-
Amazon EC2. Amazon Elastic Compute Cloud (Amazon EC2) is a web service that provides resizable compute capacity in the cloud. With Amazon EC2 you launch virtual server instances on the AWS cloud. Each virtual server is known as an “instance”. You use preconfigured templates for your instances known as Amazon Machine Images (AMIs). Each AMI ... Read More
-
How to Peer Virtual Networks using the Hub and Spoke Method with Azure CLI
How to Peer Virtual Networks using the Hub and Spoke Method with Azure CLI Our Use Case Let’s say your company is now ready to implement virtual network peering. You want to connect systems that are deployed in different virtual networks. To test this plan, you’ll start by creating virtual networks to support the services your company is alrea... Read More
-
How to setup RDP on an Azure VM
How to setup RDP on an Azure VM Introduction I wants to secure a Network Traffic to ensure that access to virtual machines is restricted. To do this, I need to: Create and configure network security groups. Associate network security groups to virtual machines. Connect on an Azure virtual machine using RDP Deny and allow access to the... Read More
-
Possible Exam Questions
Possible Exam Questions So remember that for the exam. The physical tokens come from third parties. it’s important to note that with IAM, we never need to select a region. So that’s something that pops up in exam questions quite a lot. Where you get some kind of scenario, where users are being added to some other geograp... Read More
-
The AWS Security Token Service(STS)
The AWS Security Token Service(STS). This is the service that provides what are known as short lived or temporary credentials. So let’s have a look at how STS works because it’s important to understand this. So we have an EC2 instance. And in this case, this EC2 instance is running an application. And the application needs to write some files o... Read More
-
Permissions Boundaries
Permissions Boundaries Permissions boundaries are a really useful tool for controlling the maximum available permissions for our user accounts. Here is a diagrams to show you how this works and use the diagram to understand the situation below. So let’s look at a situation. We’ve got Joanne here and she wants to access an S3 bucket and she wa... Read More
-
Identity Based Policies and Resource Based Policies.
Identity Based Policies and Resource Based Policies. Identity Based Policies. Remember that these are Jason based permissions, policy documents that control the actions and identity and performance. They’re applied to an identity, and they control the actions that the identity can perform on resources and under what specific conditions. So let... Read More
-
Identity Based Policies and Resource Based Policies.
Read More
-
IAM Policy Simulator
IAM Policy Simulator There is a link attached to this lesson that you’ll need to follow to open the IAM policy simulator Click Here As seen on the webpage, this is the main page for the policy simulator. On the left hand side, we can choose users, groups, or roles. Let’s keep it on users. You user account on the left. Now, choose your user... Read More
-
IAM Best Practise
Best practices for using the IAM service. Now, really important to know these. Again, this is something that comes up in the exam. So it’s a bit of a bullet point list, but it’s really important to understand this. So the first thing is that you should lock away your AWS account root user access keys. So you remember I talked about the root ... Read More
-
Evaluation Logic
Evaluation Logic There is a bit of complexity in how IAM evaluates whether you’re allowed or denied from performing any particular action or operation. Now, this is straight from AWS and this is their logical flow of how we go through the process of determining whether you are allowed or denied from doing something. Before we actually go thr... Read More
-
Create IAM User Account
How to create an individual IAM user account You can use this user account to log in throughout the rest of the course. Remember that the root user logs in with the email address that we used to create the account. Now, the root user has full permissions to the account, and those are totally unrestricted. And in fact, it’s very difficult, if n... Read More
-
How to explore the authentication options in AWS and MFA
How to explore the authentication options in AWS and also Multi-Factor Authentication, or MFA. With our user account called John. John wants to log into AWS. He does so through using his username and a password, and potentially an MFA token. Once he’s then authenticated, he can then get access to the management console and perform operations in... Read More
-
AWS certification
THE 4 DOMAINS IN THE SOLUTIONS ARCHITECT ASSOCIATE EXAM Domain1: Design Resilient Architectures 1.1 Design a multi-teir architectur solution 1.2 Design highly available and/or fault-tolerant architectures 1.3 Design decoupling mechanisms using AWS services 1.4 Choose appropraite reslient storage Domain2: Design high Performing Architectures. 2... Read More
-
Becoming a Software Developer
I Started watching Youtube videos I then started applying for Bootcamp, which i got and finished it. I applied for a fulltime Software Development course, which i got and graduated as a Software Developer. Software Developer is practise practise practise. so that is exactly what I’m doing That is a little bit about my tech journey. Read More
-
Introduction to Python
Introduction to Python This post is meant to summarize some of the key concepts I have learned in the course Introduction to Python Read More
-
Markdown Guide
Resources This is a good guide to learn about the basic markdown syntax. Read More