Women in AWSome:Be Visible

Meet Core leader Women Group
Hello to all a short intro about myself.
• System Administrator (Linux & Win)
• Cisco Network Engr
• Python user
• DevOps Engr (Cloud)
• Certified Ethical Hacker v8.0
• Certified PCI DSS Implementor V3.0
• IT System Auditor
“I am a proud batanguena” joined Conduent as Information Security Analyst, Lead She loves to
read, dance and yoga during free time.
Meet the AWS UG PH Women Community
(Manila and Cebu 2017-2018]
AWS Users Group Community
Key take ways
Part 1 : AWS Asian Women
Community increase
participation.
Part 2 :AWS Cloud IAM
(basics) our daily life.
AWS User groups are peer-to-peer
communities
Why women in I.T skeptical to participate in peer
to peer community based group?
Why women in I.T skeptical to participate in
peer to peer community based group?
Why women in I.T skeptical to participate in peer to
peer community based group?
AWS Asian Women: Increase Women
in I.T roles & Visibility
 Comfort ability of
training
 work setting
 make a career in
technology more
attainable
 inspirational - goal
AWS Asian Women: workforce in Cloud
security
Picture : credit to Udemy
Value Women in workforce : Cloud security
 Directions in Information Security
 Operation practices and priorities of security organization.
 Able to do things from multiple perspective
 drive to align Security with business strategy.
Ways to help us visible group community?
 > Do you have a clear understandingof the
roles and what they require as skills to be hire able?
 > What can you offer to the company, as
added value?
 > What are the skills that you can reuse
from your previous career?
“With ordinary talent and extra-ordinary
perseverance All things are attainable.”
Thomas Fawell Buston
Hire able = Skills set + Certification+ level of
experience
AWS Women’s Group Community
PEER-TO-PEER COMMUNITIES which meet regularly
 to share ideas
 Answer users community questions
 learn about new AWS services and best
practices.
Part 2 : Cloud Security IAM in daily
life
Part 2 : Cloud Security IAM in daily life
Granular permissions * AWS (MFA)
AWS IAM?
How to access AWS IAM?
1. Principal
2. Request
3. Authentication
4. Authorization
5. Actions
6. Resources
The IAM infrastructure
Understanding how IAM works (Basics)
. Principal
action on an AWS resource
allow users and services to assume a role
Request
▸ Actions (or operations)
▸ Resources upon which the actions are
performed
▸ Principal informationAuthentication
 you must be authenticated (signed in to
AWS) to send a request to AWS.
Authenticate from the API or CLI, you
must provide your access key and secret
key
Use MFA
Authorization
▸ By default, all requests are denied.
▸ An explicit allow overrides this
default.
▸ An explicit deny overrides any
allows.
AWS Women’s PH Group – Games to know
AWS Womens Group – Games to know
A __________, is an entity
that can take an action on
an AWS resource.
AWS Womens Group – Games to know
Come and join Women Community
Come and join AWS UG PH Women
Community
1 of 25

Recommended

AWS IAM Tutorial | Identity And Access Management (IAM) | AWS Training Videos... by
AWS IAM Tutorial | Identity And Access Management (IAM) | AWS Training Videos...AWS IAM Tutorial | Identity And Access Management (IAM) | AWS Training Videos...
AWS IAM Tutorial | Identity And Access Management (IAM) | AWS Training Videos...Edureka!
2.1K views18 slides
UAE Microsoft MVPs - How To become Microsoft MVP by
UAE Microsoft MVPs - How To become Microsoft MVPUAE Microsoft MVPs - How To become Microsoft MVP
UAE Microsoft MVPs - How To become Microsoft MVPAmmar Hasayen
386 views24 slides
VijayaNirmala_a_builders_bible_for_authenticating_authorizing_anyservice_anytime by
VijayaNirmala_a_builders_bible_for_authenticating_authorizing_anyservice_anytimeVijayaNirmala_a_builders_bible_for_authenticating_authorizing_anyservice_anytime
VijayaNirmala_a_builders_bible_for_authenticating_authorizing_anyservice_anytimeVijayaNirmalaGopal
132 views36 slides
Busting the Myths to AWS Cloud Adoption_Liam Caskie by
Busting the Myths to AWS Cloud Adoption_Liam CaskieBusting the Myths to AWS Cloud Adoption_Liam Caskie
Busting the Myths to AWS Cloud Adoption_Liam CaskieHelen Rogers
289 views10 slides
Azure Certification AZ-103 | Microsoft Azure Certification | Edureka by
Azure Certification AZ-103 | Microsoft Azure Certification | EdurekaAzure Certification AZ-103 | Microsoft Azure Certification | Edureka
Azure Certification AZ-103 | Microsoft Azure Certification | EdurekaEdureka!
143 views19 slides
Start Up Austin 2017: Serverless Real Time Analytics by
Start Up Austin 2017:  Serverless Real Time AnalyticsStart Up Austin 2017:  Serverless Real Time Analytics
Start Up Austin 2017: Serverless Real Time AnalyticsAmazon Web Services
390 views64 slides

