CloudCertNotes

A repository of the notes I take while preparing for cloud certifications

View on GitHub

AWS Certified Cloud Practitioner

Cloud Concepts

What is cloud computing?

Cloud computing is the practice of using network of remote servers via the internet to store, manage and process data instead of using local, on-premise servers.

Type of cloud deployment models

Business needs and Cloud solutions

Advantages of cloud

Types of cloud computing

AWS Global Infrastructures

Technology

Core Services

Advanced Core Services

Other services

Security Concepts

Shared Responsibility Model

Identity and Access Management

AWS Organizations

AWS Assurance Programs

Services for Auditing and Compliance

Vulnerability and Penetration Testing

AWS Pricing and Billing

Compute Pricing

Database Pricing

Storage Pricing

Cost Management

AWS Calculators

Cost Management Tools

AWS Trusted Advisor

AWS Support Plans

Quick Services Summaries

AWS Database Services

AWS Provisioning Services

Provisioning is the allocation or creation of resources and services to a customer

AWS Computing

AWS Storage

AWS Business Centric Services

AWS Enterprise Integration (going hybrid)

AWS Logging Services

AWS Analytics

AWS Networking and Content Delivery Network

AWS Compliance Programs

A set of internal policies and procedures of a company to comply with laws, rules and regulations or to uphold business reputation

AWS Artifact

No, cost, self-service portal for on-demand access to AWS’ compliance and security reports based on global compliance frameworks.

Amazon Inspector

AWS Inspector runs a security benchmark against specific EC2 instances. Can perform both Host and Network assessments

AWS Web Application Firewall (WAF)

Protects web applications from common web exploits. Write your own rules to allow or deny traffic based on the contents of HTTP requests. Use a ruleset from a trusted AWS Security Partner in the AWS WAF Rules Marketplace. WAF can be attached to CloudFront or an Application Load Balancer.

AWS Shield

Managed DDoS protection service. Standard version has no additional charges and every AWS customer can benefit from it. When you route traffic through Route 53 or CloudFront you use AWS Shield Standard. It protects you against Layer 3, 4, and 7 attacks (Network, Transport, Application).

Penetration Testing

For other simulated events you need a request for authorization from AWS.

Guard Duty

Guard Duty is a threat detection service that continuously monitors for malicious and suspicious activity and unauthorized behavior. It uses ML to analyze AWS logs from CloudTrail, VPC Flow and DNS. It will alert you on findings and you can automate incident response via CloudWatch Events or 3rd party services.

Key Management Service (KMS)

A managed service that makes it easy to create and control encryption keys used to encrypt your data.

Amazon Macie

Fully managed service that monitors S3 data access activity for anomalies and generates alerts when it detect risks of unauthorized access and data leak risks. Works by using ML to analyze CloudTrail logs. It identifies most at-risk uses which could lead to compromises.

Security Groups vs Network Access Control Lists (NACLs)

AWS Virtual Private Network (VPN)

Enables establishment of a secure and private tunnel from a network or device to the AWS global network