589689.xyz

Introduction to Identity and Access Management (IAM)

  • 收录时间:2022-03-19 05:21:47
  • 文件大小:3GB
  • 下载次数:1
  • 最近下载:2022-03-19 05:21:47
  • 磁力链接:

文件列表

  1. 4. Access Management/3. Leveraging Policies.mp4 194MB
  2. 4. Access Management/2. Understanding Policies.mp4 177MB
  3. 4. Access Management/7. Leveraging Roles.mp4 136MB
  4. 5. Testing and Troubleshooting/3. Exploring Common Errors and Resolutions.mp4 132MB
  5. 2. IAM Essentials/2. Understanding IAM.mp4 115MB
  6. 7. Conclusion/1. Conclusion and What’s Next.mp4 113MB
  7. 3. Identities/4. Understanding Groups.mp4 107MB
  8. 2. IAM Essentials/3. Exploring Key Components and Terms.mp4 106MB
  9. 3. Identities/3. Understanding Federated Users.mp4 103MB
  10. 5. Testing and Troubleshooting/2. Using the Policy Simulator.mp4 95MB
  11. 2. IAM Essentials/7. Discovering the AWS Management Console.mp4 93MB
  12. 4. Access Management/9. Controlling Access via Tags.mp4 88MB
  13. 3. Identities/2. Creating and Managing Individual IAM Users.mp4 87MB
  14. 4. Access Management/11. Limiting Privileged User Access by Setting Permissions Boundaries in AWS IAM/2. Limiting Privileged User Access by Setting Permissions Boundaries in AWS IAM - Solution.mp4 85MB
  15. 1. Introduction/1. Course Introduction and About the Training Architect.mp4 85MB
  16. 4. Access Management/8. Giving an Amazon Web Services (AWS) Lambda Function access to an Amazon DynamoDB Table via an Execution Role/2. Solution Video.mp4 81MB
  17. 2. IAM Essentials/8. Exploring Programmatic Access.mp4 80MB
  18. 4. Access Management/10. Setting Permissions Boundaries.mp4 71MB
  19. 4. Access Management/4. Managing AWS IAM User Permissions Using Groups and Policies/2. Solution: Managing AWS IAM User Permissions Using Groups and Policies.mp4 56MB
  20. 6. Monitoring/2. Tracking the Lifecycle of Passwords and Access Keys.mp4 54MB
  21. 6. Monitoring/3. Auditing Resource Policies.mp4 53MB
  22. 6. Monitoring/5. Monitoring, Auditing, and Logging Users and Resource Usage in AWS IAM/2. Monitoring, Auditing, and Logging Users and Resource Usage in AWS IAM - Solution .mp4 52MB
  23. 4. Access Management/6. Understanding Roles.mp4 46MB
  24. 6. Monitoring/4. Logging Access to Resources.mp4 42MB
  25. 2. IAM Essentials/4. Understanding the Root User .mp4 39MB
  26. 2. IAM Essentials/5. Exploring IAM in the Real World .mp4 38MB
  27. 4. Access Management/5. Preventing Deletion of an Amazon S3 Bucket Using a Resource Based Policy/2. Preventing Deletion of an Amazon S3 Bucket Using a Resource-Based Policy - Solution.mp4 38MB
  28. 2. IAM Essentials/6. Understanding What Causes Bad Things to Happen.mp4 32MB
  29. 6. Monitoring/1. Section Introduction.mp4 31MB
  30. 2. IAM Essentials/1. Section Introduction.mp4 31MB
  31. 3. Identities/1. Section Introduction.mp4 28MB
  32. 5. Testing and Troubleshooting/4. Troubleshooting and Resolving AWS IAM Errors/2. Troubleshooting and Resolving AWS IAM Errors - Solution.mp4 24MB
  33. 4. Access Management/1. Section Introduction.mp4 23MB
  34. 5. Testing and Troubleshooting/1. Section Introduction.mp4 22MB
  35. 2. IAM Essentials/9. Section Review.mp4 22MB
  36. 6. Monitoring/5. Monitoring, Auditing, and Logging Users and Resource Usage in AWS IAM/1. Monitoring, Auditing, and Logging Users and Resource Usage in AWS IAM - Introduction.mp4 20MB
  37. 4. Access Management/12. Section Review.mp4 18MB
