1. Home
  2. Training Library
  3. Amazon Web Services
  4. Courses
  5. AWS: Overview of AWS Identity & Access Management (IAM)

Introduction

Contents

keyboard_tab
Introduction
1
Introduction
PREVIEW3m 6s
Summary
8
Summary
4m 33s

The course is part of these learning paths

DevOps Engineer – Professional Certification Preparation for AWS
course-steps 35 certification 5 lab-steps 18 quiz-steps 2 description 3
Solutions Architect – Professional Certification Preparation for AWS
course-steps 48 certification 6 lab-steps 19 quiz-steps 4 description 2
SysOps Administrator – Associate Certification Preparation for AWS
course-steps 35 certification 5 lab-steps 30 quiz-steps 4 description 5
Certified Developer – Associate Certification Preparation for AWS
course-steps 29 certification 5 lab-steps 22 description 2
Security - Specialty Certification Preparation for AWS
course-steps 22 certification 2 lab-steps 12 quiz-steps 5
AWS Security Services
course-steps 9 certification 2 lab-steps 4
AWS Access & Key Management Security
course-steps 6 certification 2 lab-steps 2 quiz-steps 2
Fundamentals of AWS
course-steps 5 certification 6 lab-steps 6 description 2
more_horiz See 7 more
play-arrow
Introduction
Overview
Transcript
DifficultyIntermediate
Duration1h 12m
Students5952
Ratings
4.9/5
star star star star star-half

Description

This course looks at one of the key Security services within AWS, Identity & Access Management, commonly referred to IAM. This service manages identities and their permissions that are able to access your AWS resources and so understanding how this service works and what you can do with it will help you to maintain a secure AWS environment. IAM is an important step in ensuring your resources are secure.

 

Within this course we will look at:

• What is Identity & Access Management? This lecture will explain what IAM means and why it’s necessary to implement and maintain control of this service.

• Groups, Users & Roles: This lecture will define the differences between Groups, Users and Roles and how each of these objects are typically used

• IAM Policies: This lecture we will discuss what IAM Policies are, how to create, modify and apply them within your AWS environment

• Multi-Factor Authentication: This lecture will explain what MFA is and the best practices

• Identity Federation: This lecture will explain how external identities (users who do not have IAM user accounts) can access your AWS resources through the use of identity providers

• IAM Features: This lecture will focus on the information contained within IAM Account settings, the credential report and also how IAM integrates with KMS

 

By the end of this course, you will be able to:

• Setup and configure users, groups and roles to control which identities have authorization to access specific AWS resources

• Implement Multi-Factor Authentication

• Create and implement IAM Policies allowing you to grant or restrict very granular and specific permissions across a range of resources

• Implement a Password policy to align with your internal security controls

• Understand when and why you may use Identity federation access

• Understand how the Key Management Service (KMS) is used in conjunction with IAM

 

This course contains:

• 8 lectures

• Over 70 minutes of high definition video

• Live demonstrations on key components within the course

About the Author

Students60957
Labs1
Courses56
Learning paths40

Stuart has been working within the IT industry for two decades covering a huge range of topic areas and technologies, from data centre and network infrastructure design, to cloud architecture and implementation.

To date, Stuart has created 50+ courses relating to Cloud, most within the AWS category with a heavy focus on security and compliance

He is AWS certified and accredited in addition to being a published author covering topics across the AWS landscape.

In January 2016 Stuart was awarded ‘Expert of the Year Award 2015’ from Experts Exchange for his knowledge share within cloud services to the community.

Stuart enjoys writing about cloud technologies and you will find many of his articles within our blog pages.

Hello and welcome to this course where I shall be discussing the AWS Identity and Access Management Service, commonly referred to as I-AM or IAM. This is a key security service within AWS and is likely to be the first security service you will use and come across allowing you to configure specific access controls within your environment.

Before we start I would like to introduce myself. My name is Stuart Scott. I am one of the trainers here at Cloud Academy and I specialize in AWS, Amazon Web Services. Feel free to connect with me with any questions using the detail shown on the screen. Alternatively, you can always get in touch with us here at Cloud Academy using the community forum where one of our cloud experts will reply to your question.

This course has been designed for AWS administrators, security engineers, security architects or anyone who is looking to increase their knowledge of the IAM service in preparation for an AWS certification. This course will cover all features and elements of IAM which will include:

- What is Identity and Access Management: This lecture will explain what IAM means and why it's necessary to implement and maintain control of the service.
- Groups, Users and Roles: This lecture will define the differences between groups, users and roles and how each of these objects are typically used.
- IAM Policies: This lecture will discuss what IAM policies are, how to create, modify and apply them within your AWS environment.
- Multi-Factor Authentication: MFA. This lecture will explain what MFA is and its best practices.
- Identity Federation: This lecture will look at how to access your AWS resources using identities outside of the IAM service.
- IAM Features: This lecture will focus on the information contained with the IAM account settings, the credential report and also how IAM integrates with KMS, the Key Management Service.

By the end of this course you will be able to set up and configure users, groups and roles to control which identities have authorization to access specific resources. You will be able to implement Multi-Factor Authentication, create and implement IAM policies, allowing you to grant or restrict very granular and specific permissions across a range of resources, implement a password policy to align with your internal security controls, understand when and why you may use identity federation access and you'll understand how the Key Management Service, KMS, is used in conjunction with IAM.

Although this course will explain everything from the ground up to do with IAM, having some basic hands-on experience of AWS and awareness of other services may help, but it's not essential. Feedback on our courses here at Cloud Academy are valuable to both us as trainers and any students looking to take the same course in the future.

If you have any feedback, positive or negative, it would be greatly appreciated if you could use the comments section found in the landing page of this course. That brings us to the end of this lecture. Coming up next we're going to look at what is Identity and Access Management and what it actually means.