5. Testing and Troubleshooting/2. Using the Policy Simulator.mp4 99.6 MB
2. IAM Essentials/7. Discovering the AWS Management Console.mp4 97.5 MB
4. Access Management/9. Controlling Access via Tags.mp4 91.9 MB
3. Identities/2. Creating and Managing Individual IAM Users.mp4 91.1 MB
4. Access Management/11. Limiting Privileged User Access by Setting Permissions Boundaries in AWS IAM/2. Limiting Privileged User Access by Setting Permissions Boundaries in AWS IAM - Solution.mp4 88.8 MB
1. Introduction/1. Course Introduction and About the Training Architect.mp4 88.8 MB
4. Access Management/8. Giving an Amazon Web Services (AWS) Lambda Function access to an Amazon DynamoDB Table via an Execution Role/2. Solution Video.mp4 84.5 MB
2. IAM Essentials/8. Exploring Programmatic Access.mp4 84.4 MB
4. Access Management/4. Managing AWS IAM User Permissions Using Groups and Policies/2. Solution: Managing AWS IAM User Permissions Using Groups and Policies.mp4 58.3 MB
6. Monitoring/2. Tracking the Lifecycle of Passwords and Access Keys.mp4 56.8 MB
6. Monitoring/5. Monitoring, Auditing, and Logging Users and Resource Usage in AWS IAM/2. Monitoring, Auditing, and Logging Users and Resource Usage in AWS IAM - Solution .mp4 54.6 MB
6. Monitoring/4. Logging Access to Resources.mp4 44.5 MB
2. IAM Essentials/4. Understanding the Root User .mp4 40.7 MB
2. IAM Essentials/5. Exploring IAM in the Real World .mp4 40.1 MB
4. Access Management/5. Preventing Deletion of an Amazon S3 Bucket Using a Resource Based Policy/2. Preventing Deletion of an Amazon S3 Bucket Using a Resource-Based Policy - Solution.mp4 39.4 MB
2. IAM Essentials/6. Understanding What Causes Bad Things to Happen.mp4 34.0 MB
6. Monitoring/1. Section Introduction.mp4 32.2 MB
2. IAM Essentials/1. Section Introduction.mp4 32.1 MB
3. Identities/1. Section Introduction.mp4 29.5 MB
5. Testing and Troubleshooting/4. Troubleshooting and Resolving AWS IAM Errors/2. Troubleshooting and Resolving AWS IAM Errors - Solution.mp4 25.1 MB
5. Testing and Troubleshooting/1. Section Introduction.mp4 22.7 MB
2. IAM Essentials/9. Section Review.mp4 22.6 MB
6. Monitoring/5. Monitoring, Auditing, and Logging Users and Resource Usage in AWS IAM/1. Monitoring, Auditing, and Logging Users and Resource Usage in AWS IAM - Introduction.mp4 21.2 MB
4. Access Management/4. Managing AWS IAM User Permissions Using Groups and Policies/1. Introduction: Managing AWS IAM User Permissions Using Groups and Policies.mp4 16.1 MB
4. Access Management/8. Giving an Amazon Web Services (AWS) Lambda Function access to an Amazon DynamoDB Table via an Execution Role/1. Introduction Video.mp4 15.7 MB
5. Testing and Troubleshooting/4. Troubleshooting and Resolving AWS IAM Errors/1. Troubleshooting and Resolving AWS IAM Errors - Introduction .mp4 13.8 MB
4. Access Management/11. Limiting Privileged User Access by Setting Permissions Boundaries in AWS IAM/1. Limiting Privileged User Access by Setting Permissions Boundaries in AWS IAM - Introduction.mp4 13.3 MB
3. Identities/5. Section Review.mp4 13.1 MB
5. Testing and Troubleshooting/5. Section Review.mp4 9.9 MB
4. Access Management/5. Preventing Deletion of an Amazon S3 Bucket Using a Resource Based Policy/1. Preventing Deletion of an Amazon S3 Bucket Using a Resource-Based Policy - Introduction.mp4 9.0 MB
2. IAM Essentials/1620184683379-IAM-Mind Map.png 2.5 MB
5. Testing and Troubleshooting/4. Troubleshooting and Resolving AWS IAM Errors/troubleshooting_diagram.png 304.7 kB
4. Access Management/4. Managing AWS IAM User Permissions Using Groups and Policies/Groups_and_Policies_Diagram.png 265.0 kB
6. Monitoring/5. Monitoring, Auditing, and Logging Users and Resource Usage in AWS IAM/monitoring_lab.png 254.7 kB
4. Access Management/11. Limiting Privileged User Access by Setting Permissions Boundaries in AWS IAM/Permissions_Boundaries_Diagram.png 248.3 kB
