Skip to Content

WATCH NOW​

AWS SECURITY, IDENTITY & COMPLIANE

AWS Identity and Access Management (IAM)

  1. What Is AWS IAM | Introduction & Overview |  AWS Services
  2. What Is AWS IAM Users And Groups | AWS Services
  3. How To Create AWS IAM Users and Groups | Hands-On
  4. What Is AWS IAM Roles For AWS Services | AWS Services
  5. How To Create AWS IAM Roles For AWS Services | Hands-On
  6. What Is AWS IAM Policies | AWS IAM Permission | AWS Services
  7. How to Add AWS IAM Policies | Inline & AWS Managed | Hands-On
  8. AWS IAM Resource Based And IAM Roles Policies | AWS Full Course in Bangla
  9. What Is AWS IAM Multi Factor Authentication (MFA) | AWS Full Course in Bangla
  10. How To Configure AWS IAM Multi Factor Authentication (MFA) | Hands-On
  11. What Is AWS IAM Security Tools | AWS IAM | AWS Full Course in Bangla
  12. How To Level Up With AWS IAM Security Tools | AWS Services | Hands On
  13. What Is AWS Organizations | AWS IAM | AWS Services
  14. How To Create AWS Organization Delete & Add Account | Hands-On
  15. What Is AWS IAM Identity Center And AWS Single Sign-On
  16. How to Setup AWS IAM Identity Center | AWS Single Sign-On | Hands-On
  17. What Is AWS Directory Service | Microsoft AD | Simple AD | AD Connector
  18. How To Create & Configure AWS Directory Services | Hands-On
  19. What Is AWS IAM Best Practices | AWS Services Policies
  20. AWS IAM Summary | IAM Policies | AWS Services | AWS resources

AWS Command Line Interface (AWS CLI)

  1. What Is AWS Access Keys, AWS CLI And AWS SDK
  2. How To AWS CLI Setup on Windows | Hands-On
  3. How To AWS CLI Setup on Mac OS  | Hands-On
  4. How To AWS CLI Setup on Linux | Hands-On
  5. How To Create Access Key & Configure AWS CLI | Hands-On
  6. How To AWS CloudShell Setup On AWS Management Console | Hands-On


AWS Identity and Access Management (IAM)

Understanding the fundamentals of AWS Identity and Access Management (IAM) is the very first step toward building a secure cloud environment. This section of the AWS IAM Full Course in Bangla is tailored to walk beginners through the core building blocks of IAM, such as users, groups, and roles, with clear definitions and practical use cases.

If you're preparing for the AWS Certified Solutions Architect – Associate (SAA-C03) or working in DevOps, mastering these concepts is essential. IAM controls who can access your AWS services, how they authenticate, and what actions they’re allowed to perform. The first five lessons in this series cover everything from IAM basics to hands-on user and role creation.

Each video is explained in Bangla, ensuring that Bengali-speaking learners can confidently understand and apply AWS IAM in real-world scenarios. From theoretical breakdowns to real AWS console walkthroughs, you’ll be able to design identity strategies, enforce permissions, and prepare for deeper IAM tools and configurations

What Is AWS IAM | Introduction & Overview | AWS Services

In this introductory video, you will learn about AWS IAM (Identity and Access Management), a crucial service for securely managing access to your AWS resources. IAM helps ensure that only authorized users and services can perform specific tasks on your resources. This video explains IAM's core components, including users, groups, roles, and policies, and how they work together to enforce a secure environment for your cloud infrastructure.

IAM is foundational for implementing the principle of least privilege, ensuring that users and services only have the access they need. You'll also learn how to manage permissions, track actions, and apply security best practices for AWS services. Whether you're just starting with AWS or looking to improve your security practices, this video offers a comprehensive overview of IAM that will lay the groundwork for more advanced IAM topics. By understanding IAM, you'll be able to configure security measures more effectively and reduce the risk of unauthorized access.

