Security Considerations for AWS Lambda – AWS Security Fundamentals – SCS-C02 Study Guide

Security Considerations for AWS Lambda Now that you have a general understanding of the AWS Lambda service, you can examine some of the security considerations to be aware of when using it: With a look at AWS Lambda, this section wrapped up the overview of AWS compute services. Next, you will look at the networking […]

Introducing ML frameworks – Machine Learning Fundamentals – MLS-C01 Study Guide

Introducing ML frameworks Being aware of some ML frameworks will put you in a much better position to pass the AWS Machine Learning Specialty exam. There is no need to master these frameworks since this is not a framework-specific certification; however, knowing some common terms and solutions will help you to understand the context of […]

Application Services – Introduction to AWS – SOA-C02 Study Guide

Application Services Several offerings fit into the application services. They enable you to perform work and provide extensions to your applications that can make them more unified and scalable and can allow you to offload more expensive components running in the cloud. Examples include Amazon API Gateway: A fully managed API management and deployment service. […]

AWS Lambda – AWS Security Fundamentals – SCS-C02 Study Guide

AWS Lambda AWS Lambda is a serverless compute service that allows you to run your code as a function without needing to set up or provision any servers or orchestrate any containers. Rather than being classified as the usual IaaS or PaaS, it falls under the category of Function as a Service (FaaS). It automatically […]

Designing Networks for Complex Organizations – SAP-C02 Study Guide

Networking is a key aspect in meeting the security and compliance requirements of an organization. It determines whether and how resources in your Amazon Web Services (AWS) environment can be accessed from anywhere in your organization and beyond. This chapter will cover the services on AWS that can be used to design hybrid networks, allowing […]

Using User Data Scripts to Configure EC2 Instances at Launch – AWS Security Fundamentals – SCS-C02 Study Guide

Using User Data Scripts to Configure EC2 Instances at Launch Although you can launch EC2 instances and then go and configure the software packages that you need on them manually, there are more efficient approaches. Following manual steps can lead to human mistakes and is a much more time-consuming process that can otherwise easily be […]

Global Accelerator Architecture – Network Design – ANS-C01 Study Guide

Global Accelerator Architecture The Anycast IP addresses are injected into the Internet’s BGP tables to advertise each public interface into the AWS network. The same IP address is advertised for each edge location to allow traffic to enter the network at its closest entry point from the user by using BGP reachability metrics. This reduces […]

Leveraging Access Delegation – Determining an Authentication and Access Control Strategy for Complex Organizations – SAP-C02 Study Guide

Leveraging Access Delegation You are now going to investigate access delegation. Access delegation is essentially used for the following reasons: Now, start by examining these cases. Temporary Access Delegation Take for instance, the first use case where you need to provide trusted users, applications, or AWS services with temporary security credentials so that they can […]

Sticky Connections – Network Design – ANS-C01 Study Guide

Sticky Connections Sticky connections bind a user’s connections though the ELB to a specific target for the duration of the connection. All connections from the user for the session will always be directed to the same backend target. Some applications maintain state information at the server level such as checkout carts or other session tracking […]

Overfitting and underfitting – Machine Learning Fundamentals – MLS-C01 Study Guide

Overfitting and underfitting ML models might suffer from two types of fitting issues: overfitting and underfitting. Overfitting means that your model performs very well on the training data but cannot be generalized to other datasets, such as testing and, even worse, production data. In other words, if you have an overfitted model, it only works […]