We may earn an affiliate commission when you visit our partners.
Pluralsight logo

Securing Data on AWS

Mark Wilkins

This course will teach you how to encrypt your data at Amazon Web Services (AWS). Concepts include encryption and decryption, use of the Key Management Service (KMS), CloudHSM, and using Amazon Macie to manage and protect S3 storage.

Read more

This course will teach you how to encrypt your data at Amazon Web Services (AWS). Concepts include encryption and decryption, use of the Key Management Service (KMS), CloudHSM, and using Amazon Macie to manage and protect S3 storage.

Perhaps your company is moving to the Amazon cloud and you are concerned with safely protecting your company's data. Perhaps your company needs to follow a strict level of compliance when operating in the cloud. Maybe you have a lot of data stored in the cloud, and find that you don't have time to manage it properly.

In this course, Securing Data on AWS, you will gain the ability to encrypt your data using any of the data services provided by Amazon Web Services (AWS).

First, you will learn the difference between the Key Management Service (KMS) and CloudHSM.

Next, you will discover how to create customer-managed keys and perform administration on your encryption keys for both administrators and end users.

Then, you will see how to install CloudHSM, and understand the integration between KMS and CloudHSM.

Finally, you will understand how Amazon Macie can help you manage and protect your data records stored in S3 buckets.

When you are finished with this course, you will have the skills and understanding of services that help you perform encryption and management of your stored data in the AWS cloud.

Enroll now

What's inside

Syllabus

Course Overview
Encryption and Decryption at AWS
Securing Data with KMS (Key Management Service)
Securing Data with Cloud HSM (Hardware Security Module)
Read more
Protecting Sensitive Data with Amazon Macie

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Teaches fundamental concepts and practices related to data encryption on AWS
Taught by experts in data security and cloud computing, Mark Wilkins
Provides a clear and structured approach to securing data using AWS services
Helps learners gain practical experience through hands-on labs and interactive materials
Focuses on industry-standard tools and technologies, ensuring relevance to real-world scenarios

