazon AWS Certified Security - Specialty Premium Bundle
$69.97
$49.99

AWS Certified Security - Specialty Premium Bundle

  • Premium File: 467 Questions & Answers. Last update: Mar 11, 2023
  • Training Course: 165 Video Lectures
  • Study Guide: 552 Pages
  • Latest Questions
  • 100% Accurate Answers
  • Fast Exam Updates

AWS Certified Security - Specialty Premium Bundle

Amazon AWS Certified Security - Specialty Premium Bundle
  • Premium File: 467 Questions & Answers. Last update: Mar 11, 2023
  • Training Course: 165 Video Lectures
  • Study Guide: 552 Pages
  • Latest Questions
  • 100% Accurate Answers
  • Fast Exam Updates
$69.97
$49.99

Free AWS Certified Security - Specialty Exam Questions & AWS Certified Security - Specialty Dumps

File Name Size Votes
File Name
amazon.passguide.aws certified security - specialty.v2023-01-27.by.sebastian.195q.vce
Size
2.18 MB
Votes
1
File Name
amazon.testking.aws certified security - specialty.v2021-12-14.by.molly.191q.vce
Size
1.5 MB
Votes
1
File Name
amazon.passcertification.aws certified security - specialty.v2021-09-13.by.maverick.159q.vce
Size
1.47 MB
Votes
1
File Name
amazon.train4sure.aws certified security - specialty.v2021-04-30.by.charlotte.149q.vce
Size
1.14 MB
Votes
2
File Name
amazon.pass4sure.aws certified security - specialty.v2021-02-12.by.noah.145q.vce
Size
1.25 MB
Votes
2

Amazon AWS Certified Security - Specialty Training Course

Want verified and proven knowledge for AWS Certified Security - Specialty (SCS-C01)? Believe it's easy when you have ExamSnap's AWS Certified Security - Specialty (SCS-C01) certification video training course by your side which along with our Amazon AWS Certified Security - Specialty Exam Dumps & Practice Test questions provide a complete solution to pass your exam Read More.

Domain 2 - Logging & Monitoring

14. Patch Compliance with SSM

Hey everyone, and welcome back. So, continuing our journey with the Systems manager, today we'll be focusing specifically on patch compliance. So recently, I have been working with one of the startups. One of the challenges with them was that they were running a public facing endpoint and they had an open source application that they were running and they were hacked. On further investigation, we came to know that the reason why they were compromised was because the application that they were running on the public endpoint had a lot of critical vulnerabilities which the attackers were able to exploit. They would have been saved now if they had updated their application with the latest security fixes. And the same goes with the servers as well. Servers also have a lot of packages, and each package might have some kind of security vulnerability that will be exposed today or tomorrow. Now it is necessary to ensure our servers are up to date. Now, there is a feature called "Patch Compliance." Basically, patch compliance allows us to determine the patch status associated with the specific instance. So in the earlier lecture, we installed the SSM agent in one of the EC two instances.

And now within the patch compliance you see that it is showing that one instance is missing the update. Now, how did this appear? Now, in order for all of these things to appear, what you need to do is run a document named AWS Run Patch baseline. So let's try it out. Let's see if we can find it out from here. It seems it doesn't work via search, so let's quickly find it out. Yeah, so this is the one that is the AWS Run Patch baseline. So this is the document name and you have to select the instances by default, since we only have one instance. This is the instance which is selected. So once you've selected it, you can just click on "Run" and this will be executed. So it might take a little time, and once this patch baseline gets executed, you can go to the patch compliance and it will show you the missing updates. Now you can definitely update the packages as well from the systems manager. Maybe it can be done by the "Run" command itself. In the exam, you might be asked, "How can you tell which instance is missing which patch?" And the answer to this should be patch compliance only. So there can be multiple options. But just remember that Patch compliance from Systems Manager allows you to find which instance is missing updates, and in case you want to update the system, you can do it again with the systems manager, with the Run command also. So, a small lecture. I hope this has been informative for you and I look forward to seeing the next lecture.

