Networking and Security Best Practices on AWS

Course

Online

£ 15 VAT inc.

Description

  • Type

    Course

  • Methodology

    Online

  • Start date

    Different dates available

Build secure web facing applications by learning the fundamental technologies required to secure your applications fromThis course will show you how to get started with the fundamental technologies required to secure your applications from the beginning of the architecture/development process: Identity Access Management (IAM) and Virtual Private Clouds (VPCs). Combined, these two technologies give you the essential capability you will need to create a secure and isolated virtual datacenter in the cloud, complete with fine-grained user access controls and activity monitoring.About The AuthorColibri is a technology consultancy company founded in 2015 by James Cross and Ingrid Funie. The company works to help its clients navigate the rapidly changing and complex world of emerging technologies, with deep expertise in areas like big data, data science, machine learning, and cloud computing. Over the past few years they have worked with some of the world's largest and most prestigious companies, including a tier 1 investment bank, a leading management consultancy group, and one of the world's most popular soft drinks companies, helping each of them to make better sense of their data, and process it in more intelligent ways. The company lives by its motto: Data -> Intelligence -> Action.James Cross is a Big Data Engineer and certified AWS Solutions Architect with a passion for data-driven applications. He's spent the last 3-5 years helping his clients to design and implement huge-scale, streaming big data platforms, Cloud-based analytics stacks, and serverless architectures.
.
He started his professional career in Investment Banking, working with well-established technologies such as Java and SQL Server, before moving into the big data space. Since then he's worked with a huge range of Big Data tools including most of the Hadoop eco-system, Spark, and many No-SQL technologies such as Cassandra, MongoDB, Redis, and DynamoDB

Facilities

Location

Start date

Online

Start date

Different dates availableEnrolment now open

About this course

Understand how to create your own virtual private cloud
Build fine-grained network access controls
Discover the important differences between NAT instances and NAT gateways
Learn how to create, track, and manage user access control levels
Understand how to integrate your virtual cloud with a local network

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

This centre's achievements

2021

All courses are up to date

The average rating is higher than 3.7

More than 50 reviews in the last 12 months

This centre has featured on Emagister for 4 years

Subjects

  • Network Training
  • Technology
  • Private
  • Gateways
  • Network
  • SQL
  • Internet
  • Networks
  • Testing
  • Computing
  • Investment
  • Options
  • Networking
  • Access
  • Monitoring
  • Access Control

