Add Your Heading Text Here


Introduction to AWS IAM

Identity and Access Management (IAM) is the key aspect of securing workloads and services on AWS. You need to know your way around IAM in order to understand AWS in-depth. However, attackers often target Amazon IAM when they launch an offensive against cloud-native apps.В 

This Amazon IAM course is an introductory deep-dive into access management in AWS and how you can leverage IAM in User, Group, Role and Policy Management in AWS. The class begins with an introduction to the fundamentals of Amazon IAM. Subsequently, we’ll be looking at a practical exploration of User Management, Group Management and Role Management.В 

Finally, we’ll be diving deep into IAM Policy in AWS, where we’ll be doing hands-on exercises with a bunch of different Policy Patterns, Conditions and scenarios. All of these labs across our modules feature intuitive, step-by-step instructions that simplify complex concepts and make it easier to map theoretical knowledge to practical skills.

Our learning material is backed by years of security testing experience, knowledge, and original research across our entire security team. This course uses practical learning with labs and exercises extensively, with the aim of helping you gain a detailed knowledge of access management in AWS.

Try for freeExplore AWS Security
Proficiency Beginner
Audience Cloud Security
Lessons​ 35
Cloud Labs​ 5
  • AWS - IAM 101
    • IAM-Introduction
    • IAM-Terminologies
    • Understanding-IAM
  • AWS - IAM Users

    Create IAM Users

  • IAM-Groups

    Create IAM Group

  • AWS - IAM Policy
    • IAM-Policy-Examples
    • IAM-Policy-Conditional-Policy
  • AWS - IAM Role

    Create and Attach Role

  • AWS - IAM Permission Boundary

    AWS – IAM Permission Boundary

  • AWS - Security Hygiene

    AWS – Security Hygiene

  • Creating AWS IAM Users
  • Creating an AWS IAM Group
  • Creating a General Policy in AWS IAM
  • Creating a NotResource Policy in AWS IAM
  • Understanding IAM Conditional Policy
  • Creating and Attaching Role in AWS IAM
  • Permission Boundaries for IAM Entities
Get startedExplore AWS Security