Amazon Web Services (AWS) is a bundled remote computing service that provides cloud computing infrastructure over the Internet with storage, bandwidth, and customized support for application programming interfaces (API).
This course will help you to efficiently deploy and manage key AWS services. You will start by creating and managing users, groups, and permissions. You will then also learn to effectively monitor your AWS environment while working with AWS storage. The course will help you understand and build AWS networking solutions and also apply and implement the right compute option to meet your organization’s needs.
Using a simple real-world application of a hosting example, you will be guided through core AWS services. After finishing the course, you will be able to manage and maintain tools to automate operational tasks and effectively perform operation and administration tasks.
About the Author
Wayde Gilchrist started moving customers of his IT consulting business into the cloud and away from traditional hosting environments in 2010. In addition to consulting, he delivers AWS training for Fortune 500 companies, government agencies, and international consulting firms. When he is not out visiting customers, he delivers training virtually from his home in Florida.
In order to follow along with the on-screen examples, you should open a free AWS Account. Let's see how to do that.
For the first year of your AWS Account, there are many things you can do for free. We will discuss what these are and how to avoid accruing any charges.
The AWS Management Console is the easiest way to launch AWS services. In this video, we will show you how to navigate the console, access your billing information, and switch regions.
The aim of this video is to discuss the installation of command-line interface on Windows, Linux, and Mac machines and verify that the installation is proper.
A new AWS account comes with a default Master User. This user has full privileges for all AWS services and cannot be revoked without deleting the entire account. The best way to keep an AWS account from getting compromised is by limiting its use.
Unless you have only one person who needs AWS access in your organization, you will need to grant privileges to others to use your AWS Account. AWS provides the Identity and Access Management Service (IAM) to allow you to create Users and Groups and assign permissions to them.
Although AWS provides a simple web interface for interacting with their services, many administrators prefer to work from the command line. Also, with the availability of a Command-Line Interface, you can create simple BASH or Shell scripts for automating common administration tasks.
Sometimes you may need to give an IAM user temporary access to resources in your account. IAM roles can provide other users, even in other AWS accounts, temporary access.
It’s not just people who need permissions for the AWS Service APIs. It’s also your applications that interact with AWS Services. For example, putting an object in S3 or querying a DynamoDB table. Some AWS Services themselves, such as Elastic Beanstalk, need to interact with other services as well.
Many enterprise AWS customers use Active Directory or other LDAP compatible directory services to authenticate users on their network.
The ease with which infrastructure and services can be configured and deployed on AWS means that sometimes administrators are not completely aware of the configuration changes that are made by other users in their account. This can lead to misconfigurations, compliance issues and outages.
System administrators need clear visibility into the performance of their AWS resources. Real-time monitoring is needed to take action that can avert system outages before they occur.
Administrators and security professionals need proof that their infrastructure and data are secure. Fortunately, AWS provides additional logs that record access to our systems and data.
Manual infrastructure deployments are not easily repeatable and are often unreliable. Documenting the infrastructure and maintaining a history of changes can be a laborious process when done manually.
Fortunately, CloudFormation provides a way to deploy AWS resources from a text file known as a CloudFormation Template.
To support automatic launching from services such as Autoscaling and CloudFormation, EC2 instances need to be self-configuring.
Deploying updates to applications without disrupting users can be a particular challenge. In this video, we will look at deploying applications.
Communications with AWS often takes place over the internet, so transferring data between your data center and AWS requires protections against accidental disclosure, modification, or attacks such as man-in-the-middle.
Many security compliance requirements require data to be stored in the encrypted format. AWS enables several options to make this a simple task.
The most damaging attacks occur at the application level. There are several exploits commonly used to cripple a web application or gain access to secure data. With application level attacks, encryption is of no help. One solution is to filter out malicious attacks with the help of a Web Application Firewall.
Packt has been committed to developer learning since 2004. A lot has changed in software since then - but Packt has remained responsive to these changes, continuing to look forward at the trends and tools defining the way we work and live. And how to put them to work.
With an extensive library of content - more than 4000 books and video courses -Packt's mission is to help developers stay relevant in a rapidly changing world. From new web frameworks and programming languages, to cutting edge data analytics, and DevOps, Packt takes software professionals in every field to what's important to them now.
From skills that will help you to develop and future proof your career to immediate solutions to every day tech challenges, Packt is a go-to resource to make you a better, smarter developer.
Packt Udemy courses continue this tradition, bringing you comprehensive yet concise video courses straight from the experts.