Dealing with unbalanced datasets – Data Preparation and Transformation – MLS-C01 Study Guide

Dealing with unbalanced datasets At this point, you might have realized why data preparation is probably the longest part of the data scientist’s work. You have learned about data transformation, missing data values, and outliers, but the list of problems goes on. Don’t worry – you are on the right journey to master this topic! […]

Configuring DNSSEC – Hybrid and Multi-account DNS – ANS-C01 Study Guide

Configuring DNSSEC As you learned in Chapter 2, DNS Security is a feature added to Route 53 that adds digital signing for public hosted zones, and validation for the Route 53 Resolvers. Data origin, authentication, and integrity verifications are features of this security extension for DNS. Each record in a Route 53 hosted zone is […]

Backups and Snapshots – Backup and Restore Strategies – SOA-C02 Study Guide

Backups and Snapshots Those services that do need to be backed up have a few options. If the service runs on an EBS volume, a point-in-time snapshot of that EBS volume can be taken. All snapshots in AWS are incremental. This means that each snapshot captures only the blocks that have changed since the last […]

AWS Config Managed Rules – Managing Your Environment with AWS Config – SCS-C02 Study Guide

AWS Config Managed Rules AWS provides lists of AWS managed rules. These are predefined yet customizable rules that the Config service can use to evaluate your resources and determine whether they comply with the standard best practices that that rule set has laid out. You do not need to write a corresponding Lambda function to […]

Automating the Protection – Determining Security Requirements and Controls – SAP-C02 Study Guide

Automating the Protection Finally, automate all security maintenance tasks as much as possible. Repetitive manual tasks are error-prone and should be avoided at all costs. It may take you a bit more time to put the automation in place at first, but it will pay off from the very beginning as your AWS footprint grows. […]

Important note 4 – Data Preparation and Transformation – MLS-C01 Study Guide

Important note In the case of categorical variables, you can replace the missing data with the value that has the highest occurrence in your dataset. The same logic of grouping the dataset according to specific features is still applicable. You can also use more sophisticated methods of imputation, including constructing an ML model to predict […]

Backup and Restore Strategies – SOA-C02 Study Guide

This chapter covers the following official AWS Certified SysOps Administrator – Associate (SOA-C02) exam domains: Domain 2: Reliability and Business Continuity Domain 4: Security and Compliance (For more information on the official AWS Certified SysOps Administrator – Associate [SOA-C02] exam topics, see the Introduction.) At this point you should be familiar with how to make […]

TXT Record – Hybrid and Multi-account DNS – ANS-C01 Study Guide

TXT Record Text records are containers used by administrators to attach both human- and machine-readable notes to the zones. TXT records are used to validate, for example, email ownership, application licensing, or any information about a server, network, data center, company, or accounting data. The TXT record is formatted as standard UTF-8 ASCII text data. […]

Resource Relationship – Managing Your Environment with AWS Config – SCS-C02 Study Guide

Resource Relationship AWS Config allows you to find, for any of your resources, what other AWS resources they are connected to or associated with. You can obtain this information from either the AWS Management Console or via commands from the CLI. Since you are already in the Management Console looking at the dashboard, try viewing […]

Protecting the Compute – Determining Security Requirements and Controls – SAP-C02 Study Guide

Protecting the Compute What should you do to ensure the protection of your application’s Amazon EC2 instances, containers, AWS Lambda functions, databases, and so on? Well, to start with, you want to design an AWS environment that has proper resource isolation. There are multiple means of achieving this isolation, as we have seen in Chapter […]