Ends in
00
days
00
hrs
00
mins
00
secs
ENROLL NOW

AWS Specialty Sale - 40% OFF

aws guide

/Tag: aws guide

AWS DataSync vs Storage Gateway

2021-08-12T02:41:25+00:00

Learn more about the use cases and differences between AWS Data Sync and Storage Gateway in this comparison table:   DataSync Storage Gateway Description AWS DataSync is an online data transfer service that simplifies, automates, and accelerates the process of copying large amounts of data to and from AWS storage services over the Internet or over AWS Direct Connect. AWS Storage Gateway is a hybrid cloud storage service that gives you on-premises access to virtually unlimited cloud storage by linking it to S3. Storage Gateway provides 3 types of storage interfaces for your on-premises applications: file, volume, and tape. How [...]

AWS DataSync vs Storage Gateway2021-08-12T02:41:25+00:00

Amazon Neptune

2021-06-16T02:12:11+00:00

Bookmarks How it Works Common Use Cases Performance Reliability Backup And Restore Security Pricing Monitoring Limitations Amazon Neptune is a fully managed graph database service used for building applications that work with highly connected datasets. Optimized for storing billions of relationships between pieces of information. Provide milliseconds latency when querying the graph. Neptune supports graph query languages like Apache TinkerPop Gremlin and W3C's SPARQL. How it works Common Use Cases Social Networking Amazon Neptune can easily process user’s interactions like comments, follows, and likes in a social network [...]

Amazon Neptune2021-06-16T02:12:11+00:00

AWS Secrets Manager vs Systems Manager Parameter Store

2021-09-28T07:33:01+00:00

Bookmarks AWS Systems Manager Parameter Store AWS Secrets Manager Similarities and Differences Managing the security of your applications is an integral part of any organization especially for infrastructures deployed in the cloud. One aspect of application security is how the parameters such as environment variables, database passwords, API keys, product keys, etc. are stored and retrieved. As a best practice, secret information should not be stored in plain text and not be embedded inside your source code. It is also recommended to set up an automated system to rotate passwords or keys regularly (which [...]

AWS Secrets Manager vs Systems Manager Parameter Store2021-09-28T07:33:01+00:00

Step Scaling vs Simple Scaling Policies vs Target Tracking Policies in Amazon EC2

2021-05-12T06:42:22+00:00

Bookmarks Simple Scaling  Target Tracking Step Scaling  Creating a Step Scaling Policy for an Auto Scaling Group Amazon’s EC2 Auto Scaling provides an effective way to ensure that your infrastructure is able to dynamically respond to changing user demands. For example, to accommodate a sudden traffic increase on your web application, you can set your Auto Scaling group to automatically add more instances. And when traffic is low, have it automatically reduce the number of instances. This is a cost-effective solution since it only provisions EC2 instances when you need them. EC2 Auto [...]

Step Scaling vs Simple Scaling Policies vs Target Tracking Policies in Amazon EC22021-05-12T06:42:22+00:00

Locking your Glacier Vault using the Amazon S3 Glacier API

2021-05-04T07:21:44+00:00

What is Amazon S3 Glacier Vault Lock A Glacier Vault can be described as a container for your archived objects in S3 Glacier. To begin using Amazon S3 Glacier, you need a vault. Creating and deleting vaults can be easily done in the AWS Management Console, but interacting with them requires you to use the APIs. For example, let’s say you want to upload images or log files to your vault. To do so, you would either use the AWS CLI or write code that would upload these objects. Large corporations often have compliance requirements with how they store their [...]

Locking your Glacier Vault using the Amazon S3 Glacier API2021-05-04T07:21:44+00:00

AWS Fargate

2021-07-14T08:10:48+00:00

Bookmarks How It Works Use Case Network Compliance Pricing A serverless compute engine for containers that works with both Amazon Elastic Container Service (ECS) and Amazon Elastic Kubernetes Service (EKS). With Fargate, no manual provisioning, patching, cluster capacity management, or any infrastructure management required. How It Works Use Case Launching containers without having to provision or manage EC2 instances. If you want a managed service for container cluster management. Configurations Amazon ECS task definitions for Fargate require that you specify CPU and memory at the task level (task definition). Amazon ECS task [...]

AWS Fargate2021-07-14T08:10:48+00:00

Amazon Detective

2021-05-13T07:41:19+00:00

Bookmarks Concepts Limits Common Use Cases The service automatically collects log data from your AWS resources and uses machine learning, statistical analysis, and graph theory to build a linked set of data that enables you to easily conduct faster and more efficient security investigations.  Can be integrated with AWS security services like Amazon GuardDuty, Amazon Macie, and AWS Security Hub as well as partner security products to identify potential security issues, or findings. Amazon Detective can analyze trillions of events from multiple data sources such as VPC Flow Logs, AWS CloudTrail, and Amazon GuardDuty, [...]

Amazon Detective2021-05-13T07:41:19+00:00

Customer Master Key (CMK) Policy Management in AWS KMS

2021-05-04T07:23:35+00:00

What is a Customer Master Key (CMK)? In security, a master key is what you use to encrypt all other encryption keys in your system. Customer master keys are logical representations of a master key. They are the primary resources in AWS KMS. The CMK contains the key material used to encrypt and decrypt data. It also contains metadata such as the key ID, creation date, description, and key state. You can start using AWS KMS through the web console or via API. There are two types of CMKs that you can create in AWS KMS: symmetric CMK and asymmetric [...]

Customer Master Key (CMK) Policy Management in AWS KMS2021-05-04T07:23:35+00:00

Working with Customer Master Keys (CMKs) using the AWS KMS API

2021-05-04T07:23:51+00:00

What is AWS Key Management Service? AWS Key Management Service (or KMS for short) is the service you use to securely store your encryption keys in AWS. If you need data encryption on your AWS resources, such as EBS volumes or RDS databases, you can use AWS KMS to simplify the process for you. You start using the service by requesting the creation of a customer master key or CMK. By default, AWS KMS creates the key material for your CMK. You also have the option of importing your own keys to AWS if you wish to. Note that during [...]

Working with Customer Master Keys (CMKs) using the AWS KMS API2021-05-04T07:23:51+00:00

AWS Resource Access Manager

2021-06-16T03:37:35+00:00

A service that enables you to easily and securely share AWS resources with any AWS account or, if you are part of AWS Organizations, with Organizational Units (OUs) or your entire Organization. If you share resources with accounts that are outside of your Organization, then those accounts will receive an invitation to the Resource Share and can start using the shared resources upon accepting the invitation. Only the master account can enable sharing with AWS Organizations. The organization must be enabled for all features. RAM eliminates the need to create duplicate resources in multiple accounts. You can create resources centrally [...]

AWS Resource Access Manager2021-06-16T03:37:35+00:00

AWS, Azure, and GCP Certifications are consistently among the top-paying IT certifications in the world, considering that most companies have now shifted to the cloud. Earn over $150,000 per year with an AWS, Azure, or GCP certification!

Follow us on LinkedIn, Facebook, or join our Slack study group. More importantly, answer as many practice exams as you can to help increase your chances of passing your certification exams on your first try!