Networking and Security Best Practices on AWS
3.5 (1 rating)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
9 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Networking and Security Best Practices on AWS to your Wishlist.

Add to Wishlist

Networking and Security Best Practices on AWS

Build secure web facing applications by learning the fundamental technologies required to secure your applications from
3.5 (1 rating)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
9 students enrolled
Created by Packt Publishing
Last updated 8/2017
English
Current price: $10 Original price: $125 Discount: 92% off
5 hours left at this price!
30-Day Money-Back Guarantee
Includes:
  • 2 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Understand how to create your own virtual private cloud
  • Build fine-grained network access controls
  • Discover the important differences between NAT instances and NAT gateways
  • Learn how to create, track, and manage user access control levels
  • Understand how to integrate your virtual cloud with a local network
View Curriculum
Requirements
  • With easy to follow steps, this course explains how to get started with the fundamental technologies like Identity Access Management (IAM) and Virtual Private Clouds (VPCs).
  • The course practically demonstrates how to create a secure and isolated virtual datacenter in the cloud.
Description

This course will show you how to get started with the fundamental technologies required to secure your applications from the beginning of the architecture/development process: Identity Access Management (IAM) and Virtual Private Clouds (VPCs). Combined, these two technologies give you the essential capability you will need to create a secure and isolated virtual datacenter in the cloud, complete with fine-grained user access controls and activity monitoring.

About The Author

Colibri is a technology consultancy company founded in 2015 by James Cross and Ingrid Funie. The company works to help its clients navigate the rapidly changing and complex world of emerging technologies, with deep expertise in areas like big data, data science, machine learning, and cloud computing. Over the past few years they have worked with some of the world's largest and most prestigious companies, including a tier 1 investment bank, a leading management consultancy group, and one of the world's most popular soft drinks companies, helping each of them to make better sense of their data, and process it in more intelligent ways. The company lives by its motto: Data -> Intelligence -> Action.

James Cross is a Big Data Engineer and certified AWS Solutions Architect with a passion for data-driven applications. He's spent the last 3-5 years helping his clients to design and implement huge-scale, streaming big data platforms, Cloud-based analytics stacks, and serverless architectures.

He started his professional career in Investment Banking, working with well-established technologies such as Java and SQL Server, before moving into the big data space. Since then he's worked with a huge range of Big Data tools including most of the Hadoop eco-system, Spark, and many No-SQL technologies such as Cassandra, MongoDB, Redis, and DynamoDB. More recently his focus has been on Cloud technologies and how they can be applied to data analytics, culminating in his work at Scout Solutions as CTO, and more recently with Mckinsey.

James is an AWS certified solutions architect with several years' experience designing and implementing solutions on this cloud platform. As CTO of Scout Solutions Ltd, he built a fully serverless set of API's and analytics stacks based around Lambda and Redshift.

He is interested in almost anything that has to do with technology. He has worked with everything from WordPress to Hadoop, from C++ to Java, and from Oracle to DynamoDB. If it's new and solves a problem in an innovative way he's keen to give it a go!


Who is the target audience?
  • Application developers and architects interested in securing applications running in the AWS Cloud System administrators interested in supporting the security of applications on AWSIT and professionals with an interest in cloud security
Students Who Viewed This Course Also Viewed
Curriculum For This Course
12 Lectures
01:51:51
+
Identity Access Management
4 Lectures 28:31

This video provides an overview of the entire course.

Preview 03:30

In this video, you will gain a first glance understanding of IAM and why it’s so important to cloud computing.

IAM and Where It Fits into the AWS Ecosystem
11:15

In this video, we have an example of how to create users, groups, and roles with IAM.

Hands-on with IAM
07:38

In this video, you will gain an understanding of how we can leverage IAM roles and policies to secure our infrastructure without needing to store access credentials.

IAM Roles and How to Use them
06:08
+
Virtual Private Clouds
8 Lectures 01:23:20

In this video, you will learn what a virtual private cloud is, the components of a VPC, and how this technology allows us to replicate complex on-premise networks in the cloud.

Preview 20:45

In this video, we have an example of how to create your own custom VPC.

How to Build Your Own Custom VPC?
19:23

This video teaches us what NAT is and explores the differences between NAT instances and NAT gateways.

NAT Instances and NAT Gateways
14:23

Understanding network access control lists and when to use them versus security groups.

Access Control Lists
07:00

A hands-on example of how to create and leverage VPC flow logs to monitor network traffic within our VPC.

VPC Flow Logs
07:38

A brief overview of how to peer multiple VPCs, including across multiple accounts, and the limitations of doing so.

VPC Peering
02:25

A hands-on tutorial showing you how to tear down your virtual infrastructure to prevent you being charged.

Cleaning Up a VPC
03:30

An overview of the options available for integrating on-premise services with VPCs in the cloud

Integrating VPCs with On-premise Networks
08:16
About the Instructor
Packt Publishing
3.9 Average rating
8,109 Reviews
58,370 Students
686 Courses
Tech Knowledge in Motion

Packt has been committed to developer learning since 2004. A lot has changed in software since then - but Packt has remained responsive to these changes, continuing to look forward at the trends and tools defining the way we work and live. And how to put them to work.

With an extensive library of content - more than 4000 books and video courses -Packt's mission is to help developers stay relevant in a rapidly changing world. From new web frameworks and programming languages, to cutting edge data analytics, and DevOps, Packt takes software professionals in every field to what's important to them now.

From skills that will help you to develop and future proof your career to immediate solutions to every day tech challenges, Packt is a go-to resource to make you a better, smarter developer.

Packt Udemy courses continue this tradition, bringing you comprehensive yet concise video courses straight from the experts.