Course programme

Identity Access Management 4 lectures 28:31 The Course Overview This video provides an overview of the entire course. IAM and Where It Fits into the AWS Ecosystem In this video, you will gain a first glance understanding of IAM and why it’s so important to cloud computing.
  • Understand what IAM is
  • Know the components of IAM
  • Know why we need IAM with cloud computing
Hands-on with IAM In this video, we have an example of how to create users, groups, and roles with IAM.
  • Log in to the AWS console and explore the IAM options
  • Create a user, assign some policies, and group them together
  • Create a role, and log in as a test user
IAM Roles and How to Use them In this video, you will gain an understanding of how we can leverage IAM roles and policies to secure our infrastructure without needing to store access credentials.
  • Get to know what is a role and how we use it
  • Assign a role to an EC2 instance
  • Test the impact of roles and policies
Identity Access Management 4 lectures 28:31 The Course Overview This video provides an overview of the entire course. IAM and Where It Fits into the AWS Ecosystem In this video, you will gain a first glance understanding of IAM and why it’s so important to cloud computing.
  • Understand what IAM is
  • Know the components of IAM
  • Know why we need IAM with cloud computing
Hands-on with IAM In this video, we have an example of how to create users, groups, and roles with IAM.
  • Log in to the AWS console and explore the IAM options
  • Create a user, assign some policies, and group them together
  • Create a role, and log in as a test user
IAM Roles and How to Use them In this video, you will gain an understanding of how we can leverage IAM roles and policies to secure our infrastructure without needing to store access credentials.
  • Get to know what is a role and how we use it
  • Assign a role to an EC2 instance
  • Test the impact of roles and policies
The Course Overview This video provides an overview of the entire course. The Course Overview This video provides an overview of the entire course. The Course Overview This video provides an overview of the entire course. The Course Overview This video provides an overview of the entire course. This video provides an overview of the entire course. This video provides an overview of the entire course. IAM and Where It Fits into the AWS Ecosystem In this video, you will gain a first glance understanding of IAM and why it’s so important to cloud computing.
  • Understand what IAM is
  • Know the components of IAM
  • Know why we need IAM with cloud computing
IAM and Where It Fits into the AWS Ecosystem In this video, you will gain a first glance understanding of IAM and why it’s so important to cloud computing.
  • Understand what IAM is
  • Know the components of IAM
  • Know why we need IAM with cloud computing
IAM and Where It Fits into the AWS Ecosystem In this video, you will gain a first glance understanding of IAM and why it’s so important to cloud computing.
  • Understand what IAM is
  • Know the components of IAM
  • Know why we need IAM with cloud computing
IAM and Where It Fits into the AWS Ecosystem In this video, you will gain a first glance understanding of IAM and why it’s so important to cloud computing.
  • Understand what IAM is
  • Know the components of IAM
  • Know why we need IAM with cloud computing
In this video, you will gain a first glance understanding of IAM and why it’s so important to cloud computing.
  • Understand what IAM is
  • Know the components of IAM
  • Know why we need IAM with cloud computing
In this video, you will gain a first glance understanding of IAM and why it’s so important to cloud computing.
  • Understand what IAM is
  • Know the components of IAM
  • Know why we need IAM with cloud computing
Hands-on with IAM In this video, we have an example of how to create users, groups, and roles with IAM.
  • Log in to the AWS console and explore the IAM options
  • Create a user, assign some policies, and group them together
  • Create a role, and log in as a test user
Hands-on with IAM In this video, we have an example of how to create users, groups, and roles with IAM.
  • Log in to the AWS console and explore the IAM options
  • Create a user, assign some policies, and group them together
  • Create a role, and log in as a test user
Hands-on with IAM In this video, we have an example of how to create users, groups, and roles with IAM.
  • Log in to the AWS console and explore the IAM options
  • Create a user, assign some policies, and group them together
  • Create a role, and log in as a test user
Hands-on with IAM In this video, we have an example of how to create users, groups, and roles with IAM.
  • Log in to the AWS console and explore the IAM options
  • Create a user, assign some policies, and group them together
  • Create a role, and log in as a test user
In this video, we have an example of how to create users, groups, and roles with IAM.
  • Log in to the AWS console and explore the IAM options
  • Create a user, assign some policies, and group them together
  • Create a role, and log in as a test user
In this video, we have an example of how to create users, groups, and roles with IAM.
  • Log in to the AWS console and explore the IAM options
  • Create a user, assign some policies, and group them together
  • Create a role, and log in as a test user
IAM Roles and How to Use them In this video, you will gain an understanding of how we can leverage IAM roles and policies to secure our infrastructure without needing to store access credentials.
  • Get to know what is a role and how we use it
  • Assign a role to an EC2 instance
  • Test the impact of roles and policies
IAM Roles and How to Use them In this video, you will gain an understanding of how we can leverage IAM roles and policies to secure our infrastructure without needing to store access credentials.
  • Get to know what is a role and how we use it
  • Assign a role to an EC2 instance
  • Test the impact of roles and policies
IAM Roles and How to Use them In this video, you will gain an understanding of how we can leverage IAM roles and policies to secure our infrastructure without needing to store access credentials.
  • Get to know what is a role and how we use it
  • Assign a role to an EC2 instance
  • Test the impact of roles and policies
IAM Roles and How to Use them In this video, you will gain an understanding of how we can leverage IAM roles and policies to secure our infrastructure without needing to store access credentials.
  • Get to know what is a role and how we use it
