Cloud Key Management Foundations II

Cloud Key Management Foundations II

Self-paced course. Learn the main technical, operational, regulatory, legal, and financial considerations for cloud KMS deployments, as well as best practices for using programmatic library interfaces and practical API management.

rate limit

Code not recognized.

About this course

This self-paced course builds upon the foundations learned in the Cloud Key Management Foundations course. It covers the primary issues and considerations involving cloud key management implementation, as well as guidelines for the proper integration of a cloud key management solution with a custom application using a programmatic/API interface. Diagrams, explanations, and references are provided to facilitate the learning process.

 

After completing this course, learners will be able to:

 

  • Explain the main technical, operational, regulatory, legal, and financial considerations for cloud KMS deployments.
  • Explain the principles behind effective encryption key management and control.
  • Describe cloud KMS programmatic library interfaces.
  • Explain cloud KMS API management considerations and characteristics.

 

This course is a great fit for anyone in the following roles:

 

  • C-Suite (CEO, CTO, CISO, CIO)
  • Managers and Decision Makers
  • Cybersecurity Analysts
  • Security Engineers and Architects
  • Enterprise Architects
  • Security Administrators
  • Compliance Managers
  • Systems Engineers
  • Developers

 

This course will take about an hour to complete. After completion, you will receive a certificate for 1 course hour that may be submitted for possible CPE credits.

Curriculum

  • Cloud Key Management Foundations II
  • Encryption Key Management & Control
  • Cloud KMS Programmatic Library Interfaces
  • Cloud KMS API Entities & Relationships
  • Cloud Key Management API Characteristics

About this course

This self-paced course builds upon the foundations learned in the Cloud Key Management Foundations course. It covers the primary issues and considerations involving cloud key management implementation, as well as guidelines for the proper integration of a cloud key management solution with a custom application using a programmatic/API interface. Diagrams, explanations, and references are provided to facilitate the learning process.

 

After completing this course, learners will be able to:

 

  • Explain the main technical, operational, regulatory, legal, and financial considerations for cloud KMS deployments.
  • Explain the principles behind effective encryption key management and control.
  • Describe cloud KMS programmatic library interfaces.
  • Explain cloud KMS API management considerations and characteristics.

 

This course is a great fit for anyone in the following roles:

 

  • C-Suite (CEO, CTO, CISO, CIO)
  • Managers and Decision Makers
  • Cybersecurity Analysts
  • Security Engineers and Architects
  • Enterprise Architects
  • Security Administrators
  • Compliance Managers
  • Systems Engineers
  • Developers

 

This course will take about an hour to complete. After completion, you will receive a certificate for 1 course hour that may be submitted for possible CPE credits.

Curriculum

  • Cloud Key Management Foundations II
  • Encryption Key Management & Control
  • Cloud KMS Programmatic Library Interfaces
  • Cloud KMS API Entities & Relationships
  • Cloud Key Management API Characteristics