Book Image

Networking and Security Best Practices on AWS [Video]

By : James Cross
Book Image

Networking and Security Best Practices on AWS [Video]

By: James Cross

Overview of this book

<p>This course will show you how to get started with the fundamental technologies required to secure your applications from the beginning of the architecture/development process: Identity Access Management (IAM) and Virtual Private Clouds (VPCs). Combined, these two technologies give you the essential capability you will need to create a secure and isolated virtual datacenter in the cloud, complete with fine-grained user access controls and activity monitoring.</p> <h1>Style and Approach</h1> <p>With easy to follow steps, this course explains how to get started with the fundamental technologies like Identity Access Management (IAM) and Virtual Private Clouds (VPCs).</p> <p>The course practically demonstrates how to create a secure and isolated virtual datacenter in the cloud.</p>
Table of Contents (2 chapters)
Chapter 1
Identity Access Management
Content Locked
Section 2
IAM and Where It Fits into the AWS Ecosystem
In this video, you will gain a first glance understanding of IAM and why it’s so important to cloud computing. - Understand what IAM is - Know the components of IAM - Know why we need IAM with cloud computing