Book Image

Networking and Security Best Practices on AWS [Video]

By : James Cross
Book Image

Networking and Security Best Practices on AWS [Video]

By: James Cross

Overview of this book

<p>This course will show you how to get started with the fundamental technologies required to secure your applications from the beginning of the architecture/development process: Identity Access Management (IAM) and Virtual Private Clouds (VPCs). Combined, these two technologies give you the essential capability you will need to create a secure and isolated virtual datacenter in the cloud, complete with fine-grained user access controls and activity monitoring.</p> <h1>Style and Approach</h1> <p>With easy to follow steps, this course explains how to get started with the fundamental technologies like Identity Access Management (IAM) and Virtual Private Clouds (VPCs).</p> <p>The course practically demonstrates how to create a secure and isolated virtual datacenter in the cloud.</p>
Table of Contents (2 chapters)
Chapter 2
Virtual Private Clouds
Content Locked
Section 6
VPC Peering
A brief overview of how to peer multiple VPCs, including across multiple accounts, and the limitations of doing so. - What is VPC peering - When to peer VPCs - Limitations of VPC peering