Worry about how to start learning AWS, Solution is here.
Please find the AWS Tutorial in HINDI Language with below section
1) Introduction
2) IAM ( Security Management )
2) S3 ( Storage Management)
3) EC2 ( Backbone of AWS, Instance)
Start Your Training with AWS EASY Learning and its FREE and easy to understand formation each section contains the LAB Practice and you will find the all the details for AWS component using in session.
Wednesday, December 27, 2017
Tuesday, December 26, 2017
What Is IAM
What Is IAM?
When you first create an AWS account, you begin with a single sign-in identity that has complete access to all AWS services and resources in the account. This identity is called the AWS account root user and is accessed by signing in with the email address and password that you used to create the account. We strongly recommend that you do not use the root user for your everyday tasks, even the administrative ones. Instead, adhere to the best practice of using the root user only to create your first IAM user. Then securely lock away the root user credentials and use them to perform only a few account and service management tasks.
IAM Features
IAM gives you the following features:
- Shared access to your AWS account
- You can grant other people permission to administer and use resources in your AWS account without having to share your password or access key.
- Granular permissions
- You can grant different permissions to different people for different resources. For example, you might allow some users complete access to Amazon Elastic Compute Cloud (Amazon EC2), Amazon Simple Storage Service (Amazon S3), Amazon DynamoDB, Amazon Redshift, and other AWS services. For other users, you can allow read-only access to just some S3 buckets, or permission to administer just some EC2 instances, or to access your billing information but nothing else.
- Secure access to AWS resources for applications that run on Amazon EC2
- You can use IAM features to securely give applications that run on EC2 instances the credentials that they need in order to access other AWS resources. Examples include S3 buckets and RDS or DynamoDB databases.
- Multi-factor authentication (MFA)
- You can add two-factor authentication to your account and to individual users for extra security. With MFA you or your users must provide not only a password or access key to work with your account, but also a code from a specially configured device.
- Identity federation
- You can allow users who already have passwords elsewhere—for example, in your corporate network or with an internet identity provider—to get temporary access to your AWS account.
- Identity information for assurance
- If you use AWS CloudTrail, you receive log records that include information about those who made requests for resources in your account. That information is based on IAM identities.
- PCI DSS Compliance
- IAM supports the processing, storage, and transmission of credit card data by a merchant or service provider, and has been validated as being compliant with Payment Card Industry (PCI) Data Security Standard (DSS). For more information about PCI DSS, including how to request a copy of the AWS PCI Compliance Package, see PCI DSS Level 1.
- Integrated with many AWS services
- For a list of AWS services that work with IAM, see AWS Services That Work with IAM.
- Eventually Consistent
- IAM, like many other AWS services, is eventually consistent. IAM achieves high availability by replicating data across multiple servers within Amazon's data centers around the world. If a request to change some data is successful, the change is committed and safely stored. However, the change must be replicated across IAM, which can take some time. Such changes include creating or updating users, groups, roles, or policies. We recommend that you do not include such IAM changes in the critical, high-availability code paths of your application. Instead, make IAM changes in a separate initialization or setup routine that you run less frequently. Also, be sure to verify that the changes have been propagated before production workflows depend on them. For more information, see Changes that I make are not always immediately visible.
- Free to use
- AWS Identity and Access Management is a feature of your AWS account offered at no additional charge. You will be charged only for use of other AWS products by your IAM users. For information about the pricing of other AWS products, see the Amazon Web Services pricing page.AWS Security Token Service is an included feature of your AWS account offered at no additional charge. You are charged only for the use of other AWS services that are accessed by your AWS STS temporary security credentials. For information about the pricing of other AWS services, see the Amazon Web Services pricing page.
Monday, December 25, 2017
Amazon Web services tutorial in English
This AWS Technical course is designed to train participants on various AWS products, services, and solutions. This course, prepared in line with the latest AWS syllabus will help you become proficient in identifying and efficiently using AWS services. The two live projects included in this course ensure that you are well versed in using the AWS platform. The course also contains a LAB demo that helps you learn how to use the AWS console to create instances, S3 buckets, and more.
Uses of cloud computing
Uses of cloud computing
You are probably using cloud computing right now, even if you don’t realize it. If you use an online service to send email, edit documents, watch movies or TV, listen to music, play games or store pictures and other files, it is likely that cloud computing is making it all possible behind the scenes. The first cloud computing services are barely a decade old, but already a variety of organisations—from tiny startups to global corporations, government agencies to non-profits—are embracing the technology for all sorts of reasons. Here are a few of the things you can do with the cloud:
- Create new apps and services
- Store, back up and recover data
- Host websites and blogs
- Stream audio and video
- Deliver software on demand
- Analyse data for patterns and make predictions
Cloud Computing
Cloud. A cloud refers to a distinct IT environment that is designed for the purpose of remotely provisioning scalable and measured IT resources. The term originated as a metaphor for the Internet which is, in essence, a network of networks providing remote access to a set of decentralized IT resources.
Ref:
http://whatiscloud.com/basic_concepts_and_terminology/cloud
Subscribe to:
Posts (Atom)
Wireless Security Configuration: Protect Your Network Now!
Introduction: In today’s connected world, wireless networks are as common as smartphones, and they’re often the gateway to our personal, pr...
-
sudo apt update sudo apt install ubuntu-desktop sudo apt install tightvncserver sudo apt install gnome-panel gnome-settings-daemon metac...
-
How to Setup GUI on Amazon EC2 Ubuntu Server Amazon EC2 Linux servers do not come with GUI, all the operations have to be done using ssh co...
-
Amazon ElastiCache Managed, in-memory data store services. Choose Redis or Memcached to power real-time applications. Amazon...