This hands-on course covers all of the major components of Amazon Web Services Virtual Private Clouds - Regions, Availability Zones, subnets, routing, Internet access, security, load balancing, peering, VPNs, and Direct Connect. Every topic is covered from the perspective that you're new to it and goes into detail. All technologies are demonstrated with fully working examples. By the end of the course you will be able to configure Virtual Private Clouds in your sleep!
Introducing AWS and AWS VPCs Right, so the idea of this module is to get you introduced to AWS and in particular VPCs. But you know what? I'm itching to get started proper with the course, so I'm not going to spend a massive amount of time here, just enough so that you can grasp what the whole thing is about, and I suppose, right, if you already know the score, but do decided to stick around and watch anyway, then it's not going to steal too much of your time. That said though, if you really are clued up on AWS and VPCs, then yeah, feel free to ditch this module and roll straight on over to module 3, where we're going to build a quick little VPC using the wizard. Still with us? Okay. Just two things really for this module, what is AWS and what is a VPC?
Securing Your VPC Right then, time to talk security, something that I hope none of us ignore anymore. I'd be willing to wager a large bet, right, that if you don't do security you're going to take a bad beating at some time pretty soon. Seriously, the bad guys will descend on you like a thief in the night. So for the rest of this lesson we're going to learn some really important AWS defensive technologies, Security groups and network access control lists. Now these are by no means the only security technologies available to us on AWS, but they're two that fall squarely within our VPC _____. Anyway, I just can't tell you how strongly I recommend them, both of them. Make no mistake, right, we live in dangerous times and in a lot of ways the internet is like the Wild West. We're all there like grabbing land and sticking our flag in the ground and the likes, but beware, there's all kinds of wanted men and women lurking in dark alleyways looking to rob you and beat you. You know what? You can't call 911 or whatever and have someone come and rescue you. On the internet you really are on your own in a lot of ways, so lock down the homestead and pay your guards well. Good grief, I can waffle. Anyway, right, I'm just going to talk quickly about like the uber high level of both technologies, setting the scene and the sorts, yeah. Then, we'll jump into a bit more detail around each tech, we'll cover off the theory of security groups first, and then we'll go and implement them. And we'll do the same with network ACLs, we'll cover off the theory first and then we'll put them into practice and once we're done, well I was going to say, we'll be experts, but that's not true, right. Experts is a strong term and I don't like throwing it around casually, so while we won't be experts, we will be well up to speed and we'll be at a decent level. So let's crack on.