  • Assign a role to an EC2 instance
  • Test the impact of roles and policies
In this video, you will gain an understanding of how we can leverage IAM roles and policies to secure our infrastructure without needing to store access credentials.
  • Get to know what is a role and how we use it
  • Assign a role to an EC2 instance
  • Test the impact of roles and policies
In this video, you will gain an understanding of how we can leverage IAM roles and policies to secure our infrastructure without needing to store access credentials.
  • Get to know what is a role and how we use it
  • Assign a role to an EC2 instance
  • Test the impact of roles and policies
Virtual Private Clouds 8 lectures 01:13:17 VPCs and Their Role in Cloud Computing In this video, you will learn what a virtual private cloud is, the components of a VPC, and how this technology allows us to replicate complex on-premise networks in the cloud.
  • View an introduction to VPCs
  • Know when to use a VPC and why
  • Know the components of a VPC
How to Build Your Own Custom VPC? In this video, we have an example of how to create your own custom VPC.
  • Create a VPC
  • Create public and private subnets
  • Create an internet gateway, routing table, and testing our network stack
NAT Instances and NAT Gateways This video teaches us what NAT is and explores the differences between NAT instances and NAT gateways.
  • What is NAT
  • When to use a NAT instance or a NAT gateway
  • Applying a NAT gateway to our VPC and testing the results
Access Control Lists Understanding network access control lists and when to use them versus security groups.
  • What is a NACL
  • When to use a NACL compared to a security group
  • How to create a NACL in our custom VPC
VPC Flow Logs A hands-on example of how to create and leverage VPC flow logs to monitor network traffic within our VPC.
  • What is a flow log
  • Create a Cloudwatch log group and pushing flow logs to it
  • Generate traffic and monitoring the flw log
VPC Peering A brief overview of how to peer multiple VPCs, including across multiple accounts, and the limitations of doing so.
  • What is VPC peering
  • When to peer VPCs
  • Limitations of VPC peering
Cleaning Up a VPC A hands-on tutorial showing you how to tear down your virtual infrastructure to prevent you being charged.
  • Shut down EC2 instances
  • Delete the NAT gateway
  • Delete the VPC, internet gateway, subnets, and route tables
Integrating VPCs with On-premise Networks An overview of the options available for integrating on-premise services with VPCs in the cloud
  • VPN connections
  • Direct connect
Virtual Private Clouds. 8 lectures 01:13:17 VPCs and Their Role in Cloud Computing In this video, you will learn what a virtual private cloud is, the components of a VPC, and how this technology allows us to replicate complex on-premise networks in the cloud.
  • View an introduction to VPCs
  • Know when to use a VPC and why
  • Know the components of a VPC
How to Build Your Own Custom VPC? In this video, we have an example of how to create your own custom VPC.
  • Create a VPC
  • Create public and private subnets
  • Create an internet gateway, routing table, and testing our network stack
NAT Instances and NAT Gateways This video teaches us what NAT is and explores the differences between NAT instances and NAT gateways.
  • What is NAT
  • When to use a NAT instance or a NAT gateway
  • Applying a NAT gateway to our VPC and testing the results
Access Control Lists Understanding network access control lists and when to use them versus security groups.
  • What is a NACL
  • When to use a NACL compared to a security group
  • How to create a NACL in our custom VPC
VPC Flow Logs A hands-on example of how to create and leverage VPC flow logs to monitor network traffic within our VPC.
  • What is a flow log
  • Create a Cloudwatch log group and pushing flow logs to it
  • Generate traffic and monitoring the flw log
VPC Peering A brief overview of how to peer multiple VPCs, including across multiple accounts, and the limitations of doing so.
  • What is VPC peering
  • When to peer VPCs
  • Limitations of VPC peering
Cleaning Up a VPC A hands-on tutorial showing you how to tear down your virtual infrastructure to prevent you being charged.
  • Shut down EC2 instances
  • Delete the NAT gateway
  • Delete the VPC, internet gateway, subnets, and route tables
Integrating VPCs with On-premise Networks An overview of the options available for integrating on-premise services with VPCs in the cloud
  • VPN connections
  • Direct connect
VPCs and Their Role in Cloud Computing In this video, you will learn what a virtual private cloud is, the components of a VPC, and how this technology allows us to replicate complex on-premise networks in the cloud.
  • View an introduction to VPCs
  • Know when to use a VPC and why
  • Know the components of a VPC
VPCs and Their Role in Cloud Computing In this video, you will learn what a virtual private cloud is, the components of a VPC, and how this technology allows us to replicate complex on-premise networks in the cloud.
  • View an introduction to VPCs
  • Know when to use a VPC and why
  • Know the components of a VPC
VPCs and Their Role in Cloud Computing In this video, you will learn what a virtual private cloud is, the components of a VPC, and how this technology allows us to replicate complex on-premise networks in the cloud.
  • View an introduction to VPCs
  • Know when to use a VPC and why
  • Know the components of a VPC
VPCs and Their Role in Cloud Computing In this video, you will learn what a virtual private cloud is, the components of a VPC, and how this technology allows us to replicate complex on-premise networks in the cloud.
  • View an introduction to VPCs
  • Know when to use a VPC and why
  • Know the components of a VPC
In this video, you will learn what a virtual private cloud is, the components of a VPC, and how this technology allows us to replicate complex on-premise networks in the cloud.
  • View an introduction to VPCs
  • Know when to use a VPC and why
  • Know the components of a VPC
In this video, you will learn what a virtual private cloud is, the components of a VPC, and how this technology allows us to replicate complex on-premise networks in the cloud.
  • View an introduction to VPCs
  • Know when to use a VPC and why
  • Know the components of a VPC
How to Build Your Own Custom VPC? In this video, we have an example of how to create your own custom VPC

Additional information

Knowledge of Application Development

Networking and Security Best Practices on AWS

£ 15 VAT inc.