Skip to content

Instantly share code, notes, and snippets.

@misho-kr
Last active December 19, 2023 05:56
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save misho-kr/ba8b722f63f9e7a2cbd0ad714701ec6d to your computer and use it in GitHub Desktop.
Save misho-kr/ba8b722f63f9e7a2cbd0ad714701ec6d to your computer and use it in GitHub Desktop.
AWS Technical Essentials

The AWS Technical Essentials Training course introduces cloud computing concepts, fundamental AWS products, services, and common solutions with demos, knowledge checks, and hands-on lab activities. It provides learners with the basic fundamentals to get started on AWS.

Instructor: Dan Puser

  • The basic structure of the statements in an AWS Identity and Access Management policy is as follows:
    • Effect indicates whether to Allow or Deny the permissions
    • Action specifies the API calls that can be made agains the AWS service
    • Resource defines the scope of entities covered by the policy rule
  • Objectibes
    • Explore IAM Users and Groups
    • Inspect IAM Policies applied to groups
    • Experiment with policies and service access
  • Scenarios
    • Create 3 users
    • 3 groups with the following policies
      • S3 Support
      • EC2 Support
      • EC2 Admin
  • Objectibes
    • Launch Amazon Elastic Compote Cloud instance from AMI, with public IP, user data and security group for ssh access
    • Access the web application
    • Connect to the EC2 instance and stop the web app
  • Scenarios
    • Provide bootstrap instructions to the EC2 instance
    • Enable ssh and http access
    • Login and stop the web application
  • Objectibes
    • Set up a new Amazon Virtual Private Cloud with 4 subnets (2 public and 2 private)
    • Set up 2 routing tables (one public and another private)
    • Launch an EC2 instance inside the new VPC
  • Objectibes
    • Create Amazon S3 bucket
    • Modify the S3 bucket policy - a set of permissions associated with S3 bucket
    • Upload and delete objects in S3 bucket
    • Modify an instance to access S3 bucket
      • Applications must sign their API requests with AWS credentials to access other AWS resources
      • One way is to create and distribute AWS credentials with the applications
      • Instead, IAM roles delegate permission to make API requests
  • Objectibes
    • Create an Amazon DynamoDB table
    • Use a web application to add DynamoDB table items
    • Use the AWS Management Console to manage DynamoDB table items
    • Use the console to create DynamoDB table items
  • Objectibes
    • Create an Application Load Balancer and an EC2 launch template
    • Set up Amazon EC2 Auto Scaling group
    • Lanuch a template
    • Stress-test the application to validate the auto-scaling
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment