MODULE 01 : Given an AWS Abuse Notice, Evaluate a Suspected Compromised Instance or Exposed Access Key
MODULE 02 : Verify that the Incident Response plan includes relevant AWS services
MODULE 03 : Evaluate the Configuration of Automated Alerting and Execute Possible Remediation of Security-Related Incidents and Emerging Issues
MODULE 04 : Design and implement security monitoring and alerting
MODULE 05 : Troubleshoot security monitoring and alerting
MODULE 06 : Design and Implement a Logging Solution
MODULE 07 : Troubleshoot Logging Solutions
MODULE 08 : Design Edge Security on AWS
MODULE 09 : Design and implement a secure network infrastructure
MODULE 10 : Troubleshoot a secure network infrastructure
MODULE 11 : Design and implement host-based security
MODULE 12 : Design and Implement a Scalable Authorization and Authentication System to Access AWS Resources
MODULE 13 : Troubleshoot an Authorization and Authentication System to Access AWS Resources
MODULE 14 : Design and implement key management and use
MODULE 15 : Troubleshoot key management
MODULE 16 : Design and implement a data encryption solution for data at rest and data in transit