Managing User Identities in AWS IAM
The course is part of these learning paths
This course explains how to manage your user identities when using the AWS Identity and Access Management Service, commonly referred to as IAM. We'll be covering users in-depth, so if you're new to IAM and are looking to secure your resources through identity-based management then this is the right course for you!
- Learn the essentials of users within IAM
- Understand how to create, manage, and configure users using security best practices
- Security Engineers
- Security Architects
- Anyone looking to enhance their knowledge of the IAM service in preparation for an AWS Certification
To get the most out of this course, you should already have a basic understanding of AWS IAM and what the service is used for. It would also be advantageous if you had some basic hands-on experience of AWS and some of its core services, but it is not essential.
Hello and welcome to this course where I shall be looking at how to manage your User identities when using the AWS Identity and Access Management Service, commonly referred to as IAM. I shall be looking at Users in depth, so if you are new to IAM and are looking to secure your resources through identity-based management then keep watching!
My name is Stuart Scott, and I am the AWS Content Director here at Cloud Academy. Feel free to connect with me to ask any questions using the details shown on the screen, alternatively, you can always get in touch with us here at Cloud Academy by sending an e-mail to firstname.lastname@example.org where one of our Cloud experts will reply to your question.
The information set out in this course has been designed for those who may be in one of the following roles: an AWS Administrator, Security Engineer, Security Architect, and anyone who is looking to increase their knowledge of the IAM service in preparation for an AWS Certification. By the end of this course you will have a greater understanding of Users within IAM, how to create, manage, and configure them using security best practices. As an intermediate course, you should already have a basic understanding of AWS IAM and what the service is used for. It would also be advantageous if you had some basic hands-on experience of AWS and some of it's core services, but it is not essential.
Feedback on our courses here at Cloud Academy is valuable to both of us as trainers and any students looking to take the same course in the future. If you have any feedback, positive or negative, it would be greatly appreciated if you could contact email@example.com. Please note that, at the time of writing this content, all course information was accurate. AWS implements hundreds of updates every month as part of its ongoing drive to innovate and enhance its services. As a result, minor discrepancies may appear in the course content over time. Here at Cloud Academy, we strive to keep our content up to date in order to provide the best training available. So, if you notice any information that is outdated, please contact firstname.lastname@example.org. And this will allow us to update the course during its next release cycle. Thank you!
Stuart has been working within the IT industry for two decades covering a huge range of topic areas and technologies, from data center and network infrastructure design, to cloud architecture and implementation.
To date, Stuart has created 150+ courses relating to Cloud reaching over 180,000 students, mostly within the AWS category and with a heavy focus on security and compliance.
Stuart is a member of the AWS Community Builders Program for his contributions towards AWS.
He is AWS certified and accredited in addition to being a published author covering topics across the AWS landscape.
In January 2016 Stuart was awarded ‘Expert of the Year Award 2015’ from Experts Exchange for his knowledge share within cloud services to the community.
Stuart enjoys writing about cloud technologies and you will find many of his articles within our blog pages.