• Online, Self-Paced
Course Description

Learners will discover how to apply best practices to the new Amazon Web Services (AWS) root account and examine credentials, passwords, and access key usage in this 8-video course. Identity and Access Management (IAM) topics such as users, groups, roles, and managed policies are also covered. The first tutorial examines root account security, which leads to comparing credentials, passwords, and access keys and their use. Next, you will learn about using the AWS command-line interface (CLI), a unified tool that allows you to manage your various AWS Services through a CLI. An important best practice to learn is using a bastion host, also known as a bastion server or a jump host, whose purpose is to give access to private networks from external networks, such as the Internet. Continue with an introduction to the AWS IAM service and its configuration. The final tutorial looks at managed policies available through the IAM service. In the exercise, you will be asked to describe root account security, credentials, AWS CLI, bastions, and AWS IAM.

Learning Objectives

{"discover the key concepts covered in this course"}

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cyber Defense Infrastructure Support
  • Cybersecurity Management
  • Network Services
  • Risk Management
  • Systems Development

Feedback

If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.