Book Image

Networking and Security Best Practices on AWS [Video]

By : James Cross
Book Image

Networking and Security Best Practices on AWS [Video]

By: James Cross

Overview of this book

<p>This course will show you how to get started with the fundamental technologies required to secure your applications from the beginning of the architecture/development process: Identity Access Management (IAM) and Virtual Private Clouds (VPCs). Combined, these two technologies give you the essential capability you will need to create a secure and isolated virtual datacenter in the cloud, complete with fine-grained user access controls and activity monitoring.</p> <h1>Style and Approach</h1> <p>With easy to follow steps, this course explains how to get started with the fundamental technologies like Identity Access Management (IAM) and Virtual Private Clouds (VPCs).</p> <p>The course practically demonstrates how to create a secure and isolated virtual datacenter in the cloud.</p>
Table of Contents (2 chapters)
Chapter 2
Virtual Private Clouds
Content Locked
Section 5
VPC Flow Logs
A hands-on example of how to create and leverage VPC flow logs to monitor network traffic within our VPC. - What is a flow log - Create a Cloudwatch log group and pushing flow logs to it - Generate traffic and monitoring the flw log