15. EC2 Systems Manager - Parameter Store

Hey everyone, and welcome back. In today's video we will be discussing the Parameter Store. Now, Parameter Store is a fantastic feature included in AWS's Systems Manager that allows us to offload secrets from development code. So let's go to and understand more about the Parameter Store. Now, going by the definition of AWS Systems Manager ParameterStore, it provides a centralised store to manage the configuration data, whether it is plain text or can be a secret such as tokens or passwords. So let's understand this with a simple diagram where on the left hand side you have an application code and within the application code you have created a function. Within the function, you have now defined two values. One is a username and you have a password. So this is something that I'm sure most of you might be familiar with.

The problem with this kind of approach is that most developers will probably commit this code within the Git repository and it will get leaked. And the second problem is that once the developer commits the code, all the people or all the team members will be able to see the username and password. And in case someone is leaving the organisation, he will take this username and password as a parting gift with him. So this is definitely not a recommended practice. Now, the way in which you can improve upon this kind of scenario is to use a Parameter Store. So on the right hand side, again, you have an application code. Now within this function, the password, instead of hardcoding the password, here you are having a variable where you are getting the password from the Parameter Store. So you have SSN GETPERON. So what you ask your developer to do is ask them to fetch the password from the Parameters Store. So when the application gets built within the EC two instances during the buildtime, this value will be populated. So not only is it good practice, but the developer will not be aware of this specific secret.

So this is a great thing that should be done in the organization. So let's go ahead and do the practical, which will give us a much more clear visibility. So I'm in my EC to console and at the bottom there is an option for Parameter Store. I'll click here and I'll click on Get Started. Now, so this will take us to the option of creating a parameter. Let me create a parameter. I'll name it "RDS password." Within the description, I'll say this is the RDS password, and within the value, let me give a random value. All right, so this is some random value that I have given, and I'll click on "create Parameter." So our first parameter is created, and its name is RDS password, and the value associated with it is the one we specified. So, when the application is deployed within the EC two instance, you could ask the developer to retrieve the value associated with this specific parameter store. So as far as the CLI is concerned, let's look into how we can fetch the value from the AWS CLI. In order to do that, I'll do a double SSM CLI in Google, and it will take us to the systems manager CLI documentation. We are more interested in the Parameter Store service. So I'll just do a Get Parameter and I'll click here. So this is the CLI command that we are interested in, AWS SSN get parameter. And within this, there is a recommended or mandatory value of the name that you need to give. So let's go ahead and look into how we can work on the CLI aspect. So I'm in my CLI and let's do AWS SSN get parameter.

And the mandatory value was the parameter name. Our parameter name was RDS password. If I press Enter, you will see it will give us the value associated with this parameter. And the same thing you can ask developers to do, as we've already discussed, you should give them the parameter name and they will have an SDK or they will go through a CLI to fetch the value which the application will use. So basically, the application will not really have any secrets; it will in turn fetch them from the Parameter Store. So this is the basic about Parameter Store. There is one more part that I wanted to show you, so let's go to create the parameter name. This time I'll give RDS Secure and within the type you'll see there are three types which are available. One is strings. The second type is a string list, and the third type is a secured string. So a secure string is something that secures the storage of your passwords or secrets. So whenever I click over here, it will give us the KMS key ID. So basically, whatever value that you will be putting in, it will be encrypted with the KMS. So, by default, it will take the defaultAWS SSM kms, the value associated with this. Let me give some random values. Now, the difference that you will see over here is that whatever value that you are typing, it is not being shown in plain text, it is actually encrypted.

So if I go ahead and create a parameter within the RDS parameter which is of type string, you'll see the value is directly shown to us. However, if I type on RDS Secure or if I select this, the value is not shown as plaintext by default. However, if you have proper permission, you do have an option in which you can get the plaintext value. So if I click on show, you see it has given us the plain text value over here. So let's look into the difference that it would make us when it comes to the AWS CLI or even the AWS SDK. So within the AWS CLI I'll run the same command, which is AWSN get parameter. The name would be RDS secure and the output that it has given us is the value. Now, if you'll see, this is thevalue, which is encrypted with the KMS. So this is not the plain text value. When you get the parameter associated with thestring, it will now return the plaintext value directly. However, if you do a secure string, it will not return as the plaintext value. This is the encrypted value. Now, in order to have a decrypted value, there is an option within the AWS CLI and within the CLI, if you see, there is the option of with decryption. So with decryption, we will basically tell parameters to give us the decrypted value. You also have no idea with decryption, which is that it will give us the encrypted value. So this is the default choice. So let's do one thing. I will do this with the decryption description. This time it gave us the plain text value. So this is what the parameter store is all about.