🎥 Click to Watch Now

What Is AWS IAM Users And Groups | AWS Services

IAM Users and Groups are fundamental to managing access in AWS. This video takes an in-depth look at these key components of AWS IAM, showing how to create and manage users and groups to streamline your security setup. We’ll explore how users represent individuals or services, while groups provide a way to manage permissions for multiple users simultaneously.

Creating groups allows for efficient management of access, as you can assign permissions to a group rather than managing individual users. This video also covers best practices for organizing users into groups based on their roles, such as admins, developers, or read-only users. You'll learn how to use IAM policies to manage access, ensuring users only have the necessary permissions for their tasks. This session is a critical skill for efficiently scaling your AWS access management while keeping your resources secure.

🎥 Click to Watch Now

How To Create AWS IAM Users and Groups | Hands-On

This hands-on tutorial walks you through the process of creating IAM Users and Groups in AWS. You will learn the step-by-step process of adding new IAM users, assigning them to groups, and defining their permissions. We’ll also dive into IAM policies and how they control user access to AWS resources, ensuring users only have the permissions they need.

The tutorial explains how to create a new user, assign group memberships, and apply specific policies for controlling access. With this hands-on experience, you will become proficient in managing users and groups in your AWS environment, gaining essential skills for any cloud security setup. You’ll also learn best practices to make sure your users are organized, and your access control remains simple yet effective.

🎥 Click to Watch Now

What Is AWS IAM Roles For AWS Services | AWS Services

IAM Roles in AWS provide a way to delegate permissions to AWS services and users temporarily, allowing for secure, short-term access. In this video, we will discuss what IAM roles are, how they differ from IAM users and groups, and why they are essential for controlling access to AWS services like EC2, Lambda, and S3.

You’ll learn how IAM roles allow you to assign permissions to AWS services, eliminating the need to create permanent user accounts for services that need temporary access. The session also includes practical use cases, such as cross-account access and role-based access to specific AWS resources. This video is critical for anyone looking to improve security by using IAM roles for controlled and temporary access.

🎥 Click to Watch Now

How To Create AWS IAM Roles For AWS Services | Hands-On

In this hands-on video, you’ll learn how to create IAM roles for AWS services like EC2, Lambda, and S3. The tutorial shows you how to configure IAM roles with appropriate permissions to grant temporary access to your services and instances. You will also learn how to attach these roles to AWS resources, ensuring that services have the necessary permissions without creating permanent user accounts.

By following along with the tutorial, you’ll gain practical experience with IAM roles and understand how to use them effectively to delegate permissions in a secure and manageable way. This video is perfect for anyone who wants to master IAM roles in AWS and ensure that services can securely access resources when needed.

🎥 Click to Watch Now

What Is AWS IAM Policies | AWS IAM Permission | AWS Services

IAM Policies are the key to controlling access permissions within AWS. This video explores the different types of IAM policies, including managed policies and inline policies, and how to use them to grant or restrict access to AWS services and resources. You will also learn how to create your own custom IAM policies to meet specific access requirements for your users and services.

We’ll explain how policies are attached to users, groups, and roles, and how they help you implement the principle of least privilege by ensuring that users have only the access they need. This session is perfect for anyone looking to understand how IAM policies work and how to use them to create a secure, well-managed access control system in AWS.

🎥 Click to Watch Now

How to Add AWS IAM Policies | Inline & AWS Managed | Hands-On

In this hands-on session, you will learn how to add IAM policies to users, groups, and roles. The video explains the difference between inline policies and AWS-managed policies, and how to apply each to ensure secure access management. You'll see how to apply policies for real-world use cases, such as EC2 access and S3 bucket permissions.

The session also covers best practices for scaling IAM policy management, ensuring your policies are flexible and easy to maintain across a growing AWS environment. By the end of this tutorial, you'll have the skills to manage AWS access control using IAM policies efficiently and securely.

🎥 Click to Watch Now

AWS IAM Resource Based And IAM Roles Policies | AWS Full Course in Bangla

In this session, we focus on resource-based policies and their relationship with IAM roles in AWS. Learn how to secure access to AWS resources such as S3 buckets, Lambda functions, and DynamoDB tables by setting policies directly on the resources. This allows for fine-grained control over who can access and perform actions on specific resources.

