Companies Home Search Profile

Managing AWS Security and Identity

Focused View

John Hales

6:55:59

113 View
  • 01_01-Course Overview.mp4
    02:25
  • 02_01-Introduction.mp4
    01:00
  • 02_02-Understanding AWS Shared Responsibilities.mp4
    07:10
  • 02_03-What Is the AWS Root User Account.mp4
    03:04
  • 02_04-The Misfortune of a Compromised Root User Account.mp4
    03:46
  • 02_05-The Disadvantages of Sharing the Root User Account.mp4
    04:08
  • 02_06-How IAM Interacts with Other AWS Resources.mp4
    02:44
  • 02_07-Scenario_ Introduction.mp4
    01:25
  • 02_08-Scenario_ Wired Brain Coffee.mp4
    05:36
  • 02_09-Scenario_ Globomantics.mp4
    07:49
  • 02_10-Demo_ Getting Started with an AWS Free Account.mp4
    05:20
  • 02_11-Demo_ Creating a New AWS Account.mp4
    04:37
  • 02_12-Demo_ Navigating the AWS Web Console.mp4
    04:28
  • 02_13-Demo_ Introducing IAM in the AWS Web Console.mp4
    04:13
  • 02_14-Conclusion.mp4
    00:58
  • 03_01-Introduction.mp4
    01:07
  • 03_02-IAM Users Overview.mp4
    04:46
  • 03_03-IAM Users.mp4
    06:35
  • 03_04-Demo_ Creating IAM Users.mp4
    03:42
  • 03_05-Password Policies.mp4
    03:36
  • 03_06-Configuring the IAM Password Policy.mp4
    03:12
  • 03_07-Access Keys.mp4
    05:04
  • 03_08-Creating Access Keys.mp4
    05:49
  • 03_09-Demo_ Creating and Using Access Keys.mp4
    04:52
  • 03_10-Multifactor Authentication.mp4
    10:05
  • 03_11-Demo_ Enabling Multifactor Authentication.mp4
    09:28
  • 03_12-Permissions.mp4
    02:58
  • 03_13-Demo_ Assigning Permissions.mp4
    01:39
  • 03_14-Conclusion.mp4
    02:43
  • 04_01-IAM Groups.mp4
    06:45
  • 04_02-Scenario Examples for IAM Groups.mp4
    03:40
  • 04_03-Creating IAM Groups.mp4
    01:37
  • 04_04-Demo_ Creating an IAM Group.mp4
    04:32
  • 04_05-Benefits of Using IAM Groups.mp4
    02:24
  • 04_06-Demo_ Editing Group Membership.mp4
    02:48
  • 04_07-User and Groups Best Practices.mp4
    12:37
  • 04_08-Conclusion.mp4
    01:07
  • 05_01-Introduction.mp4
    00:57
  • 05_02-IAM Policies.mp4
    05:58
  • 05_03-IAM Policy Structure.mp4
    05:49
  • 05_04-Creating a New Policy.mp4
    03:42
  • 05_05-AWS Managed Policies.mp4
    05:36
  • 05_06-Inline Policies.mp4
    08:50
  • 05_07-Policy Versioning.mp4
    04:12
  • 05_08-Demo_ Introducing Policies.mp4
    06:20
  • 05_09-Demo_ Creating a Policy.mp4
    03:10
  • 05_10-Demo_ Troubleshooting Policies.mp4
    02:03
  • 05_11-Demo_ Policy Versions.mp4
    00:47
  • 05_12-Demo_ Inline Policies.mp4
    02:56
  • 05_13-Policy Simulator.mp4
    08:06
  • 05_14-Demo_ Policy Simulator.mp4
    05:16
  • 05_15-Conclusion.mp4
    02:03
  • 06_01-Introduction.mp4
    00:41
  • 06_02-Understanding Roles.mp4
    01:56
  • 06_03-Benefits of Roles.mp4
    06:59
  • 06_04-Creating a Role.mp4
    06:42
  • 06_05-Demo_ Creating a Role.mp4
    05:36
  • 06_06-Demo_ Assigning a Role.mp4
    05:25
  • 06_07-Crossaccount Access with Roles.mp4
    01:55
  • 06_08-Conclusion.mp4
    01:21
  • 07_01-Introduction.mp4
    00:47
  • 07_02-Auditing and AWS Auditing Tools.mp4
    08:11
  • 07_03-AWS Cloud Trail.mp4
    14:39
  • 07_04-Demo_ Configuring Cloud Trail.mp4
    02:45
  • 07_05-Access Advisor.mp4
    05:27
  • 07_06-Demo_ Using Access Advisor.mp4
    01:16
  • 07_07-Credential Report.mp4
    05:37
  • 07_08-Demo_ Generating Credential Reports.mp4
    02:14
  • 07_09-AWS Trusted Advisor.mp4
    07:12
  • 07_10-Demo_ Using Trusted Advisor.mp4
    02:14
  • 07_11-Amazon Inspector.mp4
    05:29
  • 07_12-Conclusion.mp4
    02:09
  • 08_01-Introduction.mp4
    00:49
  • 08_02-Multiple AWS Accounts.mp4
    04:43
  • 08_03-Crossaccount Access.mp4
    05:54
  • 08_04-Backup and Disaster Recovery.mp4
    06:25
  • 08_05-Demo_ Preparing the Backup AWS Account.mp4
    06:08
  • 08_06-Demo_ Setting up the Role.mp4
    04:33
  • 08_07-Demo_ How to Assume a Role.mp4
    02:39
  • 08_08-Demo_ Assuming a Role in the CLI.mp4
    03:45
  • 08_09-Consolidated Billing.mp4
    04:25
  • 08_10-Demo_ Setting up Consolidated Billing.mp4
    03:38
  • 08_11-Centralized Logging.mp4
    04:09
  • 08_12-Demo_ Setting up Centralized Logging.mp4
    05:58
  • 08_13-Conclusion.mp4
    01:38
  • 09_01-Introduction.mp4
    00:40
  • 09_02-Understanding Federation.mp4
    04:18
  • 09_03-Fundamentals of Federation.mp4
    07:30
  • 09_04-STS Action APIs.mp4
    07:06
  • 09_05-Corporate Identities_ Simple AD.mp4
    07:51
  • 09_06-Corporate Identities_ Microsoft AD.mp4
    05:04
  • 09_07-Corporate Identities_ AD Connector.mp4
    04:49
  • 09_08-Demo_ Creating a Simple AD.mp4
    03:23
  • 09_09-NonAD Environments.mp4
    02:05
  • 09_10-Social Identities.mp4
    03:04
  • 09_11-Conclusion.mp4
    01:16
  • Description


