The course is part of these learning paths
This course looks at one of the key Security services within AWS, Identity & Access Management, commonly referred to IAM. This service manages identities and their permissions that are able to access your AWS resources and so understanding how this service works and what you can do with it will help you to maintain a secure AWS environment. IAM is an important step in ensuring your resources are secure.
Within this course we will look at:
• What is Identity & Access Management? This lecture will explain what IAM means and why it’s necessary to implement and maintain control of this service.
• Groups, Users & Roles: This lecture will define the differences between Groups, Users and Roles and how each of these objects are typically used
• IAM Policies: This lecture we will discuss what IAM Policies are, how to create, modify and apply them within your AWS environment
• Multi-Factor Authentication: This lecture will explain what MFA is and the best practices
• Identity Federation: This lecture will explain how external identities (users who do not have IAM user accounts) can access your AWS resources through the use of identity providers
• IAM Features: This lecture will focus on the information contained within IAM Account settings, the credential report and also how IAM integrates with KMS
By the end of this course, you will be able to:
• Setup and configure users, groups and roles to control which identities have authorization to access specific AWS resources
• Implement Multi-Factor Authentication
• Create and implement IAM Policies allowing you to grant or restrict very granular and specific permissions across a range of resources
• Implement a Password policy to align with your internal security controls
• Understand when and why you may use Identity federation access
• Understand how the Key Management Service (KMS) is used in conjunction with IAM
This course contains:
• 8 lectures
• Over 70 minutes of high definition video
• Live demonstrations on key components within the course
About the Author
Stuart has been working within the IT industry for two decades covering a huge range of topic areas and technologies, from data centre and network infrastructure design, to cloud architecture and implementation.
To date Stuart has created over 40 courses relating to Cloud, most within the AWS category with a heavy focus on security and compliance
He is AWS certified and accredited in addition to being a published author covering topics across the AWS landscape.
In January 2016 Stuart was awarded ‘Expert of the Year Award 2015’ from Experts Exchange for his knowledge share within cloud services to the community.
Stuart enjoys writing about cloud technologies and you will find many of his articles within our blog pages.
Hello and welcome to this course where I shall be discussing the AWS Identity and Access Management Service, commonly referred to as I-AM or IAM. This is a key security service within AWS and is likely to be the first security service you will use and come across allowing you to configure specific access controls within your environment.
Before we start I would like to introduce myself. My name is Stuart Scott. I am one of the trainers here at Cloud Academy and I specialize in AWS, Amazon Web Services. Feel free to connect with me with any questions using the detail shown on the screen. Alternatively, you can always get in touch with us here at Cloud Academy using the community forum where one of our cloud experts will reply to your question.
This course has been designed for AWS administrators, security engineers, security architects or anyone who is looking to increase their knowledge of the IAM service in preparation for an AWS certification. This course will cover all features and elements of IAM which will include:
- What is Identity and Access Management: This lecture will explain what IAM means and why it's necessary to implement and maintain control of the service.
- Groups, Users and Roles: This lecture will define the differences between groups, users and roles and how each of these objects are typically used.
- IAM Policies: This lecture will discuss what IAM policies are, how to create, modify and apply them within your AWS environment.
- Multi-Factor Authentication: MFA. This lecture will explain what MFA is and its best practices.
- Identity Federation: This lecture will look at how to access your AWS resources using identities outside of the IAM service.
- IAM Features: This lecture will focus on the information contained with the IAM account settings, the credential report and also how IAM integrates with KMS, the Key Management Service.
By the end of this course you will be able to set up and configure users, groups and roles to control which identities have authorization to access specific resources. You will be able to implement Multi-Factor Authentication, create and implement IAM policies, allowing you to grant or restrict very granular and specific permissions across a range of resources, implement a password policy to align with your internal security controls, understand when and why you may use identity federation access and you'll understand how the Key Management Service, KMS, is used in conjunction with IAM.
Although this course will explain everything from the ground up to do with IAM, having some basic hands-on experience of AWS and awareness of other services may help, but it's not essential. Feedback on our courses here at Cloud Academy are valuable to both us as trainers and any students looking to take the same course in the future.
If you have any feedback, positive or negative, it would be greatly appreciated if you could use the comments section found in the landing page of this course. That brings us to the end of this lecture. Coming up next we're going to look at what is Identity and Access Management and what it actually means.