  38. 6. Monitoring/6. Section Review.mp4 16MB
  39. 4. Access Management/4. Managing AWS IAM User Permissions Using Groups and Policies/1. Introduction: Managing AWS IAM User Permissions Using Groups and Policies.mp4 15MB
  40. 4. Access Management/8. Giving an Amazon Web Services (AWS) Lambda Function access to an Amazon DynamoDB Table via an Execution Role/1. Introduction Video.mp4 15MB
  41. 5. Testing and Troubleshooting/4. Troubleshooting and Resolving AWS IAM Errors/1. Troubleshooting and Resolving AWS IAM Errors - Introduction .mp4 13MB
  42. 4. Access Management/11. Limiting Privileged User Access by Setting Permissions Boundaries in AWS IAM/1. Limiting Privileged User Access by Setting Permissions Boundaries in AWS IAM - Introduction.mp4 13MB
  43. 3. Identities/5. Section Review.mp4 13MB
  44. 5. Testing and Troubleshooting/5. Section Review.mp4 9MB
  45. 4. Access Management/5. Preventing Deletion of an Amazon S3 Bucket Using a Resource Based Policy/1. Preventing Deletion of an Amazon S3 Bucket Using a Resource-Based Policy - Introduction.mp4 9MB
  46. 2. IAM Essentials/1620184683379-IAM-Mind Map.png 2MB
  47. 5. Testing and Troubleshooting/4. Troubleshooting and Resolving AWS IAM Errors/troubleshooting_diagram.png 298KB
  48. 4. Access Management/4. Managing AWS IAM User Permissions Using Groups and Policies/Groups_and_Policies_Diagram.png 259KB
  49. 6. Monitoring/5. Monitoring, Auditing, and Logging Users and Resource Usage in AWS IAM/monitoring_lab.png 249KB
  50. 4. Access Management/11. Limiting Privileged User Access by Setting Permissions Boundaries in AWS IAM/Permissions_Boundaries_Diagram.png 242KB
  51. 4. Access Management/8. Giving an Amazon Web Services (AWS) Lambda Function access to an Amazon DynamoDB Table via an Execution Role/Lambda_Execution_Role.png 213KB
  52. 4. Access Management/5. Preventing Deletion of an Amazon S3 Bucket Using a Resource Based Policy/Bucket_Policy_Diagram.png 171KB
  53. 4. Access Management/3. Leveraging Policies.vtt 22KB
  54. 4. Access Management/2. Understanding Policies.vtt 18KB
  55. 4. Access Management/7. Leveraging Roles.vtt 17KB
  56. 5. Testing and Troubleshooting/3. Exploring Common Errors and Resolutions.vtt 14KB
  57. 3. Identities/2. Creating and Managing Individual IAM Users.vtt 13KB
  58. 4. Access Management/9. Controlling Access via Tags.vtt 11KB
  59. 6. Monitoring/5. Monitoring, Auditing, and Logging Users and Resource Usage in AWS IAM/2. Monitoring, Auditing, and Logging Users and Resource Usage in AWS IAM - Solution .vtt 10KB
  60. 2. IAM Essentials/2. Understanding IAM.vtt 9KB
  61. 4. Access Management/10. Setting Permissions Boundaries.vtt 9KB
  62. 4. Access Management/8. Giving an Amazon Web Services (AWS) Lambda Function access to an Amazon DynamoDB Table via an Execution Role/2. Solution Video.vtt 9KB
  63. 2. IAM Essentials/7. Discovering the AWS Management Console.vtt 8KB
  64. 4. Access Management/6. Understanding Roles.vtt 7KB
  65. 3. Identities/3. Understanding Federated Users.vtt 7KB
  66. 4. Access Management/4. Managing AWS IAM User Permissions Using Groups and Policies/2. Solution: Managing AWS IAM User Permissions Using Groups and Policies.vtt 7KB
  67. 4. Access Management/4. Managing AWS IAM User Permissions Using Groups and Policies/metadata.md 7KB
  68. 2. IAM Essentials/3. Exploring Key Components and Terms.vtt 6KB
