Amazon Web Services gives you a lot of options for deploying applications and securing your resources. This course will give you experience using the best methods of deployment and how to use AWS security services to protect your account.
AWS gives developers a lot of options, but it can be overwhelming to know the best way to deploy applications or how to secure your resources. In this course, AWS Developer: Deployment and Security, you will learn foundational knowledge and gain the ability to deploy applications to AWS and secure your AWS infrastructure. First, you will learn how to efficiently deploy resources and applications. Then, you will explore how to secure your resources in a VPC. Finally, you will see how to use Users, Groups, and Roles to give permissions to your resources. When you’re finished with this course, you will have the skills and knowledge of AWS deployment and security needed to ensure your AWS resources are secure and maintainable.
Course Overview Hi everyone, my name is Ryan Lewis and welcome to my course, AWS Developer Deployment and Security. I've been architecting and creating applications in AWS for many years in my work for large enterprises as a senior engineer. Amazon Web Services is the perfect platform to deploy your application to in order to reach the widest audience, but there are many different ways to perform that deployment. You also may have heard that AWS has been in the news recently when companies who hadn't properly secured their AWS resources experienced data breaches, often for entirely avoidable reasons. In this course, we're going to learn how to deploy applications to AWS, and then, how to secure the resources that we create. We'll use a combination of the AWS CLI and the AWS Console to gain this experience. Some of the major topics that we will cover include deploying applications using CloudFormation and Elastic Beanstalk. Coordinating application services using simple workflow. Securing your resources using virtual private cloud, and authenticating and authorizing entities with the identity and access management service. By the end of this course, you'll have a new understanding for the best ways to deploy applications and secure your AWS account. Before beginning the course, you should have a good understanding of AWS services and have some experience using them. I hope you'll join me on this journey to master Amazon Web Services with the AWS Developer Deployment and Security course here at Pluralsight.
Deploying Applications to AWS Hello, and welcome back to AWS Developer Deployment and Security. This module's going to tackle creating resources and deploying your applications to AWS with much simpler methods than before. In the previous courses, we used code and clicking to manually create resources and deploy applications. These methods work, but we'll learn better ways that will reduce human error and improve the reproducibility of your deployments. We'll start this module by talking about what CloudFormation does and what exactly a CloudFormation stack is. Once we understand CloudFormation stacks, we'll look at the templates that create them and use them to deploy our application to an EC2 instance using CloudFormation. Creating a CloudFormation stack is only the beginning. We'll then look at updating, managing, and deleting CloudFormation stacks. Next, we'll move on to Elastic Beanstalk where we'll install and use the Elastic Beanstalk CLI tool. And finally, we'll deploy our application using Elastic Beanstalk. We'll be doing a lot of deploying in this module, so let's get started.
Coordinating Services in AWS Welcome back to AWS Developer, Deployment, and Security. This module is going to focus on a service which doesn't quite fit into either one of those topics. Honestly, I had some trouble finding the best place for Simple Workflow the service will be covering, but it does seem to have some similarities with Elastic Beanstalk and CloudFormation since it's kind of a service for services. Simple Workflow is used to coordinate services as they work together to complete a job. It's used as the central point of contact for applications that may be deployed outside of AWS or even for real world tasks. SWF doesn't make decisions on how your workflow is completed, it just provides an interface to be able to pick up new tasks and report back with the results. Although there are some peculiar design decisions with SWF, using it can make long-running jobs be easier to debug, coordinate, and recover from failure. Let's take a look at what we'll be covering in this module. I'll start by giving an overview of how Simple Workflow works and when it should be used. Then we'll go into detail on some of the key concepts of SWF, workflows, deciders, and workers. Next, I'll walk you through a workflow from start to finish so you can get a full picture. Then we'll go through creating a workflow in SWF. And finally, we'll run the workflow and I'll show you things to be aware of. Let's get started.
Securing Infrastructure in AWS Securing your AWS resources is one of the most important tasks you can do when working in the cloud. There is no point to using the cloud if you aren't going to take security seriously because any innovation or IP is right for the taking without a secure infrastructure. This module is all about helping you configure this infrastructure securely in a straightforward manner. We're going to start by describing how your resources interact with a Virtual Private Cloud, a VPC. Then I'll discuss ingress and egress filtering and why it's so important. Then we'll create a VPC and configure some of the settings. And next, we'll configure VPC flow logs and I'll explain how to read them. And finally, I'll introduce CloudTrail, a really simple service that AWS gives you to keep track of who is doing what in your AWS account. Once this module is complete, you will understand some of the most powerful tools that AWS makes available to secure your infrastructure.
Managing Access to AWS Welcome back to AWS Developer, Deployment, and Security. This module is going to focus on an aspect of AWS security that is integrated into the very fiber of how AWS functions and that's IAM, Identity and Access Management. This service manages who can get access to what in AWS and what actions they can perform. There is, of course, a lot of details beyond that, but that's the fundamental structure of what IAM does. Nearly every service in AWS is touched by IAM and it's an essential piece of a secure AWS account. Let's take a look at what we'll be learning in this module. I'll start by going into the detail on how IAM works and its function as the security layer that provides authentication and authorization for AWS. Then I'll explain how users, groups, and roles function and when you should use them to design your AWS account security. Next, we'll create some users and clean up their permissions by using groups. Then we'll create a role and practice using it with the AWS CLI. And finally, we'll take a look at how you can manage access to S3 content. Let's get started.