4. Access Management/8. Giving an Amazon Web Services (AWS) Lambda Function access to an Amazon DynamoDB Table via an Execution Role/Lambda_Execution_Role.png 217.7 kB
4. Access Management/5. Preventing Deletion of an Amazon S3 Bucket Using a Resource Based Policy/Bucket_Policy_Diagram.png 174.8 kB
5. Testing and Troubleshooting/3. Exploring Common Errors and Resolutions.vtt 14.6 kB
3. Identities/2. Creating and Managing Individual IAM Users.vtt 13.1 kB
4. Access Management/9. Controlling Access via Tags.vtt 11.7 kB
6. Monitoring/5. Monitoring, Auditing, and Logging Users and Resource Usage in AWS IAM/2. Monitoring, Auditing, and Logging Users and Resource Usage in AWS IAM - Solution .vtt 10.2 kB
4. Access Management/8. Giving an Amazon Web Services (AWS) Lambda Function access to an Amazon DynamoDB Table via an Execution Role/2. Solution Video.vtt 9.1 kB
2. IAM Essentials/7. Discovering the AWS Management Console.vtt 8.6 kB
4. Access Management/4. Managing AWS IAM User Permissions Using Groups and Policies/2. Solution: Managing AWS IAM User Permissions Using Groups and Policies.vtt 7.1 kB
4. Access Management/4. Managing AWS IAM User Permissions Using Groups and Policies/metadata.md 7.0 kB
2. IAM Essentials/3. Exploring Key Components and Terms.vtt 6.6 kB
4. Access Management/11. Limiting Privileged User Access by Setting Permissions Boundaries in AWS IAM/metadata.md 6.6 kB
3. Identities/4. Understanding Groups.vtt 6.5 kB
2. IAM Essentials/4. Understanding the Root User .vtt 6.3 kB
4. Access Management/8. Giving an Amazon Web Services (AWS) Lambda Function access to an Amazon DynamoDB Table via an Execution Role/metadata.md 6.1 kB
2. IAM Essentials/8. Exploring Programmatic Access.vtt 5.9 kB
5. Testing and Troubleshooting/2. Using the Policy Simulator.vtt 5.7 kB
6. Monitoring/2. Tracking the Lifecycle of Passwords and Access Keys.vtt 5.5 kB
5. Testing and Troubleshooting/4. Troubleshooting and Resolving AWS IAM Errors/metadata.md 5.2 kB
2. IAM Essentials/5. Exploring IAM in the Real World .vtt 4.9 kB
4. Access Management/5. Preventing Deletion of an Amazon S3 Bucket Using a Resource Based Policy/2. Preventing Deletion of an Amazon S3 Bucket Using a Resource-Based Policy - Solution.vtt 4.8 kB
4. Access Management/5. Preventing Deletion of an Amazon S3 Bucket Using a Resource Based Policy/metadata.md 4.8 kB
6. Monitoring/5. Monitoring, Auditing, and Logging Users and Resource Usage in AWS IAM/1. Monitoring, Auditing, and Logging Users and Resource Usage in AWS IAM - Introduction.vtt 4.8 kB
6. Monitoring/4. Logging Access to Resources.vtt 4.2 kB
7. Conclusion/1. Conclusion and What’s Next.vtt 4.0 kB
2. IAM Essentials/6. Understanding What Causes Bad Things to Happen.vtt 3.9 kB
6. Monitoring/5. Monitoring, Auditing, and Logging Users and Resource Usage in AWS IAM/metadata.md 3.9 kB
4. Access Management/8. Giving an Amazon Web Services (AWS) Lambda Function access to an Amazon DynamoDB Table via an Execution Role/1. Introduction Video.vtt 3.5 kB
5. Testing and Troubleshooting/4. Troubleshooting and Resolving AWS IAM Errors/2. Troubleshooting and Resolving AWS IAM Errors - Solution.vtt 3.5 kB
4. Access Management/4. Managing AWS IAM User Permissions Using Groups and Policies/1. Introduction: Managing AWS IAM User Permissions Using Groups and Policies.vtt 3.3 kB
4. Access Management/5. Preventing Deletion of an Amazon S3 Bucket Using a Resource Based Policy/1. Preventing Deletion of an Amazon S3 Bucket Using a Resource-Based Policy - Introduction.vtt 3.1 kB
1. Introduction/1. Course Introduction and About the Training Architect.vtt 3.1 kB
4. Access Management/11. Limiting Privileged User Access by Setting Permissions Boundaries in AWS IAM/1. Limiting Privileged User Access by Setting Permissions Boundaries in AWS IAM - Introduction.vtt 2.7 kB
5. Testing and Troubleshooting/4. Troubleshooting and Resolving AWS IAM Errors/1. Troubleshooting and Resolving AWS IAM Errors - Introduction .vtt 2.6 kB