Amazon AWS · Advanced · ~40h · Free

AWS Security Specialty
SCS-C02 Complete Course

The definitive free course for the AWS Certified Security – Specialty exam. Master GuardDuty threat detection, CloudTrail Lake forensic queries, WAF and Shield Advanced DDoS defense, KMS envelope encryption, Secrets Manager rotation, IAM policy evaluation, SCPs, and incident response automation. Scenario-based approach — every module maps directly to exam question types.

SCS-C02 7 modules ~40h study 60 practice questions advanced
⚡ Start practice quiz Listen on Spotify
Exam fact Details
Exam codeSCS-C02
Full nameAWS Certified Security – Specialty
Questions65 (mix of single-answer MCQ and multiple-response)
Passing score750 / 1000
Duration170 minutes
Price$300 USD
Prerequisites5+ years IT security experience; AWS Associate-level certification recommended
RenewalFree annual online assessment or recertify every 3 years

Exam domain weights

Domain 1 — Threat Detection & Incident Response 14%
Domain 2 — Security Logging & Monitoring 18%
Domain 3 — Infrastructure Security 20%
Domain 4 — Identity & Access Management 16%
Domain 5 — Data Protection 18%
Domain 6 — Management & Security Governance 14%

Course modules

Module 1
AWS Security Foundations & the Shared Responsibility Model

Establish the mental model that underpins every SCS-C02 domain. Understand exactly what AWS manages (hardware, hypervisor, global infrastructure) versus what you own (IAM configuration, OS patching, network ACLs, data encryption). Learn the Well-Architected Security Pillar's seven design principles: strong identity foundation, enabling traceability, applying security at all layers, automating security best practices, protecting data in transit and at rest, keeping people away from data, and preparing for security events.

Shared responsibility by service type Well-Architected Security Pillar AWS Organizations structure (root/OU/account) Security account vs management account Delegated admin patterns Defense-in-depth at scale
Module 2
Threat Detection & Incident Response (Domain 1)

Build automated threat detection and response pipelines that cover the full PICERL lifecycle (Prepare, Identify, Contain, Eradicate, Recover, Learn). GuardDuty continuously analyzes VPC Flow Logs, DNS logs, CloudTrail, and S3 data events to detect threats across 300+ finding types. Amazon Detective automatically creates entity behavior graphs from GuardDuty, CloudTrail, and VPC Flow Logs to accelerate investigation. Learn the EventBridge→Lambda automation pattern for auto-isolation of compromised EC2 instances and RDS snapshots for forensics.

GuardDuty finding types (EC2, IAM, S3, EKS, Lambda) Amazon Detective behavior graphs Amazon Macie PII discovery + S3 remediation EventBridge → Lambda incident automation EC2 forensic isolation (quarantine SG + EBS snapshot) AWS Shield Advanced DRT engagement STS credential revocation (aws:TokenIssueTime)
Module 3
Security Logging & Monitoring (Domain 2)

Build a tamper-resistant, centralized audit trail across all accounts. CloudTrail management events are free but data events (S3 object-level, Lambda invocations, DynamoDB operations) must be explicitly enabled. CloudTrail Lake is the SQL-based analytics service for long-term event retention (up to 7 years) with organization event data stores. Security Hub aggregates findings from 20+ AWS services, scoring your posture against FSBP, CIS, and PCI DSS. Audit Manager pre-built frameworks automatically collect evidence for HIPAA, SOC 2, and GDPR audits.

CloudTrail management vs data events Organization trails (member admins can't disable) CloudTrail Lake SQL queries + 7-year retention CloudTrail log file integrity validation Security Hub FSBP score + aggregation Audit Manager evidence collection IAM Access Analyzer (external access + policy generation) CloudWatch anomaly detection + composite alarms
Module 4
Infrastructure Security — Network, WAF & Shield (Domain 3)

Defend AWS network perimeters at every layer. AWS WAF inspects HTTP/HTTPS traffic at layer 7 with managed rules (IP reputation, bot control, core rule set) and custom rules (rate-based, regex, geographic match). Rule evaluation order is critical: always place IP allow rules at higher priority (lower number) than block rules. Shield Advanced provides DDoS financial protection and 24/7 DRT access for volumetric, state exhaustion, and application-layer attacks. AWS Network Firewall adds stateful deep packet inspection with Suricata rule groups. Gateway Load Balancer enables transparent third-party IDS/IPS appliance insertion.

WAF managed rules + custom rules + rate limiting WAF rule priority evaluation order Shield Standard vs Advanced (DRT + cost protection) AWS Network Firewall (stateful + Suricata) AWS Firewall Manager organization-wide policies VPC gateway endpoints vs interface endpoints (PrivateLink) Gateway Load Balancer (GENEVE protocol) NACLs (stateless) vs security groups (stateful) PCI DSS network segmentation with dedicated VPCs
Module 5
Identity & Access Management — Advanced Patterns (Domain 4)

Move beyond basic IAM to the advanced patterns the SCS-C02 exam loves. Service Control Policies are evaluated BEFORE IAM policies — an explicit SCP Deny blocks even root users and AdministratorAccess roles. Permission boundaries define the MAXIMUM permissions an entity can have; effective permissions are the intersection of boundary + identity policy. Attribute-Based Access Control (ABAC) uses aws:PrincipalTag and resource tag condition keys to scale access control without maintaining endless ARN lists. IAM Identity Center with Active Directory eliminates long-term credentials for workforce access.

SCP evaluation order (before IAM) Permission boundaries (max permissions intersection) ABAC with aws:PrincipalTag + ec2:ResourceTag IAM Identity Center + AD Connector / Managed AD Cross-account IAM roles (both policies required) STS credential revocation pattern IAM policy evaluation flow (explicit deny wins) aws:ViaAWSService condition key Cognito User Pools + AdminUserGlobalSignOut
Module 6
Data Protection & Cryptography (Domain 5)

Protect data at rest and in transit using the full suite of AWS cryptographic services. AWS KMS uses envelope encryption: data is encrypted with a data key, the data key is encrypted with a CMK. KMS key policies are the primary access control — unlike S3, KMS does NOT fall back to IAM policies unless the root account ARN is explicitly in the key policy. CloudHSM provides FIPS 140-2 Level 3, single-tenant HSM hardware where AWS has zero access to your keys. Secrets Manager supports automatic rotation via Lambda for databases, API keys, and custom credentials. S3 Object Lock Compliance mode is the only protection that even the AWS root account cannot bypass.

KMS envelope encryption + data key caching CMK key policies vs IAM policies (key policy = primary) CloudHSM vs KMS (FIPS Level 3, single-tenant) Secrets Manager rotation (custom Lambda) S3 Object Lock (Compliance vs Governance mode) ACM Private CA for internal TLS DynamoDB client-side encryption (Encryption SDK) S3 bucket policy enforcement for SSE-KMS EBS encryption by default + Config 'encrypted-volumes'
Module 7
Security Governance & Compliance (Domain 6)

Build preventive and detective governance at organization scale. AWS Control Tower sits on top of Organizations and Landing Zone to deploy a secure multi-account environment with guardrails. Preventive guardrails are SCPs — they block actions before they happen. Detective guardrails are Config rules — they detect non-compliance after the fact. Proactive guardrails use CloudFormation Hooks to validate IaC templates pre-deployment. AWS Config conformance packs bundle multiple rules into a deployable package that StackSets can push to all accounts automatically when new members join the organization.