You will also learn how resource-based policies interact with identity-based policies and when to use each in different scenarios. By the end of this session, you’ll understand how to apply both resource-based and identity-based policies to effectively secure your cloud resources.

🎥 Click to Watch Now

What Is AWS IAM Multi Factor Authentication (MFA) | AWS Full Course in Bangla

Multi-Factor Authentication (MFA) is one of the most effective security measures to protect your AWS accounts. In this video, you’ll learn what MFA is, how it enhances the security of AWS IAM, and why it’s essential to add an extra layer of protection to your accounts. MFA ensures that even if an attacker gains access to a password, they cannot access the account without the second authentication factor.

The session covers how to set up virtual MFA devices like smartphone apps and hardware MFA devices, as well as best practices for enabling MFA across your organization. This video is a must-watch for anyone looking to protect their AWS environment from unauthorized access.

🎥 Click to Watch Now

How To Configure AWS IAM Multi Factor Authentication (MFA) | Hands-On

In this hands-on tutorial, you'll learn how to set up MFA for your AWS IAM accounts, step by step. We will guide you through configuring virtual MFA devices (like Google Authenticator) and hardware MFA tokens to add an extra layer of protection to your AWS accounts.

This video ensures you understand how to secure your AWS environment effectively by implementing MFA, safeguarding your accounts and resources from unauthorized access. By the end of the video, you'll have the practical skills to enable MFA for your AWS IAM users and significantly enhance the security of your cloud infrastructure.

🎥 Click to Watch Now

What Is AWS IAM Security Tools | AWS IAM | AWS Full Course in Bangla

In this video, we dive into AWS IAM Security Tools, which are essential for enhancing the security of your AWS environment. IAM security tools help you manage access control, enforce policies, and protect your AWS resources from unauthorized access.

We cover the various tools and services offered by AWS to secure your identity and access management setup. You'll learn about AWS Key Management Service (KMS), AWS CloudTrail, and AWS Config, and how they integrate with IAM for logging, monitoring, and auditing your environment. Additionally, we explore IAM Access Analyzer, which helps identify potential security risks by analyzing resource-based policies.

IAM security tools help implement least privilege access and enforce compliance with security standards, making them a must-have in your cloud security toolkit. This session is designed to help you get familiar with the various security features in AWS IAM and their practical applications to safeguard your cloud environment.

By understanding and utilizing these security tools, you can not only prevent potential vulnerabilities but also improve your cloud architecture’s compliance and overall security posture. It’s crucial for both cloud security professionals and AWS users to stay up-to-date with the best practices in IAM security.

🎥 Click to Watch Now

How To Level Up With AWS IAM Security Tools | AWS Services | Hands On

Leveling up your AWS IAM security is an ongoing process, and in this video, we show you how to use AWS IAM security tools to their fullest potential. This hands-on tutorial dives deep into advanced IAM security features such as IAM Access Analyzer, AWS CloudTrail, and AWS Config.

You’ll see how to utilize these tools to continuously monitor and track security-related events, ensuring that you’re always aware of any suspicious activities in your environment. Learn how to audit your policies, track changes in permissions, and identify security misconfigurations. This video also covers the integration of IAM with AWS’s Security Hub, providing a centralized view of your security alerts and compliance status.

By the end of this video, you will have the skills to implement and fine-tune IAM security tools to protect your AWS resources effectively. These tools are not only essential for large-scale enterprise environments but also crucial for anyone looking to ensure the highest security standards in their cloud architecture.

This session empowers you to make security a priority and will prepare you to handle real-world IAM security challenges.

🎥 Click to Watch Now

What Is AWS Organizations | AWS IAM | AWS Services

AWS Organizations allows you to manage multiple AWS accounts within a single organization, providing centralized management and governance for all your accounts. This service is essential for businesses that manage several AWS accounts and need to streamline access control, billing, and policy enforcement.