More Related Content

What's hot

Introduction to the Security Perspective of the Cloud Adoption Framework by
Introduction to the Security Perspective of the Cloud Adoption FrameworkIntroduction to the Security Perspective of the Cloud Adoption Framework
Introduction to the Security Perspective of the Cloud Adoption FrameworkAmazon Web Services
193 views16 slides
It’s in my backlog: The truth behind DevSecOps - FND217 - AWS re:Inforce 2019 by
It’s in my backlog: The truth behind DevSecOps - FND217 - AWS re:Inforce 2019 It’s in my backlog: The truth behind DevSecOps - FND217 - AWS re:Inforce 2019
It’s in my backlog: The truth behind DevSecOps - FND217 - AWS re:Inforce 2019 Amazon Web Services
638 views30 slides
Aws security best practices by
Aws security best practicesAws security best practices
Aws security best practicesSundeep Roxx
44.3K views87 slides
Identity and Access Management: The First Step in AWS Security by
Identity and Access Management: The First Step in AWS SecurityIdentity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS SecurityAmazon Web Services
1.7K views47 slides
San Francisco Startup Day - Keynote: Mackenzie Kosut by
San Francisco Startup Day - Keynote: Mackenzie KosutSan Francisco Startup Day - Keynote: Mackenzie Kosut
San Francisco Startup Day - Keynote: Mackenzie KosutAmazon Web Services
739 views47 slides
AWS re:Inforce 2021 re:Cap 1 by
AWS re:Inforce 2021 re:Cap 1 AWS re:Inforce 2021 re:Cap 1
AWS re:Inforce 2021 re:Cap 1 Hayato Kiriyama
990 views88 slides

What's hot(20)

