Protecting Data with Encryption in AWS

Overview

Sophie Goodwin and Jill West. Sophie discusses her background and recent certification in cybersecurity, while Jill shares her experience in education and IT, particularly in cloud computing. The target audience for the course is described as individuals with a solid IT background, equivalent to CompTIA A+, Network+, and Security+ knowledge, along with additional cybersecurity certification. AWS recommends at least five years of IT security experience and two years of hands-on experience securing AWS workloads. The course will cover data encryption in AWS, including topics such as data classification, encrypting data at rest and in transit, and key management.
Protecting Data with Encryption in AWS Overview
Clock icon0h 5m
WEBVTT (upbeat music) Welcome and thanks for joining us for the overview to protecting data with encryption. I'm gonna be your host for this course, Sophie Goodwin. You might've seen me hosting other security focused courses on the website, including a course on intro to AWS cloud pentesting. I also recently obtained my first certification in cybersecurity, certified in cybersecurity was the name of it from ISC squared. So I'm starting to dip my toe into cybersecurity and learn more about it. And so far I'm having a great time. But I'm not gonna be teaching this course. I will be asking questions along the way for those of you watching at home. Maybe you have things you wanna ask and you can't cause you're not here. So I'm gonna be trying to serve as kind of a proxy for you. But teaching this course is gonna be our subject matter expert Jill West. How are you Jill? - Good and that's exciting about the ISC squared certification. I haven't done one of those yet. - It's fun. You'd have no problem with it. You'd ace that immediately. - Fun is a good word for it. I'll keep that in mind. - Absolutely. - So my name is Jill West. I am an instructor at a technical college in Georgia. I'm also a student. I'm working on my second master's degree this time in IT. I started my career in education. So that's what my background actually is. I've taught everything from kindergarten all the way through higher ed in lots of different environments and lots of different teaching approaches. And then about 12 years ago, I got the opportunity to start co-authoring on the CompTIA A Plus course from Cengage. So I did that for a little while and then I switched over to the CompTIA Network Plus course and I'm fully taking over that one now. And then about five or six years ago, I got to start writing the CompTIA Cloud Plus course for Cengage and that's where I got into cloud computing so heavily. And it's such an exciting topic to be talking about now because it's transforming the way we do IT and it's transforming the way we teach IT in higher education. We have to rethink everything we've been teaching. We can't just teach it the way we were taught. We have to incorporate cloud concepts into everything. It touches everything. So we're just having a good time kind of reinventing IT education in higher ed. So that's kind of where we're coming at it with the, this is the CompTIA Cloud Plus book that I got to write. This is actually the second edition and we're actually about to start the third edition. - Wow, so they're keeping you busy. - They are keeping me busy. - No shortage of stuff to do. So for people that are watching this at home or maybe they're not sure exactly what they're getting into, what is the target audience for this course or what should we be looking to get out of it? - So target audience to really get to benefit from the information we'll cover in this course, you really need to have a pretty solid IT background already. It doesn't have to be high end, but I would say if you have the equivalent knowledge for the CompTIA A Plus, Network Plus, and Security Plus trifecta of certifications, now that doesn't mean that you have to have taken or passed those certifications, but you need to have equivalent knowledge for that information. And then you probably want to have another cybersecurity cert on top of that or at least the equivalent knowledge of it. So whether that's CYSA Plus or Pintest Plus or maybe even CAS Plus, to have that equivalent knowledge a little bit beyond Security Plus. Now AWS says that in order to benefit from this information and to pass the exam that's related to this information, you need at least five years of IT security experience in designing and implementing security solutions. So it wouldn't be Security Plus level experience as getting in and actually doing some of the work of it. And then you need to have at least two years of hands-on experience in securing AWS workloads. This is not counting two years from the time you got your first trial account in AWS. This is counting two years of actually working to secure workloads in AWS. So this is going way beyond just cloud practitioner or solutions architect associate. You really need to understand security concepts and security principles so that you can learn how to apply those principles in the AWS cloud. So as far as the structure of this course goes, we kind of know a little bit now about where we need to be knowledge-wise. But going into the course, what is the structure going to look like? So this one is encrypting data and protecting that data in AWS. What are some of the options for this? We'll start with an overview of data encryption in AWS, and then we'll end with an episode that kind of troubleshoots these services and these configurations that we need to use. Some of the topics we'll be talking about, we need to know how to classify data. We need to know how to encrypt data at rest and data in transit in AWS. I'm sure you're already familiar with these concepts on-prem and the on-prem environment, and maybe even in other cloud environments, but these episodes will specifically target how you would accomplish these requirements in the AWS environment. We'll also look at key management. That is a critical part of handling encryption of data in the AWS environment, is knowing where these keys are, how to handle permissions to the keys, how to store the keys safely and access them the way that you need them. So that's what we'll be covering in this module. Okay, so next, you should be pretty straightforward. I think it's half a dozen or so episodes that we'll be going through, and now we have an idea of what that's gonna look like. So thank you for walking us through all this and telling us a little about yourself, and thank you for joining us for this overview to protecting data with encryption. We'll see you in the course. (upbeat music)

Learning Style

On Demand

Length of course

2h 31m
8 Episodes

Here are the topics we'll cover

  • Data Encryption
    Learning Options

    Options for this course

    Train your team
    Stay ahead of the curve and future-proof your business with training programs designed for you.
    Channel & Reseller
    Transform your experience and integrate with our unique evolving library of Audit, Cybersecurity, and Information Technology courses.
    Individual learners
    Learn at your own pace and get your certification training.