SCS-C01: AWS Certified Security Specialist, Part 8 of 9: Encryption [Replaced]
with expert Zeal Vora
Course description
This course has been updated. please use the following course series instead
SCS-C01: AWS Certified Security Specialist, Part 1 of 6: Incident Response
SCS-C01: AWS Certified Security Specialist, Part 2 of 6: Logging and Monitoring
SCS-C01: AWS Certified Security Specialist, Part 3 of 6: Infrastructure and Security
SCS-C01: AWS Certified Security Specialist, Part 4 of 6: Identity and Access MGMT
SCS-C01: AWS Certified Security Specialist, Part 5 of 6: Data Protection
SCS-C01: AWS Certified Security Specialist, Part 6 of 6: Exam Preparation
Amazon Web Services Certified Security Specialty is an exam intended to validate an individuals experience in a security role with at least two years of hands-on experience securing AWS and 5 years or more in IT security experience designing and implementing security solutions. This course covers Cryptography, Key management Service, Data key catching, KMS authentication and grants.
Prerequisites
two years of hands-on experience securing AWS and 5 years or more in IT security experience designing and implementing security solutions
Meet the expert
Zeal works primarily as a Cloud Security Consultant guiding organizations to re-build their infrastructure with security in mind. Zeal also holds more then 13+ certifications ranging from RedHat Certified Architect to AWS Security.
Course outline
Encryption
Cryptography (26:14)
- Introduction (00:08)
- Cryptography (12:14)
- Plain Text vs Encrypted Text Protocols (07:07)
- CloudHSM (06:36)
- Summary (00:08)
Key Management Service (25:17)
- Introduction (00:08)
- AWS Key Management Service Part 1 (09:13)
- AWS Key Management Service Part 2 (08:20)
- AWS Key Management Service Part 3 (07:26)
- Summary (00:08)
Data key Caching (21:55)
- Introduction (00:08)
- Data Key caching (09:26)
- AWS KMS Key Deletion (03:59)
- AWS KMS Key Deletion EBS Use Case (04:51)
- Reducing Risk of Unmanagable CMK (03:21)
- Summary (00:08)
KMS Authentication (21:04)
- Introduction (00:08)
- KMS Authentication and Access Control (05:34)
- KMS Policy Evaluation Logic Use Case 01 (03:01)
- KMS Policy Evaluation Logic Use Case Answer 01 (04:25)
- KMS Policy Evaluation Logic Use Case 02 (01:56)
- KMS Policy Evaluation Logic Use Case Answer 02 (03:08)
- KMS Policy Evaluation Logic Use Case 03 (00:44)
- KMS Policy Evaluation Logic Use Case Answer 03 (01:56)
- Summary (00:08)
KMS Grants (20:09)
- Introduction (00:08)
- KMS Grants (12:08)
- KMS Imported Key Material (07:44)
- Summary (00:08)