Introduction to the Security Perspective of the Cloud Adoption Framework by Amazon Web Services
Introduction to the Security Perspective of the Cloud Adoption FrameworkIntroduction to the Security Perspective of the Cloud Adoption Framework
Introduction to the Security Perspective of the Cloud Adoption Framework
It’s in my backlog: The truth behind DevSecOps - FND217 - AWS re:Inforce 2019 by Amazon Web Services
It’s in my backlog: The truth behind DevSecOps - FND217 - AWS re:Inforce 2019 It’s in my backlog: The truth behind DevSecOps - FND217 - AWS re:Inforce 2019
It’s in my backlog: The truth behind DevSecOps - FND217 - AWS re:Inforce 2019
Aws security best practices by Sundeep Roxx
Aws security best practicesAws security best practices
Aws security best practices
Sundeep Roxx44.3K views
Identity and Access Management: The First Step in AWS Security by Amazon Web Services
Identity and Access Management: The First Step in AWS SecurityIdentity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS Security
Amazon Web Services1.7K views
San Francisco Startup Day - Keynote: Mackenzie Kosut by Amazon Web Services
San Francisco Startup Day - Keynote: Mackenzie KosutSan Francisco Startup Day - Keynote: Mackenzie Kosut
San Francisco Startup Day - Keynote: Mackenzie Kosut
Privacy, ethics, and engineering in emerging technology - SEP204 - AWS re:Inf... by Amazon Web Services
Privacy, ethics, and engineering in emerging technology - SEP204 - AWS re:Inf...Privacy, ethics, and engineering in emerging technology - SEP204 - AWS re:Inf...
Privacy, ethics, and engineering in emerging technology - SEP204 - AWS re:Inf...
Go-To-Market Strategy (with Amazon): Ryan Kisis by Amazon Web Services
Go-To-Market Strategy (with Amazon): Ryan KisisGo-To-Market Strategy (with Amazon): Ryan Kisis
Go-To-Market Strategy (with Amazon): Ryan Kisis
Amazon Web Services3.4K views
AWS Cloud Storage | Cloud Storage Services | Edureka by Edureka!
AWS Cloud Storage | Cloud Storage Services | EdurekaAWS Cloud Storage | Cloud Storage Services | Edureka
AWS Cloud Storage | Cloud Storage Services | Edureka
Edureka!219 views
Big Data Meets AI - Driving Insights and Adding Intelligence to Your Solutions by Amazon Web Services
 Big Data Meets AI - Driving Insights and Adding Intelligence to Your Solutions Big Data Meets AI - Driving Insights and Adding Intelligence to Your Solutions
Big Data Meets AI - Driving Insights and Adding Intelligence to Your Solutions
Root CA hierarchies for AWS Certificate Manager (ACM) Private CA - FND320 - A... by Amazon Web Services
Root CA hierarchies for AWS Certificate Manager (ACM) Private CA - FND320 - A...Root CA hierarchies for AWS Certificate Manager (ACM) Private CA - FND320 - A...
Root CA hierarchies for AWS Certificate Manager (ACM) Private CA - FND320 - A...
Amazon Web Services1.8K views
Secure Modern Workplace With Microsoft 365 Threat Protection by Ammar Hasayen
Secure Modern Workplace With Microsoft 365 Threat ProtectionSecure Modern Workplace With Microsoft 365 Threat Protection
Secure Modern Workplace With Microsoft 365 Threat Protection
Ammar Hasayen926 views
Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019 by Amazon Web Services
 Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019  Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019
Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019
Amazon Web Services1.2K views
The 1%: Identity and Governance Patterns From the Most Advanced AWS Customers... by Amazon Web Services
The 1%: Identity and Governance Patterns From the Most Advanced AWS Customers...The 1%: Identity and Governance Patterns From the Most Advanced AWS Customers...
The 1%: Identity and Governance Patterns From the Most Advanced AWS Customers...
AWS GovCloud (US): A path to high compliance in the cloud - GRC344 - AWS re:I... by Amazon Web Services
AWS GovCloud (US): A path to high compliance in the cloud - GRC344 - AWS re:I...AWS GovCloud (US): A path to high compliance in the cloud - GRC344 - AWS re:I...
AWS GovCloud (US): A path to high compliance in the cloud - GRC344 - AWS re:I...
Amazon Web Services1.3K views
External Security Services Round: Security Week at the San Francisco Loft by Amazon Web Services
External Security Services Round: Security Week at the San Francisco LoftExternal Security Services Round: Security Week at the San Francisco Loft
External Security Services Round: Security Week at the San Francisco Loft
Start Up Austin 2017: Manual vs Automation - When to Start Automating your Pr... by Amazon Web Services
Start Up Austin 2017: Manual vs Automation - When to Start Automating your Pr...Start Up Austin 2017: Manual vs Automation - When to Start Automating your Pr...
Start Up Austin 2017: Manual vs Automation - When to Start Automating your Pr...

Similar to Women in AWSome:Be Visible

AWS IAM Introduction by
AWS IAM IntroductionAWS IAM Introduction
AWS IAM IntroductionAmazon Web Services
13.9K views23 slides
(SEC302) IAM Best Practices To Live By by
(SEC302) IAM Best Practices To Live By(SEC302) IAM Best Practices To Live By
(SEC302) IAM Best Practices To Live ByAmazon Web Services
13.2K views76 slides
AWS Partner Webcast - Get Closer to the Cloud with Federated Single Sign-On by
AWS Partner Webcast - Get Closer to the Cloud with Federated Single Sign-OnAWS Partner Webcast - Get Closer to the Cloud with Federated Single Sign-On
AWS Partner Webcast - Get Closer to the Cloud with Federated Single Sign-OnAmazon Web Services
1.7K views32 slides
IAM Introduction by
IAM IntroductionIAM Introduction
IAM IntroductionAmazon Web Services
1.2K views23 slides
Increase Your Security Posture with Temporary Elevated Access and AWS IAM Ide... by
Increase Your Security Posture with Temporary Elevated Access and AWS IAM Ide...Increase Your Security Posture with Temporary Elevated Access and AWS IAM Ide...
Increase Your Security Posture with Temporary Elevated Access and AWS IAM Ide...Vladimir Samoylov
44 views22 slides
Security Day IAM Recommended Practices by
Security Day IAM Recommended PracticesSecurity Day IAM Recommended Practices
Security Day IAM Recommended PracticesAmazon Web Services
5K views74 slides

