Book Image

AWS Certified Developer - Associate Guide - Second Edition

By : Vipul Tankariya, Bhavin Parmar
5 (2)
Book Image

AWS Certified Developer - Associate Guide - Second Edition

5 (2)
By: Vipul Tankariya, Bhavin Parmar

Overview of this book

This book will focus on the revised version of AWS Certified Developer Associate exam. The 2019 version of this exam guide includes all the recent services and offerings from Amazon that benefits developers. AWS Certified Developer - Associate Guide starts with a quick introduction to AWS and the prerequisites to get you started. Then, this book will describe about getting familiar with Identity and Access Management (IAM) along with Virtual private cloud (VPC). Next, this book will teach you about microservices, serverless architecture, security best practices, advanced deployment methods and more. Going ahead we will take you through AWS DynamoDB A NoSQL Database Service, Amazon Simple Queue Service (SQS) and CloudFormation Overview. Lastly, this book will help understand Elastic Beanstalk and will also walk you through AWS lambda. At the end of this book, we will cover enough topics, tips and tricks along with mock tests for you to be able to pass the AWS Certified Developer - Associate exam and develop as well as manage your applications on the AWS platform.
Table of Contents (30 chapters)
Free Chapter
1
Overview of AWS Certified Developer - Associate Certification

Introducing encryption

Encryption is the process of converting data into a format where only an authorized person is able to access it. Such conversion is called encoding. Data is encoded using an encryption key; an encryption key is a random string containing some random characters or bits. The randomness of the characters in a key is achieved by using algorithms to ensure that each key is unique and unpredictable.

There are two popular types of encryption:

  • Symmetric encryption
  • Asymmetric encryption

Symmetric encryption

Symmetric encryption uses a single key in order to encrypt or decrypt data. It uses a secret key that can be a number, a word, or a string of random characters. This key is used with an encryption algorithm...