AWS Certified Security Specialist, Part 8 of 9:Encryption
Interactive

AWS Certified Security Specialist, Part 8 of 9:Encryption

LearnNow Online
Updated Sep 10, 2019

Course description

Amazon Web Services Certified Security Specialty is an exam intended to validate an individuals experience in a security role with at least two years of hands-on experience securing AWS and 5 years or more in IT security experience designing and implementing security solutions. This course covers Cryptography, Key management Service, Data key catching, KMS authentication and grants.

Each LearnNowOnline training course is made up of Modules (typically an hour in length). Within each module there are Topics (typically 15-30 minutes each) and Subtopics (typically 2-5 minutes each). There is a Post Exam for each Module that must be passed with a score of 70% or higher to successfully and fully complete the course.


Prerequisites

two years of hands-on experience securing AWS and 5 years or more in IT security experience designing and implementing security solutions


Meet the expert

Zeal Vora

Zeal works primarily as a Cloud Security Consultant guiding organizations to re-build their infrastructure with security in mind. Zeal also holds more then 13+ certifications ranging from RedHat Certified Architect to AWS Security.

Video Runtime

114 Minutes

Time to complete

134 Minutes

Course Outline

Encryption

Cryptography (26:14)

  • Introduction (00:08)
  • Cryptography (12:14)
  • Plain Text vs Encrypted Text Protocols (07:07)
  • CloudHSM (06:36)
  • Summary (00:08)

Key Management Service (25:17)

  • Introduction (00:08)
  • AWS Key Management Service Part 1 (09:13)
  • AWS Key Management Service Part 2 (08:20)
  • AWS Key Management Service Part 3 (07:26)
  • Summary (00:08)

Data key Caching (21:55)

  • Introduction (00:08)
  • Data Key caching (09:26)
  • AWS KMS Key Deletion (03:59)
  • AWS KMS Key Deletion EBS Use Case (04:51)
  • Reducing Risk of Unmanagable CMK (03:21)
  • Summary (00:08)

KMS Authentication (21:04)

  • Introduction (00:08)
  • KMS Authentication and Access Control (05:34)
  • KMS Policy Evaluation Logic Use Case 01 (03:01)
  • KMS Policy Evaluation Logic Use Case Answer 01 (04:25)
  • KMS Policy Evaluation Logic Use Case 02 (01:56)
  • KMS Policy Evaluation Logic Use Case Answer 02 (03:08)
  • KMS Policy Evaluation Logic Use Case 03 (00:44)
  • KMS Policy Evaluation Logic Use Case Answer 03 (01:56)
  • Summary (00:08)

KMS Grants (20:09)

  • Introduction (00:08)
  • KMS Grants (12:08)
  • KMS Imported Key Material (07:44)
  • Summary (00:08)