Networking and Security Best Practices on AWS
Course
Online
Description
-
Type
Course
-
Methodology
Online
-
Start date
Different dates available
Build secure web facing applications by learning the fundamental technologies required to secure your applications fromThis course will show you how to get started with the fundamental technologies required to secure your applications from the beginning of the architecture/development process: Identity Access Management (IAM) and Virtual Private Clouds (VPCs). Combined, these two technologies give you the essential capability you will need to create a secure and isolated virtual datacenter in the cloud, complete with fine-grained user access controls and activity monitoring.About The AuthorColibri is a technology consultancy company founded in 2015 by James Cross and Ingrid Funie. The company works to help its clients navigate the rapidly changing and complex world of emerging technologies, with deep expertise in areas like big data, data science, machine learning, and cloud computing. Over the past few years they have worked with some of the world's largest and most prestigious companies, including a tier 1 investment bank, a leading management consultancy group, and one of the world's most popular soft drinks companies, helping each of them to make better sense of their data, and process it in more intelligent ways. The company lives by its motto: Data -> Intelligence -> Action.James Cross is a Big Data Engineer and certified AWS Solutions Architect with a passion for data-driven applications. He's spent the last 3-5 years helping his clients to design and implement huge-scale, streaming big data platforms, Cloud-based analytics stacks, and serverless architectures.
.
He started his professional career in Investment Banking, working with well-established technologies such as Java and SQL Server, before moving into the big data space. Since then he's worked with a huge range of Big Data tools including most of the Hadoop eco-system, Spark, and many No-SQL technologies such as Cassandra, MongoDB, Redis, and DynamoDB
Facilities
Location
Start date
Start date
About this course
Understand how to create your own virtual private cloud
Build fine-grained network access controls
Discover the important differences between NAT instances and NAT gateways
Learn how to create, track, and manage user access control levels
Understand how to integrate your virtual cloud with a local network
Reviews
This centre's achievements
All courses are up to date
The average rating is higher than 3.7
More than 50 reviews in the last 12 months
This centre has featured on Emagister for 4 years
Subjects
- Network Training
- Technology
- Private
- Gateways
- Network
- SQL
- Internet
- Networks
- Testing
- Computing
- Investment
- Options
- Networking
- Access
- Monitoring
- Access Control
Course programme
- Understand what IAM is
- Know the components of IAM
- Know why we need IAM with cloud computing
- Log in to the AWS console and explore the IAM options
- Create a user, assign some policies, and group them together
- Create a role, and log in as a test user
- Get to know what is a role and how we use it
- Assign a role to an EC2 instance
- Test the impact of roles and policies
- Understand what IAM is
- Know the components of IAM
- Know why we need IAM with cloud computing
- Log in to the AWS console and explore the IAM options
- Create a user, assign some policies, and group them together
- Create a role, and log in as a test user
- Get to know what is a role and how we use it
- Assign a role to an EC2 instance
- Test the impact of roles and policies
- Understand what IAM is
- Know the components of IAM
- Know why we need IAM with cloud computing
- Understand what IAM is
- Know the components of IAM
- Know why we need IAM with cloud computing
- Understand what IAM is
- Know the components of IAM
- Know why we need IAM with cloud computing
- Understand what IAM is
- Know the components of IAM
- Know why we need IAM with cloud computing
- Understand what IAM is
- Know the components of IAM
- Know why we need IAM with cloud computing
- Understand what IAM is
- Know the components of IAM
- Know why we need IAM with cloud computing
- Log in to the AWS console and explore the IAM options
- Create a user, assign some policies, and group them together
- Create a role, and log in as a test user
- Log in to the AWS console and explore the IAM options
- Create a user, assign some policies, and group them together
- Create a role, and log in as a test user
- Log in to the AWS console and explore the IAM options
- Create a user, assign some policies, and group them together
- Create a role, and log in as a test user
- Log in to the AWS console and explore the IAM options
- Create a user, assign some policies, and group them together
- Create a role, and log in as a test user
- Log in to the AWS console and explore the IAM options
- Create a user, assign some policies, and group them together
- Create a role, and log in as a test user
- Log in to the AWS console and explore the IAM options
- Create a user, assign some policies, and group them together
- Create a role, and log in as a test user
- Get to know what is a role and how we use it
- Assign a role to an EC2 instance
- Test the impact of roles and policies
- Get to know what is a role and how we use it
- Assign a role to an EC2 instance
- Test the impact of roles and policies
- Get to know what is a role and how we use it
- Assign a role to an EC2 instance
- Test the impact of roles and policies
- Get to know what is a role and how we use it
- Assign a role to an EC2 instance
- Test the impact of roles and policies
- Get to know what is a role and how we use it
- Assign a role to an EC2 instance
- Test the impact of roles and policies
- Get to know what is a role and how we use it
- Assign a role to an EC2 instance
- Test the impact of roles and policies
- View an introduction to VPCs
- Know when to use a VPC and why
- Know the components of a VPC
- Create a VPC
- Create public and private subnets
- Create an internet gateway, routing table, and testing our network stack
- What is NAT
- When to use a NAT instance or a NAT gateway
- Applying a NAT gateway to our VPC and testing the results
- What is a NACL
- When to use a NACL compared to a security group
- How to create a NACL in our custom VPC
- What is a flow log
- Create a Cloudwatch log group and pushing flow logs to it
- Generate traffic and monitoring the flw log
- What is VPC peering
- When to peer VPCs
- Limitations of VPC peering
- Shut down EC2 instances
- Delete the NAT gateway
- Delete the VPC, internet gateway, subnets, and route tables
- VPN connections
- Direct connect
- View an introduction to VPCs
- Know when to use a VPC and why
- Know the components of a VPC
- Create a VPC
- Create public and private subnets
- Create an internet gateway, routing table, and testing our network stack
- What is NAT
- When to use a NAT instance or a NAT gateway
- Applying a NAT gateway to our VPC and testing the results
- What is a NACL
- When to use a NACL compared to a security group
- How to create a NACL in our custom VPC
- What is a flow log
- Create a Cloudwatch log group and pushing flow logs to it
- Generate traffic and monitoring the flw log
- What is VPC peering
- When to peer VPCs
- Limitations of VPC peering
- Shut down EC2 instances
- Delete the NAT gateway
- Delete the VPC, internet gateway, subnets, and route tables
- VPN connections
- Direct connect
- View an introduction to VPCs
- Know when to use a VPC and why
- Know the components of a VPC
- View an introduction to VPCs
- Know when to use a VPC and why
- Know the components of a VPC
- View an introduction to VPCs
- Know when to use a VPC and why
- Know the components of a VPC
- View an introduction to VPCs
- Know when to use a VPC and why
- Know the components of a VPC
- View an introduction to VPCs
- Know when to use a VPC and why
- Know the components of a VPC
- View an introduction to VPCs
- Know when to use a VPC and why
- Know the components of a VPC
Additional information
Networking and Security Best Practices on AWS