Company: Pluralsight Author: Mark Wilkins Full Title: Securing Data On AWS Year: 2019 Language: English Genre: Educational: Security Skill Level: Intermediate Price: - - Files: MP4 (+ Slides .PDF) Time: 01:46:22 Video: AVC, 1280 x 720 (1.778) at 30.000 fps, 350 kbps Audio: AAC at 92 Kbps, 2 channels, 44.1 KHz This course will teach you how to encrypt your data at Amazon Web Services (AWS). Concepts include encryption and decryption, use of the Key Management Service (KMS), CloudHSM, and using Amazon Macie to manage and protect S3 storage.. Perhaps your company is moving to the Amazon cloud and you are concerned with safely protecting your company's data. Perhaps your company needs to follow a strict level of compliance when operating in the cloud. Maybe you have a lot of data stored in the cloud, and find that you don't have time to manage it properly. In this course, Securing Data on AWS, you will gain the ability to encrypt your data using any of the data services provided by Amazon Web Services (AWS). First, you will learn the difference between the Key Management Service (KMS) and CloudHSM. Next, you will discover how to create customer-managed keys and perform administration on your encryption keys for both administrators and end users. Then, you will see how to install CloudHSM, and understand the integration between KMS and CloudHSM. Finally, you will understand how Amazon Macie can help you manage and protect your data records stored in S3 buckets. When you are finished with this course, you will have the skills and understanding of services that help you perform encryption and management of your stored data in the AWS cloud. Lessons: 1. Course Overview 01. Course Overview 2. Encryption and Decryption at AWS 02. Encryption and Decryption at AWS 03. Data Encryption Fundamentals 04. Security Services at AWS 05. Encrypting Data at AWS 06. Data Store Encryption Options 07. AWS Storage Options 08. Server–side Encryption 09. AWS Endpoints 10. AWS Endpoints for Accessing Data 3. Securing Data with KMS (Key Management Service) 11. Securing Data with KMS 12. KMS Keys 13. Creating Keys with KMS 14. KMS Administration Demo 15. Encrypting EBS Volumes 16. Cloud Trail and KMS Integration 17. KMS Administrative Tasks 4. Securing Data with Cloud HSM (Hardware Security Module) 18. Securing Data with CloudHSM 19. CloudHSM Use Cases 20. Create CloudHSM 21. CloudHSM Administration 5. Protecting Sensitive Data with Amazon Macie 22. Protecting Data with Amazon Macie 23. Securing Data 24. Amazon Macie Setup 25. Classifying and Protecting Data 26. Assigning Risk 27. Amazon Macie Alerts 28. Analyzing Users Our members see more. Join us! ------------- Our members see more. Join us!