1
Module 01 : Given an AWS Abuse Notice, Evaluate a Suspected Compromised Instance or Exposed Access Key
2
Module 02 : Verify that the Incident Response plan includes relevant AWS services
3
Module 03 : Evaluate the Configuration of Automated Alerting and Execute Possible Remediation of SecurityRelated Incidents and Emerging Issues
4
Module 04 : Design and implement security monitoring and alerting
5
Module 05 : Troubleshoot security monitoring and alerting
6
Module 06 : Design and Implement a Logging Solution
7
Module 07 : Design Edge Security on AWS
8
Module 08 : Troubleshoot Logging Solutions
9
Module 09 : Design and implement a secure network infrastructure
10
Module 10 : Troubleshoot a secure network infrastructure
11
Module 11 : Design and implement host-based security
12
Module 12 : Design and Implement a Scalable Authorization and Authentication System to Access AWS Resources
13
Module 13 : Troubleshoot an Authorization and Authentication System to Access AWS Resources
14
Module 14 : Design and implement key management and use
15
Module 15 : Troubleshoot key management
16
Module 16 : Design and implement a data encryption solution for data at rest and data in transit
Ask A Question