Protecting your Databases through Encryption
The course is part of these learning paths
This course looks at the different encryption mechanisms that can be utilized across different AWS Database services, thereby enhancing the security posture and protection of your data. We'll take a look at encryption in Amazon RDS, DynamoDB, and ElastiCache.
If you have any feedback relating to this course, please let us know about it at firstname.lastname@example.org.
- Define and examine encryption across Amazon RDS, Amazon DynamoDB, and Amazon ElastiCache
- Understand both encryption at rest and encryption in transit
This course has been designed to assist those who are responsible for securing, designing, and operating AWS Database solutions, as well as anyone looking to take the AWS Certified Database - Specialty exam.
To get the most out of this course, you should have a basic awareness of AWS database services. You can brush up on these services with part one of our AWS Fundamentals course here. An awareness of the AWS Key Management Service (KMS) would also be advantageous, but not essential.
Hello, and welcome to this course. I shall be looking at the different encryption mechanisms that can be utilized across different AWS Database services, thereby enhancing the security posture and protection of your data.
Before we start I’d like to introduce myself, my name is Stuart Scott, and I am the AWS content and security lead here at Cloud Academy. Feel free to connect with me to ask any questions using the details shown on the screen, alternatively you can always get in touch with us here at Cloud Academy by sending an e-mail to email@example.com where one of our Cloud experts will reply to your question.
This course has been designed to assist those who are responsible for securing, designing, and operating AWS Database solutions, also it would be advantageous to anyone who is looking to take the AWS Certified Database - Specialty exam.
The objectives of this course are to define and examine the different methods of encryption that exist across Amazon RDS, Amazon DynamoDB, and Amazon ElastiCache, covering both encryption at rest and encryption in transit.
As a prerequisite to this course, it would be beneficial to have a basic awareness of AWS database services. For more information on these services, please see our existing course here.
Also, if you have an awareness of the AWS Key Management Service (KMS) it would be advantageous, but not essential.
Feedback on our courses here at Cloud Academy is valuable to both us as trainers and any students looking to take the same course in the future. If you have any feedback, positive or negative, it would be greatly appreciated if you could contact firstname.lastname@example.org.
Please note that, at the time of writing this content, all course information was accurate. AWS implements hundreds of updates every month as part of its ongoing drive to innovate and enhance its services.
As a result, minor discrepancies may appear in the course content over time. Here at Cloud Academy, we strive to keep our content up to date in order to provide the best training available.
So, if you notice any information that is outdated, please contact email@example.com. This will allow us to update the course during its next release cycle.
Stuart has been working within the IT industry for two decades covering a huge range of topic areas and technologies, from data center and network infrastructure design, to cloud architecture and implementation.
To date, Stuart has created 150+ courses relating to Cloud reaching over 180,000 students, mostly within the AWS category and with a heavy focus on security and compliance.
Stuart is a member of the AWS Community Builders Program for his contributions towards AWS.
He is AWS certified and accredited in addition to being a published author covering topics across the AWS landscape.
In January 2016 Stuart was awarded ‘Expert of the Year Award 2015’ from Experts Exchange for his knowledge share within cloud services to the community.
Stuart enjoys writing about cloud technologies and you will find many of his articles within our blog pages.