Similar to Women in AWSome:Be Visible(20)

AWS Partner Webcast - Get Closer to the Cloud with Federated Single Sign-On by Amazon Web Services
AWS Partner Webcast - Get Closer to the Cloud with Federated Single Sign-OnAWS Partner Webcast - Get Closer to the Cloud with Federated Single Sign-On
AWS Partner Webcast - Get Closer to the Cloud with Federated Single Sign-On
Amazon Web Services1.7K views
Increase Your Security Posture with Temporary Elevated Access and AWS IAM Ide... by Vladimir Samoylov
Increase Your Security Posture with Temporary Elevated Access and AWS IAM Ide...Increase Your Security Posture with Temporary Elevated Access and AWS IAM Ide...
Increase Your Security Posture with Temporary Elevated Access and AWS IAM Ide...
Introduction to Identity and Access Management (IAM) by Amazon Web Services
Introduction to Identity and Access Management (IAM)Introduction to Identity and Access Management (IAM)
Introduction to Identity and Access Management (IAM)
Amazon Web Services5.5K views
Secure and Streamline Access to Your AWS Management Console with Okta PPT by Amazon Web Services
Secure and Streamline Access to Your AWS Management Console with Okta PPTSecure and Streamline Access to Your AWS Management Console with Okta PPT
Secure and Streamline Access to Your AWS Management Console with Okta PPT
Amazon Web Services2.2K views
9781839216923-AWS_PENETRATION_TESTING.pdf by Omar Diaz
9781839216923-AWS_PENETRATION_TESTING.pdf9781839216923-AWS_PENETRATION_TESTING.pdf
9781839216923-AWS_PENETRATION_TESTING.pdf
Omar Diaz46 views
Aws iam best practices to live by by John Varghese
Aws iam best practices to live byAws iam best practices to live by
Aws iam best practices to live by
John Varghese400 views
Identify and Access Management: The First Step in AWS Security by Amazon Web Services
Identify and Access Management: The First Step in AWS SecurityIdentify and Access Management: The First Step in AWS Security
Identify and Access Management: The First Step in AWS Security
SEC309 Secure Your Cloud Investment: Mastering AWS Identity Access Management... by Amazon Web Services
SEC309 Secure Your Cloud Investment: Mastering AWS Identity Access Management...SEC309 Secure Your Cloud Investment: Mastering AWS Identity Access Management...
SEC309 Secure Your Cloud Investment: Mastering AWS Identity Access Management...
AWS & Infrastructure Hardening - Cloud Infrastructure Security by Nutanix Beam
AWS & Infrastructure Hardening - Cloud Infrastructure SecurityAWS & Infrastructure Hardening - Cloud Infrastructure Security
AWS & Infrastructure Hardening - Cloud Infrastructure Security
Nutanix Beam1.5K views
AWS Summit 2013 | India - AWS Support - Optimizing your Costs and Infrastruct... by Amazon Web Services
AWS Summit 2013 | India - AWS Support - Optimizing your Costs and Infrastruct...AWS Summit 2013 | India - AWS Support - Optimizing your Costs and Infrastruct...
AWS Summit 2013 | India - AWS Support - Optimizing your Costs and Infrastruct...
Amazon Web Services1.5K views

Recently uploaded

AMAZON PRODUCT RESEARCH.pdf by
AMAZON PRODUCT RESEARCH.pdfAMAZON PRODUCT RESEARCH.pdf
AMAZON PRODUCT RESEARCH.pdfJerikkLaureta
15 views13 slides
Tunable Laser (1).pptx by
Tunable Laser (1).pptxTunable Laser (1).pptx
Tunable Laser (1).pptxHajira Mahmood
23 views37 slides
Spesifikasi Lengkap ASUS Vivobook Go 14 by
Spesifikasi Lengkap ASUS Vivobook Go 14Spesifikasi Lengkap ASUS Vivobook Go 14
Spesifikasi Lengkap ASUS Vivobook Go 14Dot Semarang
35 views1 slide
Throughput by
ThroughputThroughput
ThroughputMoisés Armani Ramírez
36 views11 slides
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors by
TouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective SensorsTouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensorssugiuralab
15 views15 slides
Five Things You SHOULD Know About Postman by
Five Things You SHOULD Know About PostmanFive Things You SHOULD Know About Postman
Five Things You SHOULD Know About PostmanPostman
27 views43 slides

