Introduction to AWS Identity and Access Management
About this Course
Security should be your first priority when developing cloud native applications. The goal of this course is to provide you with foundational knowledge and skills that will enable you to grow in your use of both AWS IAM and the rest of the AWS ecosystem. Throughout the course, the focus will be on the base-level knowledge needed for understanding the functionality of IAM, and simple ways to implement its usage. We start by introducing you to some background concepts needed to understand how and why identity and access management are necessary, and then go on to show you the first level of AWS IAM components. Through the rest of the course, you will see deeper dives into those and other concepts. The class closes by providing best practices and troubleshooting tips and tools. While progressing through the course, make sure you are taking advantage of the activities, assessments, and provided notes. They will be great for reinforcing the concepts covered during that week, as well as providing great locations to bookmark for faster reference as you continue growing and learning after the course. We expect that you have basic knowledge of AWS already. Some examples of concepts you should be familiar with are: you should know the basics of the AWS Global infrastructure, like what regions and availability zones are. You should also understand what an Amazon EC2 instance is, what Amazon S3 is, what a VPC is, as well as other basic AWS terminology.Created by: Amazon Web Services
Level: Introductory

Related Online Courses
The age of machine learning has arrived! Arm technology is powering a new generation of connected devices with sophisticated sensors that can collect a vast range of environmental, spatial and... more
Please Note: Learners who successfully complete this IBM course can earn a skill badge — a detailed, verifiable and digital credential that profiles the knowledge and skills you’ve acquired in thi... more
Magma leverages open source software and commodity hardware to help operators manage their networks efficiently. It provides a high level of automation, high reliability, and the ability to deliver... more
In this course, you will examine the various areas of network security including intrusion detection, evidence collection and defense against cyber attacks. The issues and facilities available to... more
Knowing how to work with Version Control Systems Git and GitHub are essential tools for today’s Software Developers, Data Scientists, and Data Engineers. They provide both a version control s... more