Networking and Security Best Practices on AWS
This course will show you how to get started with the fundamental technologies required to secure your applications from the beginning of the architecture/development process: Identity Access Management (IAM) and Virtual Private Clouds (VPCs). Combined, these two technologies give you the essential capability you will need to create a secure and isolated virtual datacenter in the cloud, complete with fine-grained user access controls and activity monitoring.
About The Author
Colibri is a technology consultancy company founded in 2015 by James Cross and Ingrid Funie. The company works to help its clients navigate the rapidly changing and complex world of emerging technologies, with deep expertise in areas like big data, data science, machine learning, and cloud computing. Over the past few years they have worked with some of the world’s largest and most prestigious companies, including a tier 1 investment bank, a leading management consultancy group, and one of the world’s most popular soft drinks companies, helping each of them to make better sense of their data, and process it in more intelligent ways. The company lives by its motto: Data -> Intelligence -> Action.
James Cross is a Big Data Engineer and certified AWS Solutions Architect with a passion for data-driven applications. He’s spent the last 3-5 years helping his clients to design and implement huge-scale, streaming big data platforms, Cloud-based analytics stacks, and serverless architectures.
He started his professional career in Investment Banking, working with well-established technologies such as Java and SQL Server, before moving into the big data space. Since then he’s worked with a huge range of Big Data tools including most of the Hadoop eco-system, Spark, and many No-SQL technologies such as Cassandra, MongoDB, Redis, and DynamoDB. More recently his focus has been on Cloud technologies and how they can be applied to data analytics, culminating in his work at Scout Solutions as CTO, and more recently with Mckinsey.
James is an AWS certified solutions architect with several years’ experience designing and implementing solutions on this cloud platform. As CTO of Scout Solutions Ltd, he built a fully serverless set of API’s and analytics stacks based around Lambda and Redshift.
He is interested in almost anything that has to do with technology. He has worked with everything from WordPress to Hadoop, from C++ to Java, and from Oracle to DynamoDB. If it’s new and solves a problem in an innovative way he’s keen to give it a go!
Identity Access Management
This video provides an overview of the entire course.
In this video, you will gain a first glance understanding of IAM and why it’s so important to cloud computing.
In this video, we have an example of how to create users, groups, and roles with IAM.
In this video, you will gain an understanding of how we can leverage IAM roles and policies to secure our infrastructure without needing to store access credentials.
Virtual Private Clouds
In this video, you will learn what a virtual private cloud is, the components of a VPC, and how this technology allows us to replicate complex on-premise networks in the cloud.
In this video, we have an example of how to create your own custom VPC.
This video teaches us what NAT is and explores the differences between NAT instances and NAT gateways.
Understanding network access control lists and when to use them versus security groups.
A hands-on example of how to create and leverage VPC flow logs to monitor network traffic within our VPC.
A brief overview of how to peer multiple VPCs, including across multiple accounts, and the limitations of doing so.
A hands-on tutorial showing you how to tear down your virtual infrastructure to prevent you being charged.
An overview of the options available for integrating on-premise services with VPCs in the cloud