In this video, we walk you through the basics of AWS Organizations and how it integrates with AWS IAM to provide centralized control over permissions, access, and compliance. You’ll learn how to create and manage organizational units (OUs), apply service control policies (SCPs), and manage consolidated billing across multiple accounts.

AWS Organizations allows you to automate account creation, manage user access across accounts, and create hierarchical structures within your organization to delegate administration responsibilities. By using AWS Organizations, you can enforce consistent security practices, manage access across accounts, and maintain centralized control over your entire AWS environment. This video is key for anyone looking to scale their AWS infrastructure while keeping it secure and organized.

🎥 Click to Watch Now

How To Create AWS Organization Delete & Add Account | Hands-On

This hands-on video demonstrates how to manage your AWS accounts within AWS Organizations, including creating new accounts, adding them to your organization, and deleting accounts that are no longer needed. You'll learn how to streamline the management of multiple accounts, set up billing relationships, and apply organizational policies across your entire environment.

The tutorial walks you through the process of setting up organizational units (OUs), adding accounts to these units, and ensuring your billing setup is efficient and accurate. Additionally, we explore the deletion process for unused accounts and best practices for maintaining an optimized account structure.

By mastering these tasks, you’ll be able to manage AWS accounts effectively across your organization, ensuring consistency, security, and cost optimization. This practical knowledge will enable you to scale your cloud infrastructure with ease, ensuring that you're equipped to manage complex multi-account AWS environments.

🎥 Click to Watch Now

What Is AWS IAM Identity Center And AWS Single Sign-On

AWS IAM Identity Center and AWS Single Sign-On (SSO) provide centralized access management across multiple AWS accounts and business applications. In this video, we explain how these services work and why they’re important for managing user access securely and efficiently.

You’ll learn how AWS SSO integrates with IAM Identity Center to allow users to authenticate once and access various AWS services and third-party applications. This integration eliminates the need for managing multiple credentials, making it easier to enforce security best practices such as multi-factor authentication (MFA) and least privilege access.

This session is essential for IT administrators, security professionals, and anyone managing user access in large AWS environments. It provides a comprehensive guide to simplifying access management, improving security, and enhancing the overall user experience.

🎥 Click to Watch Now

How to Setup AWS IAM Identity Center | AWS Single Sign-On | Hands-On

In this hands-on video, we guide you through the process of setting up AWS IAM Identity Center and AWS Single Sign-On. Learn how to configure identity sources, link your corporate directory or use AWS SSO, and grant users access to AWS resources and external applications.

This tutorial provides step-by-step instructions for enabling SSO, assigning permissions, and ensuring that users can access the resources they need without multiple login credentials. The hands-on approach helps you follow along as we show you the configuration process in real-time.

By the end of this session, you'll be able to configure AWS SSO, manage user access across your AWS environment, and streamline authentication for improved security and efficiency.

🎥 Click to Watch Now

What Is AWS Directory Service | Microsoft AD | Simple AD | AD Connector

AWS Directory Service offers a managed service that enables you to set up and run Microsoft Active Directory (AD) in the AWS Cloud. This video introduces you to the different types of directories that AWS offers, including AWS Managed Microsoft AD, Simple AD, and AD Connector.

You’ll learn how each directory type works, how to choose the right one for your use case, and how to integrate your existing on-premises directory with AWS. We also cover best practices for directory synchronization, user management, and resource access control.

AWS Directory Service allows you to use existing Active Directory-based applications while managing users, groups, and policies in the cloud. Additionally, we’ll walk you through how to set up a trust relationship between AWS and your on-premises directory, so you can create a hybrid IT environment with seamless user authentication.

This is a must-watch session for anyone looking to implement a cloud directory solution or extend their on-premises AD to AWS. With AWS Directory Service, you can securely manage user identities, simplify access control, and ensure consistent policy enforcement across your AWS infrastructure.

🎥 Click to Watch Now

How To Create & Configure AWS Directory Services | Hands-On

In this hands-on video, we guide you through the step-by-step process of creating and configuring AWS Directory Services. This tutorial is perfect for anyone looking to set up a directory in AWS, whether you are using AWS Managed Microsoft AD, Simple AD, or AD Connector.

