Introducing: AWS IAM masterclass video course

(Read this article on the blog) I’m excited to announce my third video course! This time the topic is AWS IAM and the course roughly covers the same concepts as the AWS IAM guide, but in a video format that includes screencast videos and other visual elements that are not possible in a written format. […]

(Read this article on the blog)

I’m excited to announce my third video course! This time the topic is AWS IAM and the course roughly covers the same concepts as the AWS IAM
guide
, but in a video format that includes screencast videos and other visual
elements that are not possible in a written format.

Get the course with a (time-limited) discount here.

In this course, you’ll learn about authentication and authorization in AWS. Both are provided by the IAM service (Identity and Access Management, even its name
reflects this). For both authentication and authorization, we’ll look into the big picture first and see a few examples of how other services, such as MailChimp
and Gmail implement them. This helps answer why IAM works the way it does.

Why should you care about authentication and authorization? Configuring them right provides security incident prevention. By defining who can have access to the
account and who can do what, you can protect critical resources. A stolen access key or password won’t ruin everything if it is only good for some limited
operations.

Then we’ll continue with the configuration of various IAM elements. You’ll learn how access keys work and why they are central to AWS APIs, how to create users
and roles, and what are the ways to add policies to them.

Then in the second part of the course, we’ll dive deep into IAM policies. You’ll learn how they are structured, their elements, and what types are
supported in AWS. Then we’ll move on to how the policy evaluation logic works, the system that gets all the policies defined in the account and uses them to
decide whether a request is allowed or not. To make it more concrete, we’ll look into a couple of examples and see how everything works together.

And finally, we’ll close the course with a couple of best practices regarding how to configure policies and access control in AWS.

Who is this course for?

Everybody who needs to configure an AWS account and give access to other people or systems. This includes developers who need to grant access to a Lambda
function to access a database, and administrators who need to make sure only certain people can access files stored in a sensitive S3 bucket or change
critical assets.

I’m super excited about this course as this is my first long video content that uses the Remotion video-creation
framework. The full video content is programmatically generated and that allows a lot of nice features, such as screencasts that can start and stop, as well as
a lot of nice transitions.

I hope you’ll check out this course and give it a try. If you do, use this (time-limited) coupon code: 7A3CBF152C72F3A0BE55.

Source: Advanced Web Machinery