We may earn an affiliate commission when you visit our partners.
Shane Smyth

With Shield, Salesforce has provided a robust feature set that secures the platform. This course will teach you when it’s appropriate to use Shield encryption and how to enable, setup, and configure the platform.

Read more

With Shield, Salesforce has provided a robust feature set that secures the platform. This course will teach you when it’s appropriate to use Shield encryption and how to enable, setup, and configure the platform.

Data security is one of the most important aspects of any cloud application. In this course, Salesforce Shield - Data Monitoring and Data Encryption, you’ll learn when it's appropriate to utilize Shield encryption. First, you’ll explore what data encryption means and how data is secured on the Salesforce platform. Next, you’ll learn how to configure Shield encryption on several objects and types of data. Finally, you’ll discover how to utilize the data monitoring aspects of the platform. When you’re finished with this course, you’ll have the skills and knowledge of data encryption needed to set up and administer Shield encryption.

Enroll now

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

What's inside

Syllabus

Course Overview
Salesforce Shield and Data Encryption Overview
Setup Salesforce Shield
Salesforce Shield Considerations
Read more
Event Monitoring
TableauCRM for Event Monitoring

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Explores data encryption, a fundamental concept in cloud security
Instructed by Shane Smyth, an experienced instructor recognized for expertise in Salesforce
Builds a solid foundation in Salesforce Shield encryption, critical for data security
Covers both event monitoring and TableauCRM for event monitoring, expanding skillset
Teaches skills highly relevant to Salesforce administrators and security professionals
Course requires prerequisite knowledge of Salesforce

Save this course

Save Salesforce Shield - Data Monitoring and Data Encryption to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Salesforce Shield - Data Monitoring and Data Encryption with these activities:
Data Protection Basics
Review the fundamentals of data protection to strengthen your understanding of Shield's encryption capabilities.
Browse courses on Data Protection
Show steps
  • Review GDPR principles
  • Understand data encryption methods
  • Explore data protection best practices
Salesforce Platform
Familiarize yourself with the Salesforce platform and its capabilities to get the most out of this course.
Browse courses on Salesforce Platform
Show steps
  • Explore Salesforce Trailhead
  • Attend a Salesforce webinar
  • Read the Salesforce documentation
Read 'Cryptography Engineering: Design Principles and Practical Applications'
Gain a deeper understanding of data encryption principles and applications from industry experts.
Show steps
  • Review the fundamental concepts of cryptography.
  • Explore various encryption algorithms and their applications.
  • Learn about key management and secure protocols.
Nine other activities
Expand to see all activities and additional details
Show all 12 activities
Set up SSH keys with EC2
Recall how to set up SSH keys on an EC2 instance to aid with securely downloading course materials and assignments.
Browse courses on EC2
Show steps
  • Create an SSH key pair.
  • Upload your public key to EC2.
  • Connect to your EC2 instance using SSH.
Follow tutorials on implementing encryption in different languages
Gain hands-on experience in implementing encryption algorithms in various programming languages.
Browse courses on Data Encryption
Show steps
  • Identify reputable tutorials for your chosen programming languages.
  • Follow the instructions carefully and implement the code.
  • Test the output and verify the functionality.
Salesforce Security Community
Engage with Salesforce security experts and practitioners to expand your knowledge and network.
Show steps
  • Join the Salesforce Security LinkedIn group
  • Attend a Salesforce Security webinar
  • Participate in a Salesforce Security Twitter chat
Solve encryption puzzles
Test your understanding of encryption concepts by solving challenging puzzles.
Browse courses on Encryption
Show steps
  • Try online platforms such as Cryptopals or Puzz.lol.
  • Work through exercises in the textbook or online resources.
  • Participate in coding challenges related to encryption.
Encryption Configuration Plan
Develop a plan for configuring Shield encryption, ensuring data protection aligns with your organization's needs.
Show steps
  • Identify sensitive data to encrypt
  • Determine encryption key management strategy
  • Create an encryption configuration plan
  • Test and document the encryption configuration
Build your own simple data encryption program
Concretely apply concepts of data encryption by writing your own program to encrypt and decrypt data.
Browse courses on Data Encryption
Show steps
  • Explore basic encryption algorithms, such as Caesar cipher or XOR encryption.
  • Select a programming language, such as Python.
  • Implement the encryption algorithm in your chosen programming language.
  • Test your program on different types of data.
Shield Encryption Exercises
Practice configuring and managing Shield encryption through hands-on exercises to reinforce and test your understanding.
Show steps
  • Enable Shield encryption for an object
  • Manage encryption keys
  • Decrypt encrypted data
Attend a workshop on data encryption
Engage with experts and learn about advanced techniques in data encryption.
Browse courses on Data Encryption
Show steps
  • Research workshops offered by industry professionals or academic institutions.
  • Register for a workshop that aligns with your learning goals.
  • Attend the workshop and actively participate in discussions.
Contribute to an open-source encryption project
Gain practical experience and contribute to the encryption community by participating in open-source projects.
Browse courses on Data Encryption
Show steps
  • Identify an open-source encryption project that aligns with your interests.
  • Review the project's documentation and contribution guidelines.
  • Make a meaningful contribution, such as fixing bugs or adding new features.