Control Tower (Preventive / Detective / Proactive guardrails) AWS Config conformance packs + StackSets Config auto-remediation via SSM Automation Service Catalog approved product portfolios Audit Manager pre-built frameworks (HIPAA, PCI DSS, SOC 2) IAM Access Analyzer policy generation (90-day CloudTrail) AWS Backup cross-region + legal hold CloudTrail + S3 Object Lock for legal subpoena holds
Halfway through? Test your knowledge now. 60 advanced scenario questions — KMS, GuardDuty, WAF, SCPs, and more. No signup, free forever.
⚡ Take the quiz AWS Security podcast
🔑

KMS: the explicit deny trap

KMS key policies do NOT fall back to IAM policies unless the key policy includes the account root ARN. A new Lambda role has no KMS access by default — even with an AdministratorAccess policy — until the key policy explicitly grants it. This trips up ~40% of SCS-C02 candidates.

🛡️

SCP vs IAM: who wins?

SCPs are evaluated BEFORE IAM policies. An SCP Deny blocks the action regardless of what IAM policies allow — even for the account root user. The effective permission is always the most restrictive intersection of all policy types. Memorize the evaluation order: SCP → Permission Boundary → Identity Policy → Resource Policy.

🔍

Incident response: contain first

The SCS-C02 almost always asks about the first step in incident response. The answer is always contain, never terminate immediately. Containment preserves forensic evidence (EBS snapshot + quarantine SG). Immediate termination destroys the evidence you need to understand the attack vector.

6-week study plan

Week 1
Foundations + IAM Advanced Shared responsibility model, Organizations structure, IAM policy evaluation flow (explicit deny → SCP → permission boundary → identity policy). Practice writing SCPs and understand cross-account access requirements. Take the full 60-question quiz to establish a baseline score.
Week 2
Threat Detection + Incident Response GuardDuty finding types and severity levels, Detective investigation workflows, Macie PII classification, EventBridge→Lambda automation patterns, EC2 forensic containment playbook (quarantine SG → EBS snapshot → investigate → terminate). Practice scenario questions on incident response sequencing.
Week 3
Logging + Monitoring (Heavy exam weight) CloudTrail management vs data events, organization trails, CloudTrail Lake SQL syntax, S3 Object Lock for log immutability, Security Hub FSBP scoring model, Audit Manager framework evidence collection. Focus on understanding WHAT each logging service captures vs what it doesn't.
Week 4
Infrastructure Security (Highest weight domain) WAF rule priority order (critical!), Shield Advanced DRT capabilities, Firewall Manager organization policies, VPC endpoint types (gateway vs interface), NACL stateless ephemeral ports, Gateway Load Balancer for third-party IDS/IPS, PCI DSS VPC segmentation architecture.
Week 5
Data Protection + Cryptography KMS envelope encryption mechanics, key policy vs IAM policy evaluation, CloudHSM use cases (FIPS 140-2 Level 3 vs Level 2), Secrets Manager rotation Lambda pattern, S3 Object Lock Compliance vs Governance mode, ACM Private CA for internal TLS, DynamoDB client-side encryption. Run practice quiz focused on KMS and S3 questions.
Week 6
Governance + Final Review Control Tower guardrail types (SCP vs Config rule vs CloudFormation Hook), Config conformance packs + StackSets, Service Catalog governance patterns, IAM Access Analyzer policy generation, Audit Manager. Run the full 60-question quiz twice in exam simulation mode. Review all incorrect answers against the domain you missed — prioritize domains below 70% pass rate.

Top 4 mistakes that fail SCS-C02 candidates

📊

SCS-C02 vs SAA-C03: what's different?

The Solutions Architect Associate (SAA-C03) asks how to build resilient, scalable architectures with security as one of four domains. The Security Specialty (SCS-C02) assumes you can already architect on AWS — it goes deep on forensic investigation, key management subtleties, cross-account policy evaluation, and compliance evidence collection. If you passed SAA-C03, expect about 2–3 months of additional focused study on security-specific services (GuardDuty, Detective, Macie, Audit Manager, CloudHSM, ACM Private CA) before attempting SCS-C02.

Ready to pass AWS Security Specialty?

60 advanced scenario-based questions across all 6 SCS-C02 domains — free, no signup, no time limit.

⚡ Start practice quiz AWS Security podcast on Spotify

← All AWS certifications