Mar

30

2020

Cloud Academy - How to Use KMS Key Encryption to Protect Your Data

minhchick 30 Mar 2020 19:07 LEARNING » e-learning - Tutorial

Cloud Academy - How to Use KMS Key Encryption to Protect Your Data

Cloud Academy - How to Use KMS Key Encryption to Protect Your Data-STM
English | Size: 1.26 GB
Category: Tutorial

Unencrypted data can be read and seen by anyone who has access to it, and data stored at-rest or sent between two locations, in-transit, is known as plaintext or cleartext data. The data is plain to see and can be seen and understood by any recipient. There is no problem with this as long as the data is not sensitive in any way and doesn t need to be restricted However, on the other hand, If you have data that IS sensitive and you need to ensure that the contents of that data is only viewable by a particular recipient, or recipients, then you need to add a level of encryption to that data

But what is data encryption?

This course answers that question by first explaining at a high level what symmetric and assymetric encryption is before diving into how the Key Management Service (KMS) can help you achieve the required level of encryption of your data across different services

You will undersand why KMS is key to your data security strategy within your organization and how you can use this service to manage data encryption through a series of different encryption keys, either KMS generated or by using your own existing on-premise keys

Learning Objectives
By the end of this course series you will be able to:

Define how the Key encryption process works
Explain the differences between the different key types
Create and modify Key policies
Understand how to rotate, delete and reinstate keys
Define how to import your own Key material

Intended Audience
As this course focuses on data encryption, it s ideally suited to those in the following roles:

Cloud Administrators
Cloud Support & Operations
Cloud Security Architects
Cloud Security Engineers

Prerequisites
To gain the most from this course you should have a basic understanding and awareness of the following:

AWS CloudTrail
AWS IAM (Understanding of policies)

This course includes
6 lectures
4 demonstrations
Feedback
If you have thoughts or suggestions for this course, please
contact Cloud Academy at [email protected]

Greetings fly out to:

Kodemusen, KoseBamsen

STM is back
For all the ppl we worked with
in the past. We salute you

NFO by NiMiTech
Updated: 09/09/2002

Buy Long-term Premium Accounts To Support Me & Max Speed

DOWNLOAD:



If any links die or problem unrar, send request to http://goo.gl/aUHSZc

High Speed Download

Add Comment

  • People and smileys emojis
    Animals and nature emojis
    Food and drinks emojis
    Activities emojis
    Travelling and places emojis
    Objects emojis
    Symbols emojis
    Flags emojis