Career center

Learners who complete Salesforce Shield - Data Monitoring and Data Encryption will develop knowledge and skills that may be useful to these careers:
Data Security Analyst
A Data Security Analyst is responsible for the design, implementation and management of an organization's data security strategy. This course helps build a foundation in data security by teaching the principles and practices of data encryption. You will learn how to protect data from unauthorized access, disclosure, use, modification, disruption, or destruction. You will also learn how to implement and manage data encryption technologies. This course is essential for anyone who wants to enter the field of data security.
Security Engineer
A Security Engineer is responsible for designing, implementing and maintaining an organization's security infrastructure. This course helps build a foundation in data security by teaching the principles and practices of data encryption. You will learn how to protect data from unauthorized access, disclosure, use, modification, disruption, or destruction. You will also learn how to implement and manage data encryption technologies. This course is essential for anyone who wants to enter the field of security engineering.
Data Architect
A Data Architect is responsible for designing and managing an organization's data architecture. This course helps build a foundation in data security by teaching the principles and practices of data encryption. You will learn how to protect data from unauthorized access, disclosure, use, modification, disruption, or destruction. You will also learn how to implement and manage data encryption technologies. This course is essential for anyone who wants to enter the field of data architecture.
Data Scientist
A Data Scientist is responsible for collecting, analyzing, and interpreting data to uncover trends and patterns. This course helps build a foundation in data security by teaching the principles and practices of data encryption. You will learn how to protect data from unauthorized access, disclosure, use, modification, disruption, or destruction. You will also learn how to implement and manage data encryption technologies. This course is essential for anyone who wants to enter the field of data science.
Cybersecurity Analyst
A Cybersecurity Analyst is responsible for protecting an organization's computer systems and networks from cyberattacks. This course helps build a foundation in data security by teaching the principles and practices of data encryption. You will learn how to protect data from unauthorized access, disclosure, use, modification, disruption, or destruction. You will also learn how to implement and manage data encryption technologies. This course is essential for anyone who wants to enter the field of cybersecurity.
Forensic Investigator
A Forensic Investigator is responsible for collecting and analyzing evidence from computer systems and networks to investigate cybercrimes. This course helps build a foundation in data security by teaching the principles and practices of data encryption. You will learn how to protect data from unauthorized access, disclosure, use, modification, disruption, or destruction. You will also learn how to implement and manage data encryption technologies. This course is essential for anyone who wants to enter the field of forensic investigation.
IT Auditor
An IT Auditor is responsible for assessing the security of an organization's computer systems and networks. This course helps build a foundation in data security by teaching the principles and practices of data encryption. You will learn how to protect data from unauthorized access, disclosure, use, modification, disruption, or destruction. You will also learn how to implement and manage data encryption technologies. This course is essential for anyone who wants to enter the field of IT auditing.
Risk Manager
A Risk Manager is responsible for identifying, assessing, and mitigating risks to an organization's business operations. This course helps build a foundation in data security by teaching the principles and practices of data encryption. You will learn how to protect data from unauthorized access, disclosure, use, modification, disruption, or destruction. You will also learn how to implement and manage data encryption technologies. This course is essential for anyone who wants to enter the field of risk management.
Compliance Officer
A Compliance Officer is responsible for ensuring that an organization complies with all applicable laws and regulations. This course helps build a foundation in data security by teaching the principles and practices of data encryption. You will learn how to protect data from unauthorized access, disclosure, use, modification, disruption, or destruction. You will also learn how to implement and manage data encryption technologies. This course is essential for anyone who wants to enter the field of compliance.
