With Security being one of the hottest topics within the Cloud industry today, Access and Key Management is often highlighted, questioned, and misunderstood.
This learning path on AWS Access & Key Management Security has been designed to help you understand how AWS implements and manages access to its resources from an Identity, key management, and best practice perspective.
It will focus on the Identity & Access Management Service (IAM) and all of its features and how they operate together to provide secure access management to your resources. You will also gain a deeper understanding of how these features operate from an authentication, authorization, and access control stance.
Security best practices will be covered across a range of abstract and container services, plus how the Key Management Service (KMS) and CloudHSM service can be used to manage and control the use of encryption keys and the benefits and considerations when doing so.
If you have any feedback relating to this learning path, please contact us at firstname.lastname@example.org.
- Understand what AWS Identity & Access Management (IAM) is and how to implement it
- Learn how to manage our organization using IAM Users and Groups and IAM Roles
- Learn about security mechanisms around AWS Authentication, Authorization, and Accounting using a variety of services
- Understand the responsibility between AWS and the customer when architecting both abstract and container services
- Learn the basics of KMS
- Learn about the S3 encryption and decryption process for S3 Managed Keys, KMS Managed Keys, and Customer Provided Keys
- Learn the fundamentals of CloudHSM
This course has been designed for AWS administrators, security engineers, security architects, or anyone who is looking to increase their knowledge of access and key management security.
To get the most from this learning path, you should already have some basic hands-on experience of AWS and its services, although it's not essential.
Learning Path Steps
This course explains AWS Identity & Access Management (IAM), what it is, and how to implement it.
Learn how to manage our organization using IAM Users and Groups and IAM Roles
Knowledge Check: Overview of AWS Identity and Access Management (IAM)
In this course, you'll learn about security mechanisms around AWS Authentication, Authorization, and Accounting, using a variety of services.
Authentication, Authorization & Accounting
This course discusses the responsibility between AWS and the customer when architecting both abstract and container services
In this course, you will learn the basics of KMS, what it will cost to implement, how to encrypt data, and more...
In this course, you'll learn about the S3 encryption and decryption process for S3 Managed Keys, KMS Managed Keys, and Customer Provided Keys.
In this lab, you'll learn about Amazon Key Management Service to encrypt S3 and EBS Data at an intermediate level. Get started today!
AWS Key Management Service (KMS) Intermediate
This course gets you started with AWS CloudHSM by giving you an overview of the basics of the service, what it is, and its use cases.
Final Exam: Access & Key Management Security on AWS
Stuart has been working within the IT industry for two decades covering a huge range of topic areas and technologies, from data center and network infrastructure design, to cloud architecture and implementation.
To date, Stuart has created 90+ courses relating to Cloud reaching over 100,000 students, mostly within the AWS category and with a heavy focus on security and compliance.
Stuart is a member of the AWS Community Builders Program for his contributions towards AWS.
He is AWS certified and accredited in addition to being a published author covering topics across the AWS landscape.
In January 2016 Stuart was awarded ‘Expert of the Year Award 2015’ from Experts Exchange for his knowledge share within cloud services to the community.
Stuart enjoys writing about cloud technologies and you will find many of his articles within our blog pages.