AWS Security – Encryption Fundamentals
Offered By: Amazon Web Services via AWS Skill Builder
Course Description
Overview
In this course, you will learn about AWS offerings designed to facilitate the practice of encryption throughout your data's AWS cloud lifecycle. You will also have the option to review encryption concepts, and practice selecting AWS offerings to meet common encryption needs.
• Course level: Fundamental
• Duration: 1 hour 20 minutes
Activities
This course includes: contextual explanations, instructive examples, videos, conceptual diagrams and knowledge check questions.
Course objectives
In this course, you will learn to do the following:
• Summarize the importance of practicing encryption.
• Identify AWS offerings to meet data protection needs.
• Describe concepts related to encryption, such as keys, envelope encryption, and public key infrastructure.
Intended audience
This course is intended for the following roles:
• Security operations teams
• Security engineers
• Security architects
Prerequisites
We recommend that attendees of this course have the following prerequisites:
• Familiarity, or previous work with cryptography and encryption before starting this course to have an optimal learning experience.
• Take AWS Security Fundamentals (Second Edition) to build a general understanding of security with AWS.
Course outline
Section 1: Introduction
• Lesson 1: How to Use This Course
• Lesson 2: Introduction
Section 2: Conceptual Refresh - Optional
• Lesson 3: Encryption Basics
Section 3: Managing Keys With AWS
• Lesson 4: AWS Key Management Service
• Lesson 5: AWS CloudHSM
Section 4: Conceptual Refresh - Optional
• Lesson 6: Signing and Hashing Basics
• Lesson 7: Public Key Infrastructure
Section 5: Managing Certificates with AWS
• Lesson 8: AWS Certificate Manager
• Lesson 9: AWS Private Certificate Authority
Section 6: Encrypting Application Level Data with AWS
• Lesson 10: Application Level Encryption Offerings
Section 7: Wrapping Up
• Lesson 11: Choosing AWS Offerings to Meet Encryption Needs
• Lesson 12: Conclusion
• Lesson 13: Contact Us
Tags
Related Courses
Cryptography(ISC)² via Coursera Cryptography: Learn Public Key Infrastructure from Scratch
Packt via Coursera CISO Security Controls: Network Controls
Cybrary Криптографические методы защиты информации
National Research Nuclear University MEPhI via edX CYBERSECURITY FUNDAMENTALS
Foothill College via California Community Colleges System