Introducing: AWS IAM masterclass video course

Learn how to configure access control in AWS

Author's image
Tamás Sallai
3 mins

I'm excited to announce my third video course! This time the topic is AWS IAM and the course roughly covers the same concepts as the AWS IAM guide, but in a video format that includes screencast videos and other visual elements that are not possible in a written format.

Get the course with a (time-limited) discount here.

In this course, you'll learn about authentication and authorization in AWS. Both are provided by the IAM service (Identity and Access Management, even its name reflects this). For both authentication and authorization, we'll look into the big picture first and see a few examples of how other services, such as MailChimp and Gmail implement them. This helps answer why IAM works the way it does.

Why should you care about authentication and authorization? Configuring them right provides security incident prevention. By defining who can have access to the account and who can do what, you can protect critical resources. A stolen access key or password won't ruin everything if it is only good for some limited operations.

Then we'll continue with the configuration of various IAM elements. You'll learn how access keys work and why they are central to AWS APIs, how to create users and roles, and what are the ways to add policies to them.

Then in the second part of the course, we'll dive deep into IAM policies. You'll learn how they are structured, their elements, and what types are supported in AWS. Then we'll move on to how the policy evaluation logic works, the system that gets all the policies defined in the account and uses them to decide whether a request is allowed or not. To make it more concrete, we'll look into a couple of examples and see how everything works together.

And finally, we'll close the course with a couple of best practices regarding how to configure policies and access control in AWS.

Who is this course for?

Everybody who needs to configure an AWS account and give access to other people or systems. This includes developers who need to grant access to a Lambda function to access a database, and administrators who need to make sure only certain people can access files stored in a sensitive S3 bucket or change critical assets.

I'm super excited about this course as this is my first long video content that uses the Remotion video-creation framework. The full video content is programmatically generated and that allows a lot of nice features, such as screencasts that can start and stop, as well as a lot of nice transitions.

I hope you'll check out this course and give it a try. If you do, use this (time-limited) coupon code: 7A3CBF152C72F3A0BE55.

June 10, 2021

Free PDF guide

Sign up to our newsletter and download the "Foreign key constraints in DynamoDB" guide.