Information Security Manager
An Information Security Manager is responsible for developing and implementing an organization's information security program. This course helps build a foundation in data security by teaching the principles and practices of data encryption. You will learn how to protect data from unauthorized access, disclosure, use, modification, disruption, or destruction. You will also learn how to implement and manage data encryption technologies. This course is essential for anyone who wants to enter the field of information security management.
Privacy Officer
A Privacy Officer is responsible for protecting an organization's customer data from unauthorized access, disclosure, use, modification, disruption, or destruction. This course helps build a foundation in data security by teaching the principles and practices of data encryption. You will learn how to protect data from unauthorized access, disclosure, use, modification, disruption, or destruction. You will also learn how to implement and manage data encryption technologies. This course is essential for anyone who wants to enter the field of privacy.
Cloud Security Architect
A Cloud Security Architect is responsible for designing and implementing security measures for cloud-based applications and data. This course helps build a foundation in data security by teaching the principles and practices of data encryption. You will learn how to protect data from unauthorized access, disclosure, use, modification, disruption, or destruction. You will also learn how to implement and manage data encryption technologies. This course is essential for anyone who wants to enter the field of cloud security.
Database Administrator
A Database Administrator is responsible for managing and maintaining an organization's databases. This course helps build a foundation in data security by teaching the principles and practices of data encryption. You will learn how to protect data from unauthorized access, disclosure, use, modification, disruption, or destruction. You will also learn how to implement and manage data encryption technologies. This course may be useful for anyone who wants to enter the field of database administration.
Systems Administrator
A Systems Administrator is responsible for managing and maintaining an organization's computer systems and networks. This course helps build a foundation in data security by teaching the principles and practices of data encryption. You will learn how to protect data from unauthorized access, disclosure, use, modification, disruption, or destruction. You will also learn how to implement and manage data encryption technologies. This course may be useful for anyone who wants to enter the field of systems administration.
Network Administrator
A Network Administrator is responsible for managing and maintaining an organization's computer networks. This course helps build a foundation in data security by teaching the principles and practices of data encryption. You will learn how to protect data from unauthorized access, disclosure, use, modification, disruption, or destruction. You will also learn how to implement and manage data encryption technologies. This course may be useful for anyone who wants to enter the field of network administration.

Reading list

We've selected six books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Salesforce Shield - Data Monitoring and Data Encryption.
This academic textbook provides a foundation in cryptography and network security, offering a comprehensive understanding of the principles behind data encryption.
This widely used textbook offers a balanced overview of computer security, including topics related to data encryption and protection.
This comprehensive handbook covers information security management, including chapters on data encryption and protection.
This practical guide focuses on assessing and improving network security, including discussions on data protection and encryption.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Salesforce Shield - Data Monitoring and Data Encryption.
Salesforce Administration: Sales and Marketing...
Most relevant
VMware NSX-T Data Center: Performing Administrative and...
Most relevant
Salesforce Security and Layouts
Most relevant
Salesforce Development: Data Modeling and Management
Most relevant
Salesforce Introduction and Setup
Most relevant
Salesforce Development: Process Automation and Logic
Most relevant
Salesforce Development: Fundamentals
Most relevant
Secure Your Data at Rest
Most relevant
Salesforce Administration: Configuration and Setup
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser