Introduction to Identity and Access Management (IAM)
- 收录时间:2022-03-19 05:21:47
- 文件大小:3GB
- 下载次数:1
- 最近下载:2022-03-19 05:21:47
- 磁力链接:
-
文件列表
- 4. Access Management/3. Leveraging Policies.mp4 194MB
- 4. Access Management/2. Understanding Policies.mp4 177MB
- 4. Access Management/7. Leveraging Roles.mp4 136MB
- 5. Testing and Troubleshooting/3. Exploring Common Errors and Resolutions.mp4 132MB
- 2. IAM Essentials/2. Understanding IAM.mp4 115MB
- 7. Conclusion/1. Conclusion and What’s Next.mp4 113MB
- 3. Identities/4. Understanding Groups.mp4 107MB
- 2. IAM Essentials/3. Exploring Key Components and Terms.mp4 106MB
- 3. Identities/3. Understanding Federated Users.mp4 103MB
- 5. Testing and Troubleshooting/2. Using the Policy Simulator.mp4 95MB
- 2. IAM Essentials/7. Discovering the AWS Management Console.mp4 93MB
- 4. Access Management/9. Controlling Access via Tags.mp4 88MB
- 3. Identities/2. Creating and Managing Individual IAM Users.mp4 87MB
- 4. Access Management/11. Limiting Privileged User Access by Setting Permissions Boundaries in AWS IAM/2. Limiting Privileged User Access by Setting Permissions Boundaries in AWS IAM - Solution.mp4 85MB
- 1. Introduction/1. Course Introduction and About the Training Architect.mp4 85MB
- 4. Access Management/8. Giving an Amazon Web Services (AWS) Lambda Function access to an Amazon DynamoDB Table via an Execution Role/2. Solution Video.mp4 81MB
- 2. IAM Essentials/8. Exploring Programmatic Access.mp4 80MB
- 4. Access Management/10. Setting Permissions Boundaries.mp4 71MB
- 4. Access Management/4. Managing AWS IAM User Permissions Using Groups and Policies/2. Solution: Managing AWS IAM User Permissions Using Groups and Policies.mp4 56MB
- 6. Monitoring/2. Tracking the Lifecycle of Passwords and Access Keys.mp4 54MB
- 6. Monitoring/3. Auditing Resource Policies.mp4 53MB
- 6. Monitoring/5. Monitoring, Auditing, and Logging Users and Resource Usage in AWS IAM/2. Monitoring, Auditing, and Logging Users and Resource Usage in AWS IAM - Solution .mp4 52MB
- 4. Access Management/6. Understanding Roles.mp4 46MB
- 6. Monitoring/4. Logging Access to Resources.mp4 42MB
- 2. IAM Essentials/4. Understanding the Root User .mp4 39MB
- 2. IAM Essentials/5. Exploring IAM in the Real World .mp4 38MB
- 4. Access Management/5. Preventing Deletion of an Amazon S3 Bucket Using a Resource Based Policy/2. Preventing Deletion of an Amazon S3 Bucket Using a Resource-Based Policy - Solution.mp4 38MB
- 2. IAM Essentials/6. Understanding What Causes Bad Things to Happen.mp4 32MB
- 6. Monitoring/1. Section Introduction.mp4 31MB
- 2. IAM Essentials/1. Section Introduction.mp4 31MB
- 3. Identities/1. Section Introduction.mp4 28MB
- 5. Testing and Troubleshooting/4. Troubleshooting and Resolving AWS IAM Errors/2. Troubleshooting and Resolving AWS IAM Errors - Solution.mp4 24MB
- 4. Access Management/1. Section Introduction.mp4 23MB
- 5. Testing and Troubleshooting/1. Section Introduction.mp4 22MB
- 2. IAM Essentials/9. Section Review.mp4 22MB
- 6. Monitoring/5. Monitoring, Auditing, and Logging Users and Resource Usage in AWS IAM/1. Monitoring, Auditing, and Logging Users and Resource Usage in AWS IAM - Introduction.mp4 20MB
- 4. Access Management/12. Section Review.mp4 18MB
- 6. Monitoring/6. Section Review.mp4 16MB
- 4. Access Management/4. Managing AWS IAM User Permissions Using Groups and Policies/1. Introduction: Managing AWS IAM User Permissions Using Groups and Policies.mp4 15MB
- 4. Access Management/8. Giving an Amazon Web Services (AWS) Lambda Function access to an Amazon DynamoDB Table via an Execution Role/1. Introduction Video.mp4 15MB
- 5. Testing and Troubleshooting/4. Troubleshooting and Resolving AWS IAM Errors/1. Troubleshooting and Resolving AWS IAM Errors - Introduction .mp4 13MB
- 4. Access Management/11. Limiting Privileged User Access by Setting Permissions Boundaries in AWS IAM/1. Limiting Privileged User Access by Setting Permissions Boundaries in AWS IAM - Introduction.mp4 13MB
- 3. Identities/5. Section Review.mp4 13MB
- 5. Testing and Troubleshooting/5. Section Review.mp4 9MB
- 4. Access Management/5. Preventing Deletion of an Amazon S3 Bucket Using a Resource Based Policy/1. Preventing Deletion of an Amazon S3 Bucket Using a Resource-Based Policy - Introduction.mp4 9MB
- 2. IAM Essentials/1620184683379-IAM-Mind Map.png 2MB
- 5. Testing and Troubleshooting/4. Troubleshooting and Resolving AWS IAM Errors/troubleshooting_diagram.png 298KB
- 4. Access Management/4. Managing AWS IAM User Permissions Using Groups and Policies/Groups_and_Policies_Diagram.png 259KB
- 6. Monitoring/5. Monitoring, Auditing, and Logging Users and Resource Usage in AWS IAM/monitoring_lab.png 249KB
- 4. Access Management/11. Limiting Privileged User Access by Setting Permissions Boundaries in AWS IAM/Permissions_Boundaries_Diagram.png 242KB
- 4. Access Management/8. Giving an Amazon Web Services (AWS) Lambda Function access to an Amazon DynamoDB Table via an Execution Role/Lambda_Execution_Role.png 213KB
- 4. Access Management/5. Preventing Deletion of an Amazon S3 Bucket Using a Resource Based Policy/Bucket_Policy_Diagram.png 171KB
- 4. Access Management/3. Leveraging Policies.vtt 22KB
- 4. Access Management/2. Understanding Policies.vtt 18KB
- 4. Access Management/7. Leveraging Roles.vtt 17KB
- 5. Testing and Troubleshooting/3. Exploring Common Errors and Resolutions.vtt 14KB
- 3. Identities/2. Creating and Managing Individual IAM Users.vtt 13KB
- 4. Access Management/9. Controlling Access via Tags.vtt 11KB
- 6. Monitoring/5. Monitoring, Auditing, and Logging Users and Resource Usage in AWS IAM/2. Monitoring, Auditing, and Logging Users and Resource Usage in AWS IAM - Solution .vtt 10KB
- 2. IAM Essentials/2. Understanding IAM.vtt 9KB
- 4. Access Management/10. Setting Permissions Boundaries.vtt 9KB
- 4. Access Management/8. Giving an Amazon Web Services (AWS) Lambda Function access to an Amazon DynamoDB Table via an Execution Role/2. Solution Video.vtt 9KB
- 2. IAM Essentials/7. Discovering the AWS Management Console.vtt 8KB
- 4. Access Management/6. Understanding Roles.vtt 7KB
- 3. Identities/3. Understanding Federated Users.vtt 7KB
- 4. Access Management/4. Managing AWS IAM User Permissions Using Groups and Policies/2. Solution: Managing AWS IAM User Permissions Using Groups and Policies.vtt 7KB
- 4. Access Management/4. Managing AWS IAM User Permissions Using Groups and Policies/metadata.md 7KB
- 2. IAM Essentials/3. Exploring Key Components and Terms.vtt 6KB