16. Understanding CloudWatch Logs

Hey everyone, and welcome back to the Knowledge Pool video series. So, continuing a journey with Cloud Watch Today we'll be looking into the Cloud Watch logs aspect. So let's understand it with a simple example. So generally, if you talk about a typical server, be it Linux or even Windows, each and every server has its own log files. So a server can contain a lot of log files, which can range from system logs to even application logs if an application is running. So whenever you want to debug something, it is necessary that we have access to the log files. Now, in the default behavior, since the log files are stored within the system, if anyone wants to debug a specific thing which is not working, that person would need access to the server. So let's take an example, so you have an application running, a PHP application running on a Linux server.

So for some reason, the PHP application is not running properly as expected and the developer wants to look into the log file. So what you'll have to do in normal behavior is give him SSH access to the developer, and then he will be able to go through the log files. So that is one which is not considered good security practice. Ideally, if you go into an organization that deals with sensitive information, none of the developers have access to the server. By default behavior, no developer will have access to the server. Now the question is, you might ask, if the developer does not have access to the server,how will he debug the log files? And the answer is to centralize the log solution. So, ideally, you'd like to pull the log files from the server and place them in a central location where the developer can examine them. So let me give you one of the examples in order to understand it better. So I'll just log into the server and if you go into the wire log, you'll see there are a lot of log files. Now, let's assume that you want to debug a log file called "viral messages." So one of the approaches to this is that you manually log into the server. You run a tail in the messages file and investigate the troubleshooting aspect.

However, the second and most ideal use case is when you push all of these log files to a central location where one can query them. So in my case, what I have done is, since we are speaking of the Cloud Watch log,I have pushed these files to a central solution. So if you look into the Cloud Watch console, you will see I have a log group named "wire log messages." So if I go here I have the instance ID and now you see I have all the messages which are part of the warlock messages log file. So, similarly, you can even push all the application logs to a central log server. It can be Cloud Watch, RSYS log, elastic search, etc., but the main point is that if you push all log files to a central log server, you don't need to give anyone inside the system access. So this is what the concept related to the Cloud Watch log group is all about. So what we'll be doing is we'll wrap up this lecture and in the next lecture we'll go ahead and look into how we can push the log files from the EC2 instance to a Cloud Watch log group. So that concludes this lecture; I hope you found it informative, and I hope to see you in the next one.

17. Pushing Linux system logs to CloudWatch

Hey everyone and welcome back to the second lecture of Cloud Watch logs. So in this lecture we'll do the practical session and we'll look into how we can push the logs from the Linux servers to the Cloud Watch group. So in order to do that, what we will do is switch to the Oregon region where I have my EC Two instance up and running. So let me just quickly show you. So we have one EC2 instance which is up and running in the Oregon region. And what we'll be doing is we'll be pushing the logs that are generated in this ECTwo instance to a central Cloud Watch log group.

Perfect. So the very first thing that you would need to do is you would have to allow this EC2 instance to create the log group and push the logs there. So let me just show you an example of what I mean by this. So if you go to the Cloud Watch console and go to the logs, you will see there is a log group which is created by the name "Wire log messages." And within this log group, there are a lot of log messages that are created. So in order for the EC2 instance to create the log group and push the logs to the log group which is created, we need to allow that EC2 instance to do these things. So the very first thing that we have to do is to create an im role policy that allows EC Two to achieve those use cases. So let's go ahead and do that. So if I go to the immoral, let's create a new inline policy.

Over here I'll select the Jason, and from the documentation itself, they have already given a policy document. So within the policy document you have seen, the first action is to create a log group. So this is the first thing that it needs to do. Then there is one more action, like putting in log events. So this allows putting the log events from the system into the log group which is created. So we'll use this policy. I'll be pasting this in the resource section, so you can just copy it as well. So we'll take this policy. I'll review the policy quickly, and I'll name it Cloud Watch logs. quickly Click on "Create Policy. Perfect. So now we have a policy which allows ECTwo instances to create a log group and push the events to that newly created log group. Perfect. So now that we have done that, let's go to the Cloud Watch consoles again. This time, since we are working in the Oregonregion, we'll be looking into the logs here. So now you see there are no log groups which are created. Perfect. So what we'll do is create our first log group. Now before we do that. We have to install a Cloud Watch agent on the server and that agent is basically responsible for pushing the logs, so if you do yam install AWS logs, this is the agent which we need to install.

I am running Amazon Linux, so this agent is directly available from the young repository itself. If you're using some different operating system, you can go through the documentation and they have a different approach to achieving the same. So now that I have AWS logs installed, let's quickly verify the status of AWS logs are perfect So the very first thing that we'll do is go to the configuration directory of AWS logs and there are two important configuration files that we need to work into. The first is awscli con f and this is the place where we can specify the region where the log group will be created. So what I'll do is let me perfect solet me change the region from US east one to USwest two, which is the Oregon region where you're working. Once you have configured the Awsli con f, let's quickly also explore the AWS logs con f and if you go a bit down here, you will see that there is one configuration store which is configured, which is for wire log messages. So we can add more log files here so what I'll do. Let's leave it to the default configuration and I'll do service So now that AWS logs have started, you can look into the progress related to AWS logs within the varlog directory where you can do tlsawlogs log.

So this is the log file for the AWS log agent which is running in the easy to instance. Once the configuration file has been configured, you see that you have a new log group which is created which is virloog messages. And within this log group you have all the log files which belong to the files which are specified within the A slogs sooner important One thing that I'd like to show you is that generally when you specify various log files, you have wire log messages, you might even have wire log applications as well, so generally it is recommended to have a different log group name.

Now once you have a different log group name, what you can actually do is restrict the permission associated with each log group, so this viral message is not required for developers. This is more required for the system administrator, so you can create a policy where only the system administrator can read the messages within the wire log messages log group similarly. If you have some application-specific log group, you can create a policy where only certain developers who are in that application team can access the log files within that log group. So these policies can be defined if you have separate log groups that are created. So this is it. About this lecture I hope you found this information useful, and I hope to see you at the next lecture.

Prepared by Top Experts, the top IT Trainers ensure that when it comes to your IT exam prep and you can count on ExamSnap AWS Certified Security - Specialty (SCS-C01) certification video training course that goes in line with the corresponding Amazon AWS Certified Security - Specialty exam dumps, study guide, and practice test questions & answers.

Comments (0)

Add Comment

Please post your comments about AWS Certified Security - Specialty Exams. Don't share your email address asking for AWS Certified Security - Specialty braindumps or AWS Certified Security - Specialty exam pdf files.

Add Comment

Purchase Individually

AWS Certified Security - Specialty  Premium File
AWS Certified Security - Specialty
Premium File
467 Q&A
$43.99 $39.99
AWS Certified Security - Specialty  Training Course
AWS Certified Security - Specialty
Training Course
165 Lectures
$16.49 $14.99
AWS Certified Security - Specialty  Study Guide
AWS Certified Security - Specialty
Study Guide
552 Pages
$16.49 $14.99

Only Registered Members can View Training Courses

Please fill out your email address below in order to view Training Courses. Registration is Free and Easy, You Simply need to provide an email address.

  • Trusted by 1.2M IT Certification Candidates Every Month
  • Hundreds Hours of Videos
  • Instant download After Registration

Already Member? Click here to Login

A confirmation link will be sent to this email address to verify your login

UP

LIMITED OFFER: GET 30% Discount

This is ONE TIME OFFER

ExamSnap Discount Offer
Enter Your Email Address to Receive Your 30% Discount Code

A confirmation link will be sent to this email address to verify your login. *We value your privacy. We will not rent or sell your email address.

Download Free Demo of VCE Exam Simulator

Experience Avanset VCE Exam Simulator for yourself.

Simply submit your e-mail address below to get started with our interactive software demo of your free trial.

Free Demo Limits: In the demo version you will be able to access only first 5 questions from exam.