Book Image

Networking and Security Best Practices on AWS [Video]

By : James Cross
Book Image

Networking and Security Best Practices on AWS [Video]

By: James Cross

Overview of this book

<p>This course will show you how to get started with the fundamental technologies required to secure your applications from the beginning of the architecture/development process: Identity Access Management (IAM) and Virtual Private Clouds (VPCs). Combined, these two technologies give you the essential capability you will need to create a secure and isolated virtual datacenter in the cloud, complete with fine-grained user access controls and activity monitoring.</p> <h1>Style and Approach</h1> <p>With easy to follow steps, this course explains how to get started with the fundamental technologies like Identity Access Management (IAM) and Virtual Private Clouds (VPCs).</p> <p>The course practically demonstrates how to create a secure and isolated virtual datacenter in the cloud.</p>
Table of Contents (2 chapters)
Chapter 1
Identity Access Management
Content Locked
Section 3
Hands-on with IAM
In this video, we have an example of how to create users, groups, and roles with IAM. - Log in to the AWS console and explore the IAM options - Create a user, assign some policies, and group them together - Create a role, and log in as a test user