» » » AWS: Overview of AWS Identity & Access Management (IAM)

 

AWS: Overview of AWS Identity & Access Management (IAM)

Author: ziuziu on 7-02-2020, 03:31, views: 296

0
AWS: Overview of AWS Identity & Access Management (IAM)
Video: .MP4, AVC, 1920x1080, 30 fps | Audio: English, AAC, 44.1 KHz, 2 Ch | Duration: 1h 12m | 1.05 GB
Instructor: Stuart Scott
Description
This course looks at one of the key Security services within AWS, Identity & Access Management, commonly referred to IAM. This service manages identities and their permissions that are able to access your AWS resources and so understanding how this service works and what you can do with it will help you to maintain a secure AWS environment. IAM is an important step in ensuring your resources are secure.
Within this course we will look at:
• What is Identity & Access Management? This lecture will explain what IAM means and why it's necessary to implement and maintain control of this service.
• Groups, Users & Roles: This lecture will define the differences between Groups, Users and Roles and how each of these objects are typically used
• IAM Policies: This lecture we will discuss what IAM Policies are, how to create, modify and apply them within your AWS environment
• Multi-Factor Authentication: This lecture will explain what MFA is and the best practices
• Identity Federation: This lecture will explain how external identities (users who do not have IAM user accounts) can access your AWS resources through the use of identity providers
• IAM Features: This lecture will focus on the information contained within IAM Account settings, the credential report and also how IAM integrates with KMS
By the end of this course, you will be able to:
• Setup and configure users, groups and roles to control which identities have authorization to access specific AWS resources
• Implement Multi-Factor Authentication
• Create and implement IAM Policies allowing you to grant or restrict very granular and specific permissions across a range of resources
• Implement a Password policy to align with your internal security controls
• Understand when and why you may use Identity federation access
• Understand how the Key Management Service (KMS) is used in conjunction with IAM
Download link :
(If you need these, buy and download immediately before they are delete)
Links are Interchangeable - Single Extraction - Premium is support resumable

Category: Tutorial / Other Tutorial

Dear visitor, you are browsing our website as Guest.
We strongly recommend you to register and login to view hidden contents.

Add comments

Your Name:*
E-Mail:
Comment:
Security Code: *
Click on the image to refresh the code if it cannot be viewed
 
Themes: