Company: Packt Publishing Author: James Cross Full Title: Networking And Security Best Practices On AWS Year: 2017 Language: English Genre: Educational: Cloud Computing Skill Level: - Price: €124.99 - Files: MP4 Time: 01:51:51 Video: AVC, 1920 x 1080 (1.778) at 30.000 fps, 450 kbps Audio: AAC at 123 Kbps, 2 channels, 48.0 KHz Build secure web facing applications by learning the fundamental technologies required to secure your applications from the beginning of the architecture/development process. This course will show you how to get started with the fundamental technologies required to secure your applications from the beginning of the architecture/development process: Identity Access Management (IAM) and Virtual Private Clouds (VPCs). Combined, these two technologies give you the essential capability you will need to create a secure and isolated virtual datacenter in the cloud, complete with fine-grained user access controls and activity monitoring. Style and Approach With easy to follow steps, this course explains how to get started with the fundamental technologies like Identity Access Management (IAM) and Virtual Private Clouds (VPCs). The course practically demonstrates how to create a secure and isolated virtual datacenter in the cloud. Learn: ✓ Understand how to create your own virtual private cloud ✓ Build fine-grained network access controls ✓ Discover the important differences between NAT instances and NAT gateways ✓ Learn how to create, track, and manage user access control levels ✓ Understand how to integrate your virtual cloud with a local network Features: ✓ Get hands-on with IAM ✓ Build your own custom VPC ✓ Integrate the VPC with On-Premise Networks Lessons: 1. Identity Access Management 01. The Course Overview 02. IAM and Where It Fits into the AWS Ecosystem 03. Hands-on with IAM 04. IAM Roles and How to Use them 2. Virtual Private Clouds 05. VPCs and Their Role in Cloud Computing 06. How to Build Your Own Custom VPC? 07. NAT Instances and NAT Gateways 08. Access Control Lists 09. VPC Flow Logs 10. VPC Peering 11. Cleaning Up a VPC 12. Integrating VPCs with On-premise Networks Our members see more. Join us! ------------- Our members see more. Join us!