AWS CloudShell is a powerful and safe way to use the command line interface (CLI) in your browser.
The “how” of security has dramatically changed with cloud computing, but the underlying strategies still remain very similar. There are many new opportunities to adopt the power and benefits of the cloud within our security strategies and programs.
I recently took the AWS Security Fundamentals Training course and passed the exam. The AWS Security Fundamentals Training course is a great place to start if you are interested in earning your AWS Security Speciality Certification.
Amazon Inspector is an automated security assessment service that helps improve the security and compliance of applications deployed on AWS. It assesses applications for vulnerabilities or deviations from best practices developed by AWS. After performing an assessment, Amazon Inspector produces a detailed list of security findings prioritized by level of severity that can and should be reviewed by qualified information security professionals.
The AWS Management Console, along with the AWS CLI, can produce powerful results for auditors across multiple regulatory, standards, and industry authorities. I am going to cover some of the key sources that produce important and meaningful log information that you can use within your audit and compliance program.
I just successfully completed the 6 hour AWS Cloud Practitioner Essentials Training course and I passed the course final exam as well.
Hi, I wanted to share that I took the AWS Business Professional training course and passed the exam today.
Just a quick note to share that I took the AWS Partner Network AWS Technical Professional Training today along with the exam and I passed.
The AWS Global Cloud Infrastructure currently offers over 200 fully featured services from data centers globally – more than any other public cloud service provider.
Identity and access management (IAM) is the new perimeter in our cloud-based world. IAM is a way to tell who a user is and what they are allowed to do, so it is critical that IAM is implemented correctly and securely.