Identity and Access Management on AWS: Policies and Permissions
Offered By: Pluralsight
Course Description
Overview
This course will explain the proper use of policies and permissions in AWS, how policies are evaluated, and the use of advanced policy capabilities, including conditions and permission boundaries.
At the core of Identity and Access Management (IAM) usage in AWS is a thorough knowledge of policies and permissions. In this course, Identity and Access Management on AWS: Policies and Permissions, you’ll learn how to choose the appropriate policy type, create and manage custom policies, and determine the effective policies given a scenario. First, you’ll learn what policies are and how they are structured, along with the various types available. Next, you’ll explore how to evaluate policies, including the Policy Simulator tool to determine the exact policies that are in place and from where permissions are granted or denied. Finally, you’ll discover how to use advanced policy options, including policy conditions and permission boundaries to control the exact policies desired in a very fine-grained way. When you’re finished with this course, you’ll have a strong foundational knowledge of policies and permissions to provide the authorization to perform tasks in AWS that will help you as you secure your AWS infrastructure.
At the core of Identity and Access Management (IAM) usage in AWS is a thorough knowledge of policies and permissions. In this course, Identity and Access Management on AWS: Policies and Permissions, you’ll learn how to choose the appropriate policy type, create and manage custom policies, and determine the effective policies given a scenario. First, you’ll learn what policies are and how they are structured, along with the various types available. Next, you’ll explore how to evaluate policies, including the Policy Simulator tool to determine the exact policies that are in place and from where permissions are granted or denied. Finally, you’ll discover how to use advanced policy options, including policy conditions and permission boundaries to control the exact policies desired in a very fine-grained way. When you’re finished with this course, you’ll have a strong foundational knowledge of policies and permissions to provide the authorization to perform tasks in AWS that will help you as you secure your AWS infrastructure.
Taught by
Brian Eiler
Related Courses
Architecting Microsoft Azure SolutionsMicrosoft via edX Internetwork Security
Indian Institute of Technology, Kharagpur via Swayam Network Security
Georgia Institute of Technology via Udacity Microsoft Professional Orientation : Cloud Administration
Microsoft via edX Cyber Threats and Attack Vectors
University of Colorado System via Coursera