Save this course

Save Securing Data on AWS to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Securing Data on AWS. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Securing Data on AWS will develop knowledge and skills that may be useful to these careers:
Cloud Security Engineer
Cloud Security Engineers are responsible for securing cloud computing environments. They work with clients to assess security risks, design and implement security measures, and monitor and respond to security incidents. This course can help you build a foundation in cloud security, which is essential for Cloud Security Engineers. You will learn how to encrypt data, use the Key Management Service (KMS), and use Amazon Macie to manage and protect S3 storage. These skills will help you secure cloud computing environments for your clients.
Security Engineer
Security Engineers are responsible for designing, implementing, and managing security measures for an organization's IT systems. They work with IT teams to identify and mitigate security risks, and they develop and implement security policies and procedures. This course can help you build a foundation in cloud security, which is essential for Security Engineers. You will learn how to encrypt data, use the Key Management Service (KMS), and use Amazon Macie to manage and protect S3 storage. These skills will help you protect your organization's IT systems from security threats.
Cloud Administrator
Cloud Administrators are responsible for managing cloud computing environments. They work with clients to provision and manage cloud resources, and they monitor and maintain cloud systems. This course can help you build a foundation in cloud security, which is essential for Cloud Administrators. You will learn how to encrypt data, use the Key Management Service (KMS), and use Amazon Macie to manage and protect S3 storage. These skills will help you manage cloud computing environments securely.
Information Security Analyst
Information Security Analysts are responsible for protecting an organization's information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. They work with IT teams to implement and manage security measures, and they investigate and respond to security incidents. This course can help you build a foundation in cloud security, which is essential for Information Security Analysts. You will learn how to encrypt data, use the Key Management Service (KMS), and use Amazon Macie to manage and protect S3 storage. These skills will help you protect your organization's information systems from security threats.
Cybersecurity Analyst
Cybersecurity Analysts are responsible for protecting an organization's networks and systems from cyberattacks. They work with IT teams to implement and manage security measures, and they investigate and respond to security incidents. This course can help you build a foundation in cloud security, which is essential for Cybersecurity Analysts. You will learn how to encrypt data, use the Key Management Service (KMS), and use Amazon Macie to manage and protect S3 storage. These skills will help you protect your organization's networks and systems from cyberattacks.
Security Consultant
Security Consultants are responsible for providing security advice to clients. They work with clients to assess security risks, design and implement security measures, and monitor and respond to security incidents. This course can help you build a foundation in cloud security, which is essential for Security Consultants. You will learn how to encrypt data, use the Key Management Service (KMS), and use Amazon Macie to manage and protect S3 storage. These skills will help you provide security advice to clients on cloud computing security.
Incident Responder
Incident Responders are responsible for responding to security incidents. They work with IT teams to identify and contain security incidents, and they recover and restore systems after an incident. This course can help you build a foundation in cloud security, which is essential for Incident Responders. You will learn how to encrypt data, use the Key Management Service (KMS), and use Amazon Macie to manage and protect S3 storage. These skills will help you respond to security incidents in cloud computing environments.
Penetration Tester
Penetration Testers are responsible for testing an organization's security systems for vulnerabilities. They work with IT teams to identify and exploit vulnerabilities, and they make recommendations for improving security. This course can help you build a foundation in cloud security, which is essential for Penetration Testers. You will learn how to encrypt data, use the Key Management Service (KMS), and use Amazon Macie to manage and protect S3 storage. These skills will help you identify and exploit vulnerabilities in your organization's cloud security systems.
Data Security Analyst
Data Security Analysts are responsible for protecting an organization's data from unauthorized access, use, disclosure, disruption, modification, or destruction. They work with IT teams to implement and manage security measures, and they investigate and respond to security incidents. This course can help you build a foundation in cloud security, which is essential for Data Security Analysts. You will learn how to encrypt data, use the Key Management Service (KMS), and use Amazon Macie to manage and protect S3 storage. These skills will help you protect your organization's data from security threats.
DevOps Engineer
DevOps Engineers are responsible for bridging the gap between development and operations teams. They work with both teams to ensure that software is developed and deployed quickly and securely. This course can help you build a foundation in cloud security, which is essential for DevOps Engineers. You will learn how to encrypt data, use the Key Management Service (KMS), and use Amazon Macie to manage and protect S3 storage. These skills will help you develop and deploy secure software.
Cloud Architect
Cloud Architects are responsible for designing, implementing, and managing cloud computing solutions. They work with clients to understand their business needs and develop solutions that meet those needs. This course can help you build a foundation in cloud security, which is essential for Cloud Architects. You will learn how to encrypt data, use the Key Management Service (KMS), and use Amazon Macie to manage and protect S3 storage. These skills will help you design and implement secure cloud solutions for your clients.
Cloud Developer
Cloud Developers are responsible for developing and deploying applications on cloud computing platforms. They work with clients to design and implement cloud solutions, and they maintain and update cloud applications. This course can help you build a foundation in cloud security, which is essential for Cloud Developers. You will learn how to encrypt data, use the Key Management Service (KMS), and use Amazon Macie to manage and protect S3 storage. These skills will help you develop and deploy secure cloud applications.
Data Analyst
Data Analysts are responsible for collecting, analyzing, and interpreting data to help organizations make better decisions. They work with data from a variety of sources, including cloud computing platforms. This course can help you build a foundation in cloud security, which is essential for Data Analysts. You will learn how to encrypt data, use the Key Management Service (KMS), and use Amazon Macie to manage and protect S3 storage. These skills will help you protect your organization's data from security threats.
Data Scientist
Data Scientists are responsible for collecting, analyzing, and interpreting data to help organizations make better decisions. They work with data from a variety of sources, including cloud computing platforms. This course can help you build a foundation in cloud security, which is essential for Data Scientists. You will learn how to encrypt data, use the Key Management Service (KMS), and use Amazon Macie to manage and protect S3 storage. These skills will help you protect your organization's data from security threats.
Forensic Analyst
Forensic Analysts are responsible for investigating computer systems and networks for evidence of criminal activity. They work with law enforcement and other agencies to collect and analyze evidence, and they prepare reports and testify in court. This course can help you build a foundation in cloud security, which is essential for Forensic Analysts. You will learn how to encrypt data, use the Key Management Service (KMS), and use Amazon Macie to manage and protect S3 storage. These skills will help you collect and analyze evidence from cloud computing environments.

Reading list

We've selected ten books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Securing Data on AWS.
Provides a comprehensive overview of security engineering, covering topics such as secure software design, cryptography, and network security.
Provides a comprehensive overview of the CISSP certification, covering topics such as security assessment and testing, risk management, and incident response.
Provides a comprehensive overview of data security, covering topics such as data protection measures, security assessment, and incident response.
Provides a comprehensive overview of cloud security, including topics such as data protection, threat management, and compliance.
Provides a practical guide to securing AWS environments, including step-by-step instructions for implementing security controls.
Provides a comprehensive overview of cloud computing, covering topics such as cloud architectures, cloud services, and cloud security.
Provides a comprehensive overview of software security testing, covering topics such as vulnerability identification, risk assessment, and penetration testing.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Securing Data on AWS.
Understanding Amazon EBS Volume Encryption
Most relevant
AWS Security – Encryption Fundamentals
Most relevant
Data Encryption using AWS KMS From UST
Most relevant
Security with AWS: Identity and Access Management (IAM)
Most relevant
AWS Certified SysOps Admin - Associate (SOA-C02)
Most relevant
Implementing Customer Managed Encryption Keys (CMEK) with...
Most relevant
Cloud Security on AWS
Most relevant
Introduction to Data Encryption
Most relevant
AWS Certified SysOps Administrator - Associate (SOA-C02)
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser