Welcome to Mobilarian Forum - Official Symbianize forum.

Join us now to get access to all our features. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, and so, so much more. It's also quick and totally free, so what are you waiting for?

Enforcing Access Control With Aws Iam

Alexhost
OP
O 0

oaxino

Alpha and Omega
Member
Access
Joined
Nov 24, 2022
Messages
30,703
Reaction score
884
Points
113
Age
35
Location
japanse
grants
₲103,656
2 years of service

2085a5dd25beb14db6a525f0426a5606.jpeg

Enforcing Access Control With Aws Iam
Published 11/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.76 GB | Duration: 3h 18m

AWS Identity and Access Management​

What you'll learn
How to provision IAM users, user groups and roles
How to authenticate via the AWS CLI, the AWS Management Console and Postman
How to grant permissions using identity-based and resource-based policies
How to restrict permissions using SCPs, session policies and permissions boundaries
How to create policies that adhere to the principle of least privilege
How to audit the activity of IAM identities
How to set up SAML-based federation between AWS IAM and AWS IAM Identity Center
How to troubleshoot common errors in IAM
Requirements
A basic understanding of computers
A good internet connection
Description
Who is this course forThis course is mainly for cloud security engineers, security analysts, identity professionals, network engineers, IT technicians, system administrators, computer science students, AWS support engineers and anybody who is interested in starting a career in the IT industry or transitioning to a role in the cloud space.What you will learnHow to create IAM users, user groups and rolesHow to authenticate into AWS via the console, CLI and APIHow to grant permissions using identity-based and resource-based policiesHow to restrict permissions using service control policies, session policies and permissions boundariesHow to create policies that adhere to the principle of least privilegeHow to audit the activity of your IAM entities in the AWS cloudHow to set up SAML-based federation between AWS IAM and AWS IAM Identity CenterHow to troubleshoot common errors related to authentication and authorizationPrerequisitesA good internet connectionA willingness to learnFAQsDo I need any previous experience?Any previous experience in the AWS cloud would be beneficial but not necessaryDo I get any support with this course?Yes, any question you have will be answered in the most timely mannerWill I get a certificate of completion at the end?Yes, a certificate of completion will be awarded at the end
Overview
Section 1: Introduction
Lecture 1 What is AWS IAM?
Section 2: IAM identities
Lecture 2 The root user
Lecture 3 IAM User groups
Lecture 4 IAM Users
Lecture 5 IAM Roles
Section 3: IAM concepts
Lecture 6 The principle of least privilege
Lecture 7 Accountability
Lecture 8 Separation of duties
Lecture 9 The AAA security framework
Section 4: Authentication
Lecture 10 What is authentication?
Lecture 11 AWS access types
Lecture 12 Access key types
Lecture 13 Permanent credentials
Lecture 14 Temporary credentials
Lecture 15 Configuring a password policy
Lecture 16 Multi-factor authentication
Section 5: Authorisation
Lecture 17 What is authorisation?
Lecture 18 The anatomy of a policy
Lecture 19 Policy types
Lecture 20 Identity-based policies
Lecture 21 Resource-based policies
Lecture 22 Permissions boundaries
Lecture 23 Service control policies
Lecture 24 Session policies
Section 6: Auditing
Lecture 25 What is auditing?
Lecture 26 AWS CloudTrail
Lecture 27 Access advisor
Lecture 28 Credentials report
Lecture 29 IAM Access analyser
Section 7: Policy evaluation
Lecture 30 The request context
Lecture 31 Policy evaluation logic
Lecture 32 Single-account policy evaluation logic
Lecture 33 Cross-account policy evaluation logic
Section 8: Federation
Lecture 34 What is federation?
Lecture 35 SAML 2.0 - based federation
Lecture 36 Configuring SAML federation
Section 9: Troubleshooting
Lecture 37 Troubleshooting methodology
Lecture 38 Troubleshooting authentication errors
Lecture 39 Troubleshooting authorisation errors
Section 10: Conclusion
Lecture 40 Access control outside of IAM
Lecture 41 Summary
Cloud security engineers,Security analysts,IT administrators,Cloud security architects,SecDevOps engineers,Cyber security professionals,AWS support engineers

Screenshots

ff6c825a3a519e4e743244fd084dded7.jpeg

Download link

rapidgator.net:
You must reply in thread to view hidden text.

uploadgig.com:
You must reply in thread to view hidden text.

ddownload.com:
You must reply in thread to view hidden text.
 
K 0

KatzSec DevOps

Alpha and Omega
Philanthropist
Access
Joined
Jan 17, 2022
Messages
648,371
Reaction score
7,982
Points
83
grants
₲58,549
2 years of service
oaxino salamat sa pag contribute. Next time always upload your files sa
Please, Log in or Register to view URLs content!
para siguradong di ma dedeadlink. Let's keep on sharing to keep our community running for good. This community is built for you and everyone to share freely. Let's invite more contributors para mabalik natin sigla ng Mobilarian at tuloy ang puyatan. :)
 
Top Bottom