AWS: Authentication and Authorization mechanisms-Introduction to AWS: Security in Data Analytics.
Course Outline
Welcome to the Course
AWS: Authentication and Authorization mechanisms Overview
Domain introduction
()
Select appropriate authentication and authorization mechanisms Part 1
()
Select appropriate authentication and authorization mechanisms Part 2
()
AWS: Authentication and Authorization mechanisms-IAM Permissions
IAM identity and resource-based permissions Part 1
()
IAM identity and resource-based permissions Part 2
()
AWS: VPCs and Data Protection and Encryption Techniques-Using VPCs
AWS: Authentication and Authorization mechanisms Overview
Using VPCs to isolate your resources Part 1
()
Using VPCs to isolate your resources Part 2
()
Using VPCs to isolate your resources lab
()
AWS: VPCs and Data Protection and Encryption Techniques-Data Protection and Encryption Techniques
Apply data protection and encryption techniques Part 1
()
Apply data protection and encryption techniques Part 2
()
Apply data protection and encryption techniques Part 3
()
Encryption lab
()
AWS: Data Governance and Compliance Controls-Apply Data Governance and Compliance Controls
AWS: Data Governance and Compliance Controls Overview
Apply data governance and compliance controls
()
Domain summary Part 1
()
Domain summary Part 2
()
Summary of the 5 domains Part 1
()
Summary of the 5 domains Part 2
()
Exam Day Tips
()
Course Conclusion
Key Takeaways of the course