Sharif Nijim couples pragmatic advice with practical examples that educate IT pros on how to create a secure infrastructure within Amazon Web Services. Sharif explores the shared responsibility model of security, which splits duties between your company and AWS, and introduces key identity and access management concepts, including users, groups, roles, and policies. Learn how to configure Identity and Access Manager (IAM) and Simple Storage Service (S3) access management, including policies and access control lists. At the end of the course, Sharif helps you prepare for the inevitable audit of your AWS account(s).
This course is also part of a series designed to help you prepare for the AWS Certified SysOps Administrator – Associate certification exam.
- Summarize the AWS Shared Responsibility Model.
- Recall how to implement separation of duties.
- Differentiate between assigning permissions to an individual versus a group.
- Summarize how to create IAM roles.
- Describe how to secure financial access.
- Recall the steps for managing access to S3 with IAM.
- Cite the advantages of a pre-signed URL.
Skill Level Intermediate
- Hi I'm Sharif Nijim and I'd like to welcome you to this course on enterprise security and Amazon Web Services. Amazon Web Services, or AWS is the global leader in cloud computing, it's an exciting time to be an IT professional, we're in the midst of one of the biggest transformations in IT history. Startups are running in the cloud from the get go while established companies are migrating from running their own data centers to operating their infrastructure in the cloud. When preparing to use any cloud service, security is a top concern.
This course is designed to give you an appreciation of the security tools available within AWS. We'll start off by exploring the shared responsibility model so you can understand where your responsibilities begin and what AWS is accountable for. We'll look at how to effectively implement separation of duties. We'll delve into identity and access management. Giving you a thorough understanding for IAM concepts including users, group, roles, and policies. Finally, we will explore the tools and approaches to help you prepare for the inevitable IT audit, let's get started.