AWS Security Fundamentals: A Practical Guide to AWS IAM

Become an AWS pro by understanding IAM, learning to write policies, and configuring access. Get hands-on with realistic examples, developed by AWS Solution Certified Architects. No setup, no cleanup, no hassle.

Beginner

20 Lessons

1h 30min

Certificate of Completion

Become an AWS pro by understanding IAM, learning to write policies, and configuring access. Get hands-on with realistic examples, developed by AWS Solution Certified Architects. No setup, no cleanup, no hassle.

AI-POWERED

Explanations

AI-POWERED

Explanations

This course includes

24 Quizzes
60 Code Snippets

This course includes

24 Quizzes
60 Code Snippets

Course Overview

This course is about how AWS IAM works and how to write policies to control access in an AWS account. In this course, you will learn how AWS APIs work, explore different parts of the requests made to the APIs and elaborates on how access is determined. Additionally, you will dive into how to configure access inside AWS by describing the policy structure and the 5 policy types AWS supports. Further, you will become familiar with how the elements in the request and the policies fit together. You will also de...Show More

What You'll Learn

Learn how to write policies to control access in an AWS account.

Learn about AWS APIs and how to configure access by understanding the policy structure of AWS.

Understand how IAM evaluates access with some realistic examples.

Learn how to secure an AWS account using best practices and potential pitfalls.

What You'll Learn

Learn how to write policies to control access in an AWS account.

Show more

Course Content

1.

Introduction

Get familiar with AWS IAM, access control policies, and security best practices.
2.

Access Control Basics

Unpack the core of IAM access control concepts, elements, and CloudTrail logging in AWS.

User Management using IAM

Cloud Lab

3.

IAM Policies

Break apart IAM policy elements, types, conditions, and explore the IAM policy editor.
4.

Request Evaluation Flow and Examples

Grasp the fundamentals of AWS IAM's request evaluation flow and access control mechanisms.

Role Management Using Identity and Access Management (IAM)

Cloud Lab

5.

How to Secure an AWS Account

Solve problems in securing AWS accounts by managing IAM settings, RBAC, and automating security checks.
6.

Conclusion

1 Lesson

Focus on IAM’s critical role in securing AWS accounts through precise access control.
7.

Appendix

1 Lesson

Build on essential AWS security and IAM concepts through the glossary.

Course Author

Trusted by 1.4 million developers working at companies

Anthony Walker

@_webarchitect_

Emma Bostian 🐞

@EmmaBostian

Evan Dunbar

ML Engineer

Carlos Matias La Borde

Software Developer

Souvik Kundu

Front-end Developer

Vinay Krishnaiah

Software Developer

Eric Downs

Musician/Entrepeneur

Kenan Eyvazov

DevOps Engineer

Anthony Walker

@_webarchitect_

Emma Bostian 🐞

@EmmaBostian

Hands-on Learning Powered by AI

See how Educative uses AI to make your learning more immersive than ever before.

Instant Code Feedback

Evaluate and debug your code with the click of a button. Get real-time feedback on test cases, including time and space complexity of your solutions.

AI-Powered Mock Interviews

Adaptive Learning

Explain with AI

AI Code Mentor