AWS Access & Key Management Security

DifficultyIntermediate
AVG Duration9h
Students1989
Ratings
5/5
starstarstarstarstar
Content
9222

Description

With Security being one of the hottest topics within the Cloud industry today, Access and Key Management is often highlighted, questioned, and misunderstood. 

This learning path on AWS Access & Key Management Security has been designed to help you understand how AWS implements and manages access to its resources from an Identity, key management, and best practice perspective.

It will focus on the Identity & Access Management Service (IAM) and all of its features and how they operate together to provide secure access management to your resources. You will also gain a deeper understanding of how these features operate from an authentication, authorization, and access control stance. 

Security best practices will be covered across a range of abstract and container services, plus how the Key Management Service (KMS) and CloudHSM service can be used to manage and control the use of encryption keys and the benefits and considerations when doing so.

If you have any feedback relating to this learning path, please contact us at support@cloudacademy.com

Learning Objectives

  • Understand what AWS Identity & Access Management (IAM) is and how to implement it
  • Learn how to manage our organization using IAM Users and Groups and IAM Roles
  • Learn about security mechanisms around AWS Authentication, Authorization, and Accounting using a variety of services
  • Understand the responsibility between AWS and the customer when architecting both abstract and container services
  • Learn the basics of KMS
  • Learn about the S3 encryption and decryption process for S3 Managed Keys, KMS Managed Keys, and Customer Provided Keys
  • Learn the fundamentals of CloudHSM

Intended Audience

This course has been designed for AWS administrators, security engineers, security architects, or anyone who is looking to increase their knowledge of access and key management security.

Prerequisites

To get the most from this learning path, you should already have some basic hands-on experience of AWS and its services, although it's not essential.

Certificate

Your certificate for this learning path
lock

Training Content

1
Course - Intermediate - 17m
FREE
How AWS IAM is Used to Securely Manage Access
This course provides an overview of the AWS Identity & Access Management Service, commonly referred to as IAM, along with its core features.
2
Course - Intermediate - 25m
Managing User Identities with Long Term Credentials in AWS IAM
This course explains how to manage your user identities when using the AWS Identity and Access Management Service, commonly referred to as IAM.
3
Course - Intermediate - 35m
Managing Access using IAM User Groups & Roles
This course explores some of the security best practices when using user groups and roles and how these can help you secure access to your resources more effectively.
4
Course - Intermediate - 37m
Using IAM Policies to Define and Manage Permissions
This course covers how IAM Policies can be used to allow you to grant and restrict access to your resources within your AWS account, as well as the different types of policies and how to interpret a policy.
5
Hands-on Lab - Intermediate - 1h 15m
Advanced Roles and Groups Management Using IAM
Learn how to manage our organization using IAM Users and Groups and IAM Roles 
6
Exam - 35m
Knowledge Check: Overview of AWS Identity and Access Management (IAM)
Knowledge Check: Overview of AWS Identity and Access Management (IAM)
7
Course - Intermediate - 1h 26m
Understanding of AWS Authentication, Authorization & Accounting
In this course, you'll learn about security mechanisms around AWS Authentication, Authorization, and Accounting, using a variety of services.
8
Quiz - Intermediate - 9m
Authentication, Authorization & Accounting
Authentication, Authorization & Accounting
9
Course - Intermediate - 56m
AWS Security Best Practices: Abstract and Container Services
This course discusses the responsibility between AWS and the customer when architecting both abstract and container services
10
Course - Intermediate - 1h 10m
How to Use KMS Key Encryption to Protect Your Data
In this course, you will learn the basics of KMS, what it will cost to implement, how to encrypt data, and more...
11
Course - Advanced - 12m
Understanding S3 Encryption Mechanisms to Secure your Data
In this course, you'll learn about the S3 encryption and decryption process for S3 Managed Keys, KMS Managed Keys, and Customer Provided Keys.
12
Hands-on Lab - Intermediate - 2h
Using Amazon Key Management Service to Encrypt S3 and EBS Data
In this lab, you'll learn about Amazon Key Management Service to encrypt S3 and EBS Data at an intermediate level. Get started today!
13
Quiz - Intermediate - 9m
AWS Key Management Service (KMS) Intermediate
AWS Key Management Service (KMS) Intermediate
14
Course - Intermediate - 33m
Manage Your Own Encryption Keys Using AWS CloudHSM
This course gets you started with AWS CloudHSM by giving you an overview of the basics of the service, what it is, and its use cases.
15
Exam - 40m
Final Exam: Access & Key Management Security on AWS
Final Exam: Access & Key Management Security on AWS
About the Author
Students191795
Labs1
Courses187
Learning paths128

Stuart has been working within the IT industry for two decades covering a huge range of topic areas and technologies, from data center and network infrastructure design, to cloud architecture and implementation.

To date, Stuart has created 150+ courses relating to Cloud reaching over 180,000 students, mostly within the AWS category and with a heavy focus on security and compliance.

Stuart is a member of the AWS Community Builders Program for his contributions towards AWS.

He is AWS certified and accredited in addition to being a published author covering topics across the AWS landscape.

In January 2016 Stuart was awarded ‘Expert of the Year Award 2015’ from Experts Exchange for his knowledge share within cloud services to the community.

Stuart enjoys writing about cloud technologies and you will find many of his articles within our blog pages.