YoVDO

Enterprise Identity and Access Control

Offered By: Udacity

Tags

Identity and Access Management (IAM) Courses

Course Description

Overview

This course focuses on identity and access management. As a security architect, implementing an organization-wide strategy for strong Identity and access management can greatly improve the security posture of the organization. IAM can be tricky to architect and implement. Too much access can lead to data exposure, whereas, too little access can lead to business hindrance. A fine balance is required while designing a strong IAM model. We will be covering some of those concepts and methodologies in this course.

Syllabus

  • Introduction to Enterprise Identity and Access Control
    • In this introductory lesson, we meet the course instructor and discuss enterprise identity and access control from a high-level perspective.
  • IAM Access Control Models and AWS
    • In this lesson, we discuss two access control methodologies in detail, RBAC and ABAC. We also create IAM Roles and review IAM policies in AWS.
  • Building Access Control Matrix and Mapping Permissions
    • In this lesson, we discuss mapping permissions using an access control matrix design based on access control requirements.
  • Building Organizational Role Structure
    • In this lesson, we take a deep dive into evaluating IAM policies, creating IAM restrictions, and validating permissions in AWS.
  • Building Organizational Role and Access Visualization
    • In this lesson, we focus on building an IAM architecture diagram that visualizes and defines the organizational structure of users, permissions, and resources.
  • Enforcing IAM Policy Configurations
    • In this lesson, we wrap up the course by focusing on monitoring policy compliance, enforcing IAM policy configurations, and policy remediation in AWS.
  • Architecting IAM Implementation with Enforcement
    • In this project, you will implement and enforce identity access management within AWS by implementing a role structure with policies that will be evaluated and enforced.

Taught by

Sjon-Paul Brown

Related Courses

Computing, Storage and Security with Google Cloud Platform
Google via Coursera
Google Cloud Fundamentals: Core Infrastructure
Google via Coursera
Google Cloud Fundamentals: Core Infrastructure en Español
Google Cloud via Coursera
Google Cloud Fundamentals: Core Infrastructure en Français
Google Cloud via Coursera
Google Cloud Fundamentals: Core Infrastructure 日本語版
Google Cloud via Coursera