You’ll learn how to create directories, configure network settings, and integrate with your AWS resources such as EC2 instances, RDS databases, and other AWS services. The video also covers how to manage user access, set up permissions, and configure group policies for managing large numbers of users.

We dive deep into best practices for directory management, providing you with the knowledge needed to ensure your directory is secure, scalable, and properly configured to work with other AWS services. Whether you're migrating to the cloud or building a new cloud infrastructure, this hands-on session will give you the tools to manage your users and resources effectively.

By the end of the video, you’ll be confident in your ability to create, configure, and manage AWS Directory Services as part of your cloud infrastructure.

🎥 Click to Watch Now

What Is AWS IAM Best Practices | AWS Services Policies

Adopting the best practices for AWS IAM is critical to ensuring the security and proper management of your AWS resources. In this video, we explore the top IAM best practices that help you minimize security risks and manage user access effectively in AWS environments.

Key best practices include applying the principle of least privilege, using groups and roles for managing permissions, and implementing multi-factor authentication (MFA) for sensitive operations. Additionally, we cover the importance of using IAM policies to control access to AWS resources, including how to use AWS managed policies and create custom policies based on your security requirements.

This session also covers the importance of auditing IAM roles, setting up password policies, and logging access with AWS CloudTrail to track changes and monitor usage. These best practices are essential for ensuring your AWS environment is secure, compliant, and easy to manage, especially as your infrastructure grows.

Ideal for security professionals, cloud administrators, and anyone managing AWS environments, this video provides practical insights to help you implement IAM best practices and improve your cloud security posture.

🎥 Click to Watch Now

AWS IAM Summary | IAM Policies | AWS Services | AWS resources

In this comprehensive summary video, we wrap up everything you've learned about AWS IAM, covering key concepts such as IAM users, groups, roles, and policies, along with best practices for securing your AWS environment.

We provide a complete overview of IAM’s core components, including how policies govern access to AWS resources, how IAM roles can be used to delegate permissions, and the importance of least privilege access. Additionally, we summarize how to apply multi-factor authentication (MFA), set up password policies, and leverage AWS Managed Policies to make your IAM setup more streamlined and secure.

This video also highlights advanced topics like IAM Access Analyzer, resource-based policies, and how to manage cross-account access using IAM roles. By combining these insights with real-world examples and best practices, you will have the knowledge to implement IAM effectively in your organization, secure your AWS resources, and ensure compliance.

If you’ve been following our IAM series, this video provides a valuable recap, reinforcing the most important takeaways for managing AWS identities and permissions effectively.

🎥 Click to Watch Now

In this comprehensive IAM series, we’ve covered the full spectrum of AWS Identity and Access Management (IAM), from basic concepts to advanced security tools. Whether you're setting up IAM roles, integrating MFA, managing AWS organizations, or enforcing best practices, the videos provide clear, actionable guidance for cloud administrators, security professionals, and AWS learners.

By understanding IAM’s core components, such as users, groups, roles, and policies, you can ensure your AWS environment remains secure, efficient, and compliant. Additionally, implementing IAM best practices and leveraging tools like AWS IAM Security Tools and IAM Identity Center will help streamline your identity and access management efforts while enhancing overall security.

By applying the knowledge gained from these videos, you’ll be better equipped to manage users and permissions, secure your cloud infrastructure, and optimize your AWS environment for maximum efficiency and compliance.

------

AWS Command Line Interface (AWS CLI)

This section explores AWS Access Management Tools, including Access Keys, AWS CLI, AWS SDK, and AWS CloudShell — the core tools developers and DevOps engineers use to interact with AWS outside of the console. These videos provide beginner-to-advanced coverage of configuring AWS CLI on Windows, Mac, and Linux, as well as securely generating and managing access keys. You’ll also explore AWS CloudShell, a browser-based CLI tool built right into the AWS Management Console.

If you're learning to automate AWS tasks, run scripts, manage resources remotely, or integrate with SDKs — this module is your essential starting point.