  69. 4. Access Management/11. Limiting Privileged User Access by Setting Permissions Boundaries in AWS IAM/metadata.md 6KB
  70. 3. Identities/4. Understanding Groups.vtt 6KB
  71. 2. IAM Essentials/4. Understanding the Root User .vtt 6KB
  72. 4. Access Management/8. Giving an Amazon Web Services (AWS) Lambda Function access to an Amazon DynamoDB Table via an Execution Role/metadata.md 6KB
  73. 6. Monitoring/3. Auditing Resource Policies.vtt 6KB
  74. 2. IAM Essentials/8. Exploring Programmatic Access.vtt 6KB
  75. 5. Testing and Troubleshooting/2. Using the Policy Simulator.vtt 6KB
  76. 6. Monitoring/2. Tracking the Lifecycle of Passwords and Access Keys.vtt 5KB
  77. 5. Testing and Troubleshooting/4. Troubleshooting and Resolving AWS IAM Errors/metadata.md 5KB
  78. 2. IAM Essentials/5. Exploring IAM in the Real World .vtt 5KB
  79. 4. Access Management/5. Preventing Deletion of an Amazon S3 Bucket Using a Resource Based Policy/2. Preventing Deletion of an Amazon S3 Bucket Using a Resource-Based Policy - Solution.vtt 5KB
  80. 4. Access Management/5. Preventing Deletion of an Amazon S3 Bucket Using a Resource Based Policy/metadata.md 5KB
  81. 6. Monitoring/5. Monitoring, Auditing, and Logging Users and Resource Usage in AWS IAM/1. Monitoring, Auditing, and Logging Users and Resource Usage in AWS IAM - Introduction.vtt 5KB
  82. 6. Monitoring/4. Logging Access to Resources.vtt 4KB
  83. 7. Conclusion/1. Conclusion and What’s Next.vtt 4KB
  84. 2. IAM Essentials/6. Understanding What Causes Bad Things to Happen.vtt 4KB
  85. 6. Monitoring/5. Monitoring, Auditing, and Logging Users and Resource Usage in AWS IAM/metadata.md 4KB
  86. 4. Access Management/8. Giving an Amazon Web Services (AWS) Lambda Function access to an Amazon DynamoDB Table via an Execution Role/1. Introduction Video.vtt 3KB
  87. 5. Testing and Troubleshooting/4. Troubleshooting and Resolving AWS IAM Errors/2. Troubleshooting and Resolving AWS IAM Errors - Solution.vtt 3KB
  88. 4. Access Management/4. Managing AWS IAM User Permissions Using Groups and Policies/1. Introduction: Managing AWS IAM User Permissions Using Groups and Policies.vtt 3KB
  89. 4. Access Management/5. Preventing Deletion of an Amazon S3 Bucket Using a Resource Based Policy/1. Preventing Deletion of an Amazon S3 Bucket Using a Resource-Based Policy - Introduction.vtt 3KB
  90. 1. Introduction/1. Course Introduction and About the Training Architect.vtt 3KB
  91. 4. Access Management/11. Limiting Privileged User Access by Setting Permissions Boundaries in AWS IAM/1. Limiting Privileged User Access by Setting Permissions Boundaries in AWS IAM - Introduction.vtt 3KB
  92. 5. Testing and Troubleshooting/4. Troubleshooting and Resolving AWS IAM Errors/1. Troubleshooting and Resolving AWS IAM Errors - Introduction .vtt 3KB
  93. 2. IAM Essentials/9. Section Review.vtt 2KB
  94. 4. Access Management/12. Section Review.vtt 2KB
  95. 6. Monitoring/6. Section Review.vtt 2KB
  96. 3. Identities/5. Section Review.vtt 1KB
  97. 2. IAM Essentials/1. Section Introduction.vtt 1KB
  98. 6. Monitoring/1. Section Introduction.vtt 1KB
  99. 3. Identities/1. Section Introduction.vtt 1008B
  100. 5. Testing and Troubleshooting/5. Section Review.vtt 977B
  101. 4. Access Management/1. Section Introduction.vtt 812B
  102. 5. Testing and Troubleshooting/1. Section Introduction.vtt 696B