Booking options
£137.99
£137.99
On-Demand course
2 hours 47 minutes
All levels
Understand how to use AWS IAM to run AWS resources securely against cloud hacks
This course is a comprehensive guide for cloud, security, and software engineers to learn how to avoid security breaches that can affect your business. Be ready to secure your AWS account, manage users, permissions, and roles, and keep control over your AWS cloud resource usage in under 3 hours! This security handbook covers the following topics: •Managing AWS IAM users, roles, and groups •Managing AWS IAM permission policies •Understanding IAM identities •Securing your AWS resources •Enforcing fine-grained permissions for your AWS users •Using encryption for stronger security All the code and supporting files for this course are available at https://github.com/PacktPublishing/AWS-IAM-The-Cloud-Engineer-s-Security-Handbook
Get well-versed with AWS IAM Identities
Manage and access AWS resources using AWS IAM
Understand AWS IAM custom policies
Discover best practice while working with AWS IAM
Explore the security features that you can implement with AWS IAM
This course is for cloud engineers/architects, security consultants/architects, IT administrators, and software/DevOps engineers. Tech startup founders and Cloud/AWS enthusiasts will also find this course useful.
This course will take you through all that you need to know to easily and efficiently control access to AWS Cloud services and resources with the help of step-by-step instructions.
Secure your AWS accounts * Manage users, permissions, and roles effectively and easily * Keep control over your AWS cloud resource usage
https://github.com/packtpublishing/aws-iam-the-cloud-engineer-s-security-handbook
Manuj Aggarwal is an entrepreneur, investor, and technology enthusiast. Over the last few years, he has been a business owner, technical architect, CTO, coder, start up consultant, and more. Currently, he is the principal consultant, architect, and CTO of a software consulting company, TetraNoodle Technologies, based in Vancouver, Canada. He works with various start-ups on a number of cutting edge and interesting problems. Whether it is ideation and the refining of your start up idea, or building a dream team to execute the idea, he provides a diverse set of solutions that help these start-ups to succeed in their plans. He has been active in the software industry since 1997, and has worked with early-stage businesses through to Fortune 100 mega-corporations. He is passionate about sharing all the knowledge that he has acquired over the years. He is particularly interested in helping technical and non-technical entrepreneurs, founders, and co-founders of tech start-ups.
1. Introduction and Course Overview
1. Introduction to AWS IAM Introduction and Course Overview: Introduction to AWS IAM |
2. Course Overview Introduction and Course Overview: Course Overview |
3. Why We Need to Learn AWS IAM Introduction and Course Overview: Why We Need to Learn AWS IAM |
4. Who Uses AWS IAM Introduction and Course Overview: Who Uses AWS IAM |
5. Download Resources Introduction and Course Overview: Download Resources |
6. Get Ready for AWS IAM Introduction and Course Overview: Get Ready for AWS IAM |
2. Getting Started with AWS IAM
1. Get ready with AWS IAM Getting Started with AWS IAM: Get ready with AWS IAM |
2. AWS IAM access made easy Getting Started with AWS IAM: AWS IAM access made easy |
3. Login to AWS as root user Getting Started with AWS IAM: Login to AWS as root user |
3. AWS Identities
1. AWS identities AWS Identities: AWS identities |
2. Introduction to AWS identities AWS Identities: Introduction to AWS identities |
3. Provision new AWS IAM user AWS Identities: Provision new AWS IAM user |
4. Sign in as new AWS IAM user AWS Identities: Sign in as new AWS IAM user |
5. Manage AWS IAM groups AWS Identities: Manage AWS IAM groups |
6. Manage AWS IAM roles AWS Identities: Manage AWS IAM roles |
7. Module Recap and Activity AWS Identities: Module Recap and Activity |
4. AWS IAM Access Management
1. AWS IAM access management AWS IAM Access Management: AWS IAM access management |
2. Deploy AWS EC2 instance AWS IAM Access Management: Deploy AWS EC2 instance |
3. Accessing AWS resources using CLI AWS IAM Access Management: Accessing AWS resources using CLI |
4. Enable / disable AWS IAM keys AWS IAM Access Management: Enable / disable AWS IAM keys |
5. AWS IAM roles AWS IAM Access Management: AWS IAM roles |
6. Create custom AWS IAM policy AWS IAM Access Management: Create custom AWS IAM policy |
7. Custom IAM policies with code AWS IAM Access Management: Custom IAM policies with code |
8. Module Recap and Activity AWS IAM Access Management: Module Recap and Activity |
5. Securing AWS Resources
1. Securing AWS resources Securing AWS Resources: Securing AWS resources |
2. Setup password policies Securing AWS Resources: Setup password policies |
3. Implement MFA for AWS IAM users Securing AWS Resources: Implement MFA for AWS IAM users |
4. AWS IAM policy simulation Securing AWS Resources: AWS IAM policy simulation |
5. Web identity federation Securing AWS Resources: Web identity federation |
6. Encryption key management Securing AWS Resources: Encryption key management |
7. Best practices for AWS IAM Securing AWS Resources: Best practices for AWS IAM |
8. Course recap Securing AWS Resources: Course recap |