AAA in AWS
Authentication, Authorization, and Access Control
Authentication, Authorization, and Access Control
Authentication, Authorization, and Accounting
Protective measures for C-I-A
Managing goods and services
The different agreement types you'll encounter when working in Cybersecurity
CloudWatch Alarms and EventBridge
Alert, monitor, and scan
Wearing two hats
Intelligent threat detection
Automated and continual vulnerability management
Protecting sensitive data
Enhancing resource utilization
Using a pair of keys
Verifying software integrity and authenticity
Internal and external assessments
PAP, NTLM, Kerberos, and the sorts
Sample tasks to automate
When to Automate and Orchestrate
Compliance Management with Artifact and Macie
Provision and manage SSL/TLS certificates
Assess, audit, and evaluate configurations
Create and control your cryptographic keys
Centrally manage your secrets
Resources for the exam
Optimize costs, performance, etc.
Azure Security
Security Baselines and Security Standards
A distributed ledger technology
Sustaining operations during disruption
Sustaining operations during disruption
Verifying and Invalidating
Notes for the Microsoft Azure Security Technologies (AZ-500)
The paper trail for evidence handling
Change Management Process and Owners
The perfect encryption algorithm
Confidentiality, Integrity, and Availability
Preparing for the CISSP Exam
Security issues on each side
Amazon CloudTrail
Amazon CloudWatch
Algorithm for encrypting and decrypting information
Order of Volatility and Data Collection Procedures
Common Hashing Attacks
Adherence to laws, regulations, standards, and policies
Laws protecting against computer crimes
Types of Investigations in Cybersecurity
COBIT, ISO 27001, NIST 800-53, etc.
Consistently managing security controls
Securing information through encoding
Backup Types and Considerations
Encrypting data at rest and in motion
Classifications, Ownership, and Lifecycle
Identify, monitor, and protect sensitive data
Generally Accepted Privacy Principles (GAAP)
Ways to protect your data in AWS
Securing data
Framework for ensuring C-I-A
States, Types, and Classifications of Data
Database Security
Distributed Denial of Service (DDoS)
Identity and Access Management
Sanitizing and destroying data
Types of digital certificates for enterprise
Investigating devices to uncover evidence
Large-scale parallel and distributed systems
Hierarchical and decentralized naming system
Real-world Disaster Recovery
Dynamic Data Masking in Azure SQL
Securing your Loadbalacers
Protecting email accounts and systems
Specialized computing systems with specific functions
Securing data through various methods
Act immediately, contain the situation
Ways to store, recover, and secure keys
Types of Evidence in Cybersecurity
Security Information and Event Management
Firewalls - Its uses and types
Securing your AWS Account
Current performance versus desired performance
Overall management of the organization's IT resources
Policies, Standards, Procedures, and Guidelins
High Availability and Disaster Recovery
Securing hardware memory and interfaces
Converting data into fixed-size value using a function
Identity and Access Management
Identity and Access Management
SSO,, OAuth, SAML, and OIDC
Intrusion Detection and Intrusion Prevention
GDPR, HIPAA,PCI DSS, etc.
Monitoring is key to detecting signs of incidents
Full mitigation mode to control damage and loss
Summary of Incident Response Terminologies
Processes and tools used in incident response
Selecting Infrastructure Controls
Securing your AWS Infrastructure
Combining into one comprehensive system
Protecting the legal rights if creators and owners
Incident Response Models and Exercises
Reflect and Improve
Centralizing and Investigating Logs
Logging and monitoring options in AWS
Tools for Logs
Electronic methods to restrict access
CloudWatch Logs and Insights
Management Reviews and Approval
Detecting and remediating incidents
BYOD, COPE, and CYOD
The different types of mobile communications systems
Physical, logical, and secure ports
Packet Captures and the sorts
Networking Security
New Subscription shows Zero Credit
NIST Definitions from 800-34 Revisions 1
Securing on-premise datacenters
Different types of secure architectures
The OWASP Top 10 is a standard awareness document for developers and web application security.
Simulated cyber attack
Identification, Collection, Analysis, and Reporting
Tangible security measures
Physical, logical, and secure ports
Preservation of Evidence
Implementing Principle of Least Privilege
Protecting and Mishandling Data
Using asymmetrical key pairs
Redundant Array of Independent Disks
Phase 1 of Penetration Testing
Restoring to normal operations
Disclosing information in confidence
Limiting the access on your S3 Buckets
Managing and Prioritizing Risks
CIS, ISO, NIST etc.
Identify, assess, and prioritize risk
Methods to encrypt S3
Security Content Automation Protocol
Securing Azure Solutions with Azure Active Directory
Securing the network infrastructure
Understanding of potential threats
Physical, Technical, Administrative, etc.
Security Design Principles
Measuring efficiency with metrics
Security Design Principles
Common security policies
Policies, procedures, and controls
Security Design Principles
Security Information and Event Management
A central point of access
Simple Network Management Protocol
Security Orchestration, Automation, and Response
SPOF Analysis and IT Contingency Plans
GDPR, HIPAA,PCI DSS, etc.
Storage Security
Study Plan for CompTIA Security+
Using the same key
Hardening and Securing the Infrastructure
Summary of cybersecurity terms
Identity and Access Management
The ISC2 Code of Ethics
Potential security from external entities
Transport Layer Security and IP Security
The Onion Router
Enhanced security features in real-time
Internal and external assessments
Managing patches
Assessing vendors
Assessing vendors
Extending a private network over a public one
Identifying Vulnerabilities
Response and Remediate
Vulnerability Scans
Security through Managed Firewall and API Gateway features
wireless Networking
Securing wireless infrastructure
No one should be trusted by default
Zero Trust Concepts