Recently uploaded(20)

AMAZON PRODUCT RESEARCH.pdf by JerikkLaureta
AMAZON PRODUCT RESEARCH.pdfAMAZON PRODUCT RESEARCH.pdf
AMAZON PRODUCT RESEARCH.pdf
JerikkLaureta15 views
Spesifikasi Lengkap ASUS Vivobook Go 14 by Dot Semarang
Spesifikasi Lengkap ASUS Vivobook Go 14Spesifikasi Lengkap ASUS Vivobook Go 14
Spesifikasi Lengkap ASUS Vivobook Go 14
Dot Semarang35 views
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors by sugiuralab
TouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective SensorsTouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors
sugiuralab15 views
Five Things You SHOULD Know About Postman by Postman
Five Things You SHOULD Know About PostmanFive Things You SHOULD Know About Postman
Five Things You SHOULD Know About Postman
Postman27 views
Voice Logger - Telephony Integration Solution at Aegis by Nirmal Sharma
Voice Logger - Telephony Integration Solution at AegisVoice Logger - Telephony Integration Solution at Aegis
Voice Logger - Telephony Integration Solution at Aegis
Nirmal Sharma17 views
Attacking IoT Devices from a Web Perspective - Linux Day by Simone Onofri
Attacking IoT Devices from a Web Perspective - Linux Day Attacking IoT Devices from a Web Perspective - Linux Day
Attacking IoT Devices from a Web Perspective - Linux Day
Simone Onofri15 views
Future of Learning - Khoong Chan Meng by NUS-ISS
Future of Learning - Khoong Chan MengFuture of Learning - Khoong Chan Meng
Future of Learning - Khoong Chan Meng
NUS-ISS33 views
PharoJS - Zürich Smalltalk Group Meetup November 2023 by Noury Bouraqadi
PharoJS - Zürich Smalltalk Group Meetup November 2023PharoJS - Zürich Smalltalk Group Meetup November 2023
PharoJS - Zürich Smalltalk Group Meetup November 2023
Noury Bouraqadi120 views
.conf Go 2023 - Data analysis as a routine by Splunk
.conf Go 2023 - Data analysis as a routine.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routine
Splunk93 views
Combining Orchestration and Choreography for a Clean Architecture by ThomasHeinrichs1
Combining Orchestration and Choreography for a Clean ArchitectureCombining Orchestration and Choreography for a Clean Architecture
Combining Orchestration and Choreography for a Clean Architecture
ThomasHeinrichs169 views
Igniting Next Level Productivity with AI-Infused Data Integration Workflows by Safe Software
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Safe Software225 views
The details of description: Techniques, tips, and tangents on alternative tex... by BookNet Canada
The details of description: Techniques, tips, and tangents on alternative tex...The details of description: Techniques, tips, and tangents on alternative tex...
The details of description: Techniques, tips, and tangents on alternative tex...
BookNet Canada121 views
Data-centric AI and the convergence of data and model engineering: opportunit... by Paolo Missier
Data-centric AI and the convergence of data and model engineering:opportunit...Data-centric AI and the convergence of data and model engineering:opportunit...
Data-centric AI and the convergence of data and model engineering: opportunit...
Paolo Missier34 views

Women in AWSome:Be Visible

  • 1. Meet Core leader Women Group Hello to all a short intro about myself. • System Administrator (Linux & Win) • Cisco Network Engr • Python user • DevOps Engr (Cloud) • Certified Ethical Hacker v8.0 • Certified PCI DSS Implementor V3.0 • IT System Auditor “I am a proud batanguena” joined Conduent as Information Security Analyst, Lead She loves to read, dance and yoga during free time.
  • 2. Meet the AWS UG PH Women Community (Manila and Cebu 2017-2018]
  • 3. AWS Users Group Community
  • 4. Key take ways Part 1 : AWS Asian Women Community increase participation. Part 2 :AWS Cloud IAM (basics) our daily life.
  • 5. AWS User groups are peer-to-peer communities
  • 6. Why women in I.T skeptical to participate in peer to peer community based group?
  • 7. Why women in I.T skeptical to participate in peer to peer community based group?
  • 8. Why women in I.T skeptical to participate in peer to peer community based group?
  • 9. AWS Asian Women: Increase Women in I.T roles & Visibility  Comfort ability of training  work setting  make a career in technology more attainable  inspirational - goal
  • 10. AWS Asian Women: workforce in Cloud security Picture : credit to Udemy
  • 11. Value Women in workforce : Cloud security  Directions in Information Security  Operation practices and priorities of security organization.  Able to do things from multiple perspective  drive to align Security with business strategy.
  • 12. Ways to help us visible group community?  > Do you have a clear understandingof the roles and what they require as skills to be hire able?  > What can you offer to the company, as added value?  > What are the skills that you can reuse from your previous career?
  • 13. “With ordinary talent and extra-ordinary perseverance All things are attainable.” Thomas Fawell Buston Hire able = Skills set + Certification+ level of experience
  • 14. AWS Women’s Group Community PEER-TO-PEER COMMUNITIES which meet regularly  to share ideas  Answer users community questions  learn about new AWS services and best practices.
  • 15. Part 2 : Cloud Security IAM in daily life
  • 16. Part 2 : Cloud Security IAM in daily life Granular permissions * AWS (MFA)
  • 18. How to access AWS IAM?
  • 19. 1. Principal 2. Request 3. Authentication 4. Authorization 5. Actions 6. Resources The IAM infrastructure
  • 20. Understanding how IAM works (Basics) . Principal action on an AWS resource allow users and services to assume a role Request ▸ Actions (or operations) ▸ Resources upon which the actions are performed ▸ Principal informationAuthentication  you must be authenticated (signed in to AWS) to send a request to AWS. Authenticate from the API or CLI, you must provide your access key and secret key Use MFA Authorization ▸ By default, all requests are denied. ▸ An explicit allow overrides this default. ▸ An explicit deny overrides any allows.
  • 21. AWS Women’s PH Group – Games to know
  • 22. AWS Womens Group – Games to know A __________, is an entity that can take an action on an AWS resource.
  • 23. AWS Womens Group – Games to know
  • 24. Come and join Women Community
  • 25. Come and join AWS UG PH Women Community

Editor's Notes

  1. started December 2017, collaborate with Coding Girls Manila and Cebu AWS Women’s 1st meet up Dec 2018. Successfully mentored 1 student from ICADEMY and continuous growing our AWS UG PH Women’s Manila/Cebu Community.
  2. Empowerment, Engagement, and Education {continue}
  3. Scholar: Catherin Ashcraft, Director of Reasearch and Senior Research Scientist for the National Centre for Women & Information technology She identified three key issues which caused lack of women in technology-specific roles; 1. Societal influences and biases ***perception of girls not being suitable for technology-based roles is still widespread.
  4. 2. Education {school & background) ****Computer science subjects are not made compelling and engaging for girls, limiting their interest in such subjects at later year STEM-focused see a reduced female interest.
  5. reduced female interest. 3. Workplace Systems ***Technology workplaces continue the tradition of biases against women. They often encounter these same patterns and biases in the workplace, which restricts their upward movement and further interest in the profession. **************************** 1. Societal influences and biases 2. School education 3. Workplace Systems
  6. Be interactive with audience ask their current skills set, be able to define their certification path and level of experience on domains
  7. Be interactive with audience ask their current skills set, be able to define their certification path and level of experience on domains
  8. Be interactive with audience ask their current skills set, be able to define their certification path and level of experience on domains
  9. AWS Identity and Access Management (IAM) is a web service that helps you securely control access to AWS resources. You use IAM to control who is authenticated(signed in) and authorized (has permissions) to use resources. Basic IAM Policy and Security Features Outside IAM AWS EC2
  10. CreateUser DeleteUser GetUser UpdateUser Resources: After AWS approves the actions in your request, those actions can be performed on the related resources within your account. An entity that exists within a service.