What Is AWS Access Keys, AWS CLI And AWS SDK

In this foundational video, get introduced to three key components of AWS access management: Access Keys, the AWS CLI, and the AWS SDK. Learn how each tool is used to interact programmatically with AWS services — whether you're writing automation scripts, running terminal commands, or integrating AWS into an application.

The video explains how access keys are generated, how the AWS CLI enables command-line interactions, and how AWS SDKs support different programming languages like Python (Boto3), Java, and Node.js for building AWS-based applications. Understand the difference between temporary and permanent credentials and when to use each for security.

If you're a beginner trying to understand the core tools for managing AWS environments through scripting or code — this is the perfect place to start.

🎥 Click to Watch Now

How To AWS CLI Setup on Windows – Hands-On

Want to use the AWS CLI on Windows? This hands-on video shows you exactly how to download, install, and configure the AWS Command Line Interface on a Windows operating system. From environment setup to basic commands, this tutorial is perfect for beginners.

You’ll learn how to verify your installation, add environment variables, generate access keys from the AWS Console, and configure your CLI using aws configure. We also walk through running test commands like listing S3 buckets or checking your IAM identity.

By the end of this session, you’ll be ready to automate AWS tasks right from your Windows terminal — a powerful tool for developers, cloud engineers, and DevOps teams.

🎥 Click to Watch Now

How To AWS CLI Setup on Mac OS – Hands-On

This tutorial walks Mac users through setting up the AWS CLI on macOS. Whether you’re a developer or student, this step-by-step video covers downloading the AWS CLI, verifying installation via terminal, and securely configuring access credentials using your access key and secret.

You’ll also learn how to add AWS CLI to your PATH and test it with simple commands like listing your AWS account identity. The tutorial emphasizes best practices such as keeping access keys secure and using named profiles for multiple AWS accounts.

A great guide for Apple users looking to leverage command-line tools for AWS automation and development workflows.

🎥 Click to Watch Now

How To AWS CLI Setup on Linux – Hands-On

Running AWS from a Linux terminal? This video is for you. Learn how to set up the AWS CLI on Linux, configure your credentials, and begin executing AWS commands directly from the command line. The session covers Debian/Ubuntu-based installation, configuration using aws configure, and testing with IAM and S3 CLI commands.

It’s a practical guide perfect for Linux admins, DevOps practitioners, or anyone running headless setups in cloud environments. Security tips for managing access keys and configuring AWS profiles are also included.

🎥 Click to Watch Now

How To Create Access Key & Configure AWS CLI – Hands-On

Before you can run AWS CLI commands, you’ll need valid Access Keys and a properly configured AWS CLI setup. This hands-on guide walks you through generating IAM access keys and configuring your terminal using aws configure.

You'll learn where to find access keys in the AWS Management Console, how to handle them securely, and why rotating keys regularly is critical. We’ll also demonstrate simple commands to validate your CLI setup and access AWS resources programmatically.

This video is perfect for beginners who want real hands-on practice working with AWS CLI and IAM access credentials securely.

🎥 Click to Watch Now

How To AWS CloudShell Setup On AWS Management Console – Hands-On

AWS CloudShell is a game-changing browser-based shell integrated into the AWS Management Console. In this video, you’ll learn how to launch and use AWS CloudShell without needing to install any local tools or configure access keys manually.

The tutorial explains how CloudShell automatically authenticates with your AWS account, allows direct command-line interaction with services like S3, EC2, and CloudWatch, and supports pre-installed developer tools. It’s ideal for learners who want to try AWS CLI quickly without complex setups.

A great productivity booster — especially for those who want a fast, browser-based terminal with full AWS access.

🎥 Click to Watch Now

This set of tutorials gives you complete coverage of AWS command-line and SDK access options. You learned how to set up and use AWS CLI across all operating systems, generate access keys securely, and understand how the SDK and CloudShell enhance your ability to automate and script AWS operations.

Mastering these tools gives you greater control, flexibility, and scalability in managing cloud resources — a critical skill set for every cloud engineer, developer, or DevOps professional. Ready to supercharge your AWS workflow? These lessons set the perfect foundation.