Data Encryption using AWS KMS From UST

4.8
stars
13 ratings
Offered By
Coursera Project Network
In this Free Guided Project, you will:

Use AWS KMS for Cryptographic Operations

Encrypt and Decrypt sensitive Data

Create and Delete KMS Keys

Showcase this hands-on experience in an interview

Clock1 hour
BeginnerBeginner-friendly
CloudNo download needed
VideoSplit-screen video
Comment DotsEnglish
LaptopDesktop only

Welcome to this Guided Project on Data Encryption using AWS KMS, From UST. For more than 20 years, UST has worked side by side with the world’s best companies to make a real impact through transformation. Powered by technology, inspired by people and led by their purpose, they partner with clients from design to operation. With this Guided Project from UST, you can quickly build in-demand job skills and expand your career opportunities in the Securities field by learning how to use AWS KMS for Cryptographic Operations. Join me as we explore different approaches to the Encryption / Decryption Process and learn how to create Symmetric and Asymmetric Customer Keys. Combining detailed explanations with practical experience, by the end of this project, you will be able to Encrypt/ Decrypt your sensitive data using the regional service, AWS KMS (Key Management Service). If you dream about working in high profile industry jobs as a Data Security specialist, this project is a great place to start. This is a beginner level project, and does not require any previous experience. Enroll now to get started!

Requirements

No prior experience necessary!

Skills you will develop

  • Key Management
  • Cryptography
  • Data Security
  • AWS cloud

Learn step-by-step

In a video that plays in a split-screen with your work area, your instructor will walk you through these steps:

  1. Intoduction to 'KMS' and configuring AWS CLI

  2. Create "Symmetric Customer Master Key"

  3. Encrypt Data using CMK

  4. Decrypt Data using CMK

  5. Create "Asymmetric Customer Master Key"

  6. Delete " Customer Master Keys"

How Guided Projects work

Your workspace is a cloud desktop right in your browser, no download required

In a split-screen video, your instructor guides you step-by-step

Reviews

TOP REVIEWS FROM DATA ENCRYPTION USING AWS KMS FROM UST

View all reviews

Frequently asked questions

Frequently Asked Questions

More questions? Visit the Learner Help Center.