    Security is one of the number-one issues for those considering moving workloads to the cloud. This course shows how to use AWS IAM services to tighten security and lock down resources.

    What You'll Learn?


      Follow along and go through the best practices of AWS account security from two different vantage points. In this course, Managing AWS Security and Identity, you'll learn how to configure Amazon's Identity and Access Management feature, commonly known as IAM. First, you'll discover IAM user and group security best practices and IAM policies. Next, you'll explore when and how to use IAM roles and how to account audit. Finally, you'll learn about federating multiple AWS accounts and federating AWS IAM accounts with an external identity provider, such as active directory. By the end of this course, you'll be able to properly secure your AWS accounts using policies, two-factor authentication and even permit other AWS accounts access to the resources in your account.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    John Hales is also the author of many books, from involved technical books from Sybex and Cengage to exam preparation books, to many quick reference guides from BarCharts, in addition to custom courseware for Fortune 500 customers. His latest book on vSphere is entitled Administering vSphere 5: Planning, Implementing and Troubleshooting. He has taught in many countries in Europe (including Russia, The Netherlands, Germany, Latvia, England, France, and Ireland), the Middle East (including Israel and Afghanistan), Asia (including China, Malaysia, and Japan), Australia, and North America (United States and Canada). John has various certifications, including the VMware VCA-DCV, VCA-DT, VCA-Cloud, VCP, VCP-DT, VCAP-DCA, the Microsoft MCSE, MCDBA, and MOUS, the EMC EMCSA (EMC Storage Administrator), and the CompTIA A+, Network+, and CTT+. He enjoys reading, travel, and spending time with his family. John lives with his wife and children in Sunrise, Florida.
    Pluralsight, LLC is an American privately held online education company that offers a variety of video training courses for software developers, IT administrators, and creative professionals through its website. Founded in 2004 by Aaron Skonnard, Keith Brown, Fritz Onion, and Bill Williams, the company has its headquarters in Farmington, Utah. As of July 2018, it uses more than 1,400 subject-matter experts as authors, and offers more than 7,000 courses in its catalog. Since first moving its courses online in 2007, the company has expanded, developing a full enterprise platform, and adding skills assessment modules.
    • language english
    • Training sessions 96
    • duration 6:55:59
    • level average
    • Release Date 2023/01/08