Managing AWS Security and Identity

Security is one of the number-one issues for those considering moving workloads to the cloud. This course shows how to use AWS IAM services to tighten security and lock down resources.
Course info
Rating
(45)
Level
Intermediate
Updated
Nov 17, 2016
Duration
6h 55m
Table of contents
Course Overview
User Security and Identity and Access Management
Creating and Managing IAM Users
IAM Groups and Best Practices
Assigning Policies to Users and Groups
When to Use Roles Instead of Users
Auditing User Account Access
Federating Multiple AWS Accounts
Federating with External Identity Providers
Description
Course info
Rating
(45)
Level
Intermediate
Updated
Nov 17, 2016
Duration
6h 55m
Description

Follow along and go through the best practices of AWS account security from two different vantage points. In this course, Managing AWS Security and Identity, you'll learn how to configure Amazon's Identity and Access Management feature, commonly known as IAM. First, you'll discover IAM user and group security best practices and IAM policies. Next, you'll explore when and how to use IAM roles and how to account audit. Finally, you'll learn about federating multiple AWS accounts and federating AWS IAM accounts with an external identity provider, such as active directory. By the end of this course, you'll be able to properly secure your AWS accounts using policies, two-factor authentication and even permit other AWS accounts access to the resources in your account.

About the author
About the author

John Hales is a trainer, consultant, and courseware developer in the areas of virtualization, storage, and networking. He has published more than 60 books and has written many courses for internal use at Fortune 500 companies. He has also trained in Europe, Asia, Australia, and North America.

More from the author
About the author

Brian is an energetic trainer and consultant with nearly 20 years of technical experience in datacenter management and design. As a virtualization instructor, Brian spends much of his time discussing the impact and intricacies of Software Defined Data Centers (SDDC), Software Defined Networking (SDN), and Software Defined Storage (SDS).

More from the author
More courses by Brian Eiler