4.15 out of 5
4.15
14 reviews on Udemy

Networking and Security Best Practices on AWS

Build secure web facing applications by learning the fundamental technologies required to secure your applications from
Instructor:
Packt Publishing
152 students enrolled
English [Auto-generated]
Understand how to create your own virtual private cloud
Build fine-grained network access controls
Discover the important differences between NAT instances and NAT gateways
Learn how to create, track, and manage user access control levels
Understand how to integrate your virtual cloud with a local network

This course will show you how to get started with the fundamental technologies required to secure your applications from the beginning of the architecture/development process: Identity Access Management (IAM) and Virtual Private Clouds (VPCs). Combined, these two technologies give you the essential capability you will need to create a secure and isolated virtual datacenter in the cloud, complete with fine-grained user access controls and activity monitoring.

About The Author

Colibri is a technology consultancy company founded in 2015 by James Cross and Ingrid Funie. The company works to help its clients navigate the rapidly changing and complex world of emerging technologies, with deep expertise in areas like big data, data science, machine learning, and cloud computing. Over the past few years they have worked with some of the world’s largest and most prestigious companies, including a tier 1 investment bank, a leading management consultancy group, and one of the world’s most popular soft drinks companies, helping each of them to make better sense of their data, and process it in more intelligent ways. The company lives by its motto: Data -> Intelligence -> Action.

James Cross is a Big Data Engineer and certified AWS Solutions Architect with a passion for data-driven applications. He’s spent the last 3-5 years helping his clients to design and implement huge-scale, streaming big data platforms, Cloud-based analytics stacks, and serverless architectures.

He started his professional career in Investment Banking, working with well-established technologies such as Java and SQL Server, before moving into the big data space. Since then he’s worked with a huge range of Big Data tools including most of the Hadoop eco-system, Spark, and many No-SQL technologies such as Cassandra, MongoDB, Redis, and DynamoDB. More recently his focus has been on Cloud technologies and how they can be applied to data analytics, culminating in his work at Scout Solutions as CTO, and more recently with Mckinsey.

James is an AWS certified solutions architect with several years’ experience designing and implementing solutions on this cloud platform. As CTO of Scout Solutions Ltd, he built a fully serverless set of API’s and analytics stacks based around Lambda and Redshift.

He is interested in almost anything that has to do with technology. He has worked with everything from WordPress to Hadoop, from C++ to Java, and from Oracle to DynamoDB. If it’s new and solves a problem in an innovative way he’s keen to give it a go!

Identity Access Management

1
The Course Overview

This video provides an overview of the entire course.

2
IAM and Where It Fits into the AWS Ecosystem

In this video, you will gain a first glance understanding of IAM and why it’s so important to cloud computing.

3
Hands-on with IAM

In this video, we have an example of how to create users, groups, and roles with IAM.

4
IAM Roles and How to Use them

In this video, you will gain an understanding of how we can leverage IAM roles and policies to secure our infrastructure without needing to store access credentials.

Virtual Private Clouds

1
VPCs and Their Role in Cloud Computing

In this video, you will learn what a virtual private cloud is, the components of a VPC, and how this technology allows us to replicate complex on-premise networks in the cloud.

2
How to Build Your Own Custom VPC?

In this video, we have an example of how to create your own custom VPC.

3
NAT Instances and NAT Gateways

This video teaches us what NAT is and explores the differences between NAT instances and NAT gateways.

4
Access Control Lists

Understanding network access control lists and when to use them versus security groups.

5
VPC Flow Logs

A hands-on example of how to create and leverage VPC flow logs to monitor network traffic within our VPC.

6
VPC Peering

A brief overview of how to peer multiple VPCs, including across multiple accounts, and the limitations of doing so.

7
Cleaning Up a VPC

A hands-on tutorial showing you how to tear down your virtual infrastructure to prevent you being charged.

8
Integrating VPCs with On-premise Networks

An overview of the options available for integrating on-premise services with VPCs in the cloud

You can view and review the lecture materials indefinitely, like an on-demand channel.
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don't have an internet connection, some instructors also let their students download course lectures. That's up to the instructor though, so make sure you get on their good side!
4.2
4.2 out of 5
14 Ratings

Detailed Rating

Stars 5
7
Stars 4
3
Stars 3
2
Stars 2
2
Stars 1
0
728c6605af8bc169277cb6b84e9c637b
30-Day Money-Back Guarantee

Includes

2 hours on-demand video
Full lifetime access
Access on mobile and TV
Certificate of Completion