Cloud Key Management Foundations II

Cloud Key Management Foundations II

Self-paced course. Learn the main technical, operational, regulatory, legal, and financial considerations for cloud KMS deployments, as well as best practices for using programmatic library interfaces and practical API management.

rate limit

Code not recognized.

About this course

Purchase of your Knowledge Center course ensures access to the material for up to one year from the date of purchase. This course is estimated to take about 1 hour to complete. After completion, you will receive a certificate for 1 course hour(s) that may be submitted for possible Continuing Educational Credits.



This self-paced course builds upon the foundations learned in the Cloud Key Management Foundations course. It covers the primary issues and considerations involving cloud key management implementation, as well as guidelines for the proper integration of a cloud key management solution with a custom application using a programmatic/API interface. Diagrams, explanations, and references are provided to facilitate the learning process.

After completing this course, learners will be able to:

  • Explain the main technical, operational, regulatory, legal, and financial considerations for cloud KMS deployments
  • Explain the principles behind effective encryption key management and control
  • Describe cloud KMS programmatic library interfaces
  • Explain cloud KMS API management considerations and characteristics

This course is a great fit for anyone in the following roles:

  • C-Suite (CEO, CTO, CISO, CIO)
  • Managers and Decision Makers
  • Cybersecurity Analysts
  • Security Engineers and Architects
  • Enterprise Architects
  • Security Administrators
  • Compliance Managers
  • Systems Engineers
  • Developers



For more information regarding the calculation of course length and Continuing Educational Credits, please refer to our
FAQ.

Curriculum

  • CKM: Student Handout
  • Cloud Key Management Foundations II
  • Encryption Key Management & Control
  • Cloud KMS Programmatic Library Interfaces
  • Cloud KMS API Entities & Relationships
  • Cloud Key Management API Characteristics
  • Course Survey

About this course

Purchase of your Knowledge Center course ensures access to the material for up to one year from the date of purchase. This course is estimated to take about 1 hour to complete. After completion, you will receive a certificate for 1 course hour(s) that may be submitted for possible Continuing Educational Credits.



This self-paced course builds upon the foundations learned in the Cloud Key Management Foundations course. It covers the primary issues and considerations involving cloud key management implementation, as well as guidelines for the proper integration of a cloud key management solution with a custom application using a programmatic/API interface. Diagrams, explanations, and references are provided to facilitate the learning process.

After completing this course, learners will be able to:

  • Explain the main technical, operational, regulatory, legal, and financial considerations for cloud KMS deployments
  • Explain the principles behind effective encryption key management and control
  • Describe cloud KMS programmatic library interfaces
  • Explain cloud KMS API management considerations and characteristics

This course is a great fit for anyone in the following roles:

  • C-Suite (CEO, CTO, CISO, CIO)
  • Managers and Decision Makers
  • Cybersecurity Analysts
  • Security Engineers and Architects
  • Enterprise Architects
  • Security Administrators
  • Compliance Managers
  • Systems Engineers
  • Developers



For more information regarding the calculation of course length and Continuing Educational Credits, please refer to our
FAQ.

Curriculum

  • CKM: Student Handout
  • Cloud Key Management Foundations II
  • Encryption Key Management & Control
  • Cloud KMS Programmatic Library Interfaces
  • Cloud KMS API Entities & Relationships
  • Cloud Key Management API Characteristics
  • Course Survey