- 4. Access Management/11. Limiting Privileged User Access by Setting Permissions Boundaries in AWS IAM/metadata.md 6KB
- 3. Identities/4. Understanding Groups.vtt 6KB
- 2. IAM Essentials/4. Understanding the Root User .vtt 6KB
- 4. Access Management/8. Giving an Amazon Web Services (AWS) Lambda Function access to an Amazon DynamoDB Table via an Execution Role/metadata.md 6KB
- 6. Monitoring/3. Auditing Resource Policies.vtt 6KB
- 2. IAM Essentials/8. Exploring Programmatic Access.vtt 6KB
- 5. Testing and Troubleshooting/2. Using the Policy Simulator.vtt 6KB
- 6. Monitoring/2. Tracking the Lifecycle of Passwords and Access Keys.vtt 5KB
- 5. Testing and Troubleshooting/4. Troubleshooting and Resolving AWS IAM Errors/metadata.md 5KB
- 2. IAM Essentials/5. Exploring IAM in the Real World .vtt 5KB
- 4. Access Management/5. Preventing Deletion of an Amazon S3 Bucket Using a Resource Based Policy/2. Preventing Deletion of an Amazon S3 Bucket Using a Resource-Based Policy - Solution.vtt 5KB
- 4. Access Management/5. Preventing Deletion of an Amazon S3 Bucket Using a Resource Based Policy/metadata.md 5KB
- 6. Monitoring/5. Monitoring, Auditing, and Logging Users and Resource Usage in AWS IAM/1. Monitoring, Auditing, and Logging Users and Resource Usage in AWS IAM - Introduction.vtt 5KB
- 6. Monitoring/4. Logging Access to Resources.vtt 4KB
- 7. Conclusion/1. Conclusion and What’s Next.vtt 4KB
- 2. IAM Essentials/6. Understanding What Causes Bad Things to Happen.vtt 4KB
- 6. Monitoring/5. Monitoring, Auditing, and Logging Users and Resource Usage in AWS IAM/metadata.md 4KB
- 4. Access Management/8. Giving an Amazon Web Services (AWS) Lambda Function access to an Amazon DynamoDB Table via an Execution Role/1. Introduction Video.vtt 3KB
- 5. Testing and Troubleshooting/4. Troubleshooting and Resolving AWS IAM Errors/2. Troubleshooting and Resolving AWS IAM Errors - Solution.vtt 3KB
- 4. Access Management/4. Managing AWS IAM User Permissions Using Groups and Policies/1. Introduction: Managing AWS IAM User Permissions Using Groups and Policies.vtt 3KB
- 4. Access Management/5. Preventing Deletion of an Amazon S3 Bucket Using a Resource Based Policy/1. Preventing Deletion of an Amazon S3 Bucket Using a Resource-Based Policy - Introduction.vtt 3KB
- 1. Introduction/1. Course Introduction and About the Training Architect.vtt 3KB
- 4. Access Management/11. Limiting Privileged User Access by Setting Permissions Boundaries in AWS IAM/1. Limiting Privileged User Access by Setting Permissions Boundaries in AWS IAM - Introduction.vtt 3KB
- 5. Testing and Troubleshooting/4. Troubleshooting and Resolving AWS IAM Errors/1. Troubleshooting and Resolving AWS IAM Errors - Introduction .vtt 3KB
- 2. IAM Essentials/9. Section Review.vtt 2KB
- 4. Access Management/12. Section Review.vtt 2KB
- 6. Monitoring/6. Section Review.vtt 2KB
- 3. Identities/5. Section Review.vtt 1KB
- 2. IAM Essentials/1. Section Introduction.vtt 1KB
- 6. Monitoring/1. Section Introduction.vtt 1KB
- 3. Identities/1. Section Introduction.vtt 1008B
- 5. Testing and Troubleshooting/5. Section Review.vtt 977B
- 4. Access Management/1. Section Introduction.vtt 812B
- 5. Testing and Troubleshooting/1. Section Introduction.vtt 696B