CloudAcademy

Introduction to IAM

The course is part of these learning paths

Certified Developer—Associate Certification for AWS

course-steps 14 lab-steps 15 quiz-steps 18

SysOps Administrator—Associate Certification for AWS

course-steps 14 lab-steps 18 quiz-steps 13

Contents

keyboard_tab
Getting Started
lock
Introduction to IAM1m 12s
lock
IAM basic concepts3m 17s
lock
Enabling MFA3m 45s
Using IAM
lock
Users and Groups7m 3s
lock
Everything about Roles5m 31s
lock
Creating custom Policies4m 51s
Practical example
lock
Logging IAM events on CloudTrail5m 26s
play-arrow
Start course
Overview
Transcript
DifficultyBeginner
Duration31m
Students2411

Description

As your organization grows, more and more people are going to need access to your cloud resources. The ability to create and assign granular permissions is crucial to ensure the safety of your data and to avoid unauthorized access to reserved information.

Identity and Access Management (IAM) is the AWS tool that gives you centralized control over your AWS resources. It allows you to create fine-grained policies using JSON syntax to grant unique privileges to each and every available resource. This course will tell you everything you need to know to get started hardening your infrastructure.

Who should take this course

As a beginner to intermediate course, you'll require no previous experience, nevertheless some knowledge of AWS and its main services (like EC2 and S3) would really help you better understanding the concepts you'll encounter. You may therefore want to check out our Introduction to AWS and some of our other AWS courses before tackling this tutorial.

As a follow up, check out our IAM questions. You will learn more about the topic both while answering and following through the associated documentation.

Do you have questions on this course? Contact our cloud experts in our community forum.

About the Author

Students15368
Courses17
Learning paths2

David taught high school for twenty years, worked as a Linux system administrator for five years, and has been writing since he could hold a crayon between his fingers. His childhood bedroom wall has since been repainted.

Having worked directly with all kinds of technology, David derives great pleasure from completing projects that draw on as many tools from his toolkit as possible.

Besides being a Linux system administrator with a strong focus on virtualization and security tools, David writes technical documentation and user guides, and creates technology training videos.

His favorite technology tool is the one that should be just about ready for release tomorrow. Or Thursday.