Organizations SCPs – Determining an Authentication and Access Control Strategy for Complex Organizations – SAP-C02 Study Guide

Organizations SCPs AWS Organizations is a service that allows us to centrally manage multiple AWS accounts belonging to the same organization. It provides the ability to structure them according to a hierarchy of organizational units (OUs). It also provides a feature called SCPs that allows us to limit permissions for all member accounts in either […]

The CRISP-DM modeling life cycle – Machine Learning Fundamentals – MLS-C01 Study Guide

The CRISP-DM modeling life cycle Modeling is a very common term used in ML when you want to specify the steps taken to solve a particular problem. For example, you could create a binary classification model to predict whether the transactions from Table 1.1 are fraudulent or not. A model, in this context, represents all […]

CloudFront Encryption Using SSL/TLS and SNI – Network Design – ANS-C01 Study Guide

CloudFront Encryption Using SSL/TLS and SNI Encrypting data in transit over the Internet is the recommended transport method for web traffic. This relies on the Secure Sockets Layer (SSL)/Transport Layer Security (TLS) services. SSL has been deprecated and replaced by TLS even though the SSL name lives on and is widely used in the industry […]

AWS Global Architecture – Introduction to AWS – SOA-C02 Study Guide

AWS Global Architecture The AWS global architecture has four components: Datacenters Availability zones Regions Edge locations and regional edge caches Datacenters The smallest piece of the AWS infrastructure is a datacenter. AWS builds its own datacenters as well as operates in third-party facilities. Customers have no visibility at the level of datacenters and their locations. […]

Cram Quiz – Introduction to AWS – SOA-C02 Study Guide

Cram Quiz Answer these questions. The answers follow the last question. If you cannot answer these questions correctly, consider reading this section again until you can. 1. Which feature of cloud computing enables customer isolation at the account or network level? A. Rapid elasticity B. Resource pooling C. Monitoring D. Firewalls 2. Which of the following service […]

Introducing supervised learning – Machine Learning Fundamentals – MLS-C01 Study Guide

Introducing supervised learning Supervised algorithms use a class or label (from the input data) as support to find and validate the optimal solution. In Table 1.1, there is a dataset that aims to classify fraudulent transactions from a financial company. Day of the week Hour Transaction amount Merchant type Is fraud? Mon 09:00 $1000 Retail […]

Amazon Elastic Compute Cloud (EC2) – AWS Security Fundamentals – SCS-C02 Study Guide

Amazon Elastic Compute Cloud (EC2) Amazon’s EC2 allows you to create a virtual server to perform any number of tasks in the cloud, and EC2 allows a whole array of customization options. You can use many operating systems to meet your application needs, including both varieties of the Microsoft Windows operating system and multiple versions […]

CloudFront Implementation – Network Design – ANS-C01 Study Guide

CloudFront Implementation When creating a CloudFront implementation, sites are registered with CloudFront using configuration objects called distributions. Origins and all other configuration items are stored in the distributions. The CloudFront distributions will be assigned a DNS name by AWS that uses the cloudfront.net domain. We can then map our own domain name to the distribution […]

Part 2 – Introduction to AWS – SOA-C02 Study Guide

The standard features of cloud computing are On-demand self-service: The ability for the customer or an application that the customer operates to provision resources at any time through a self-service portal or API. Broad network access: The ability for the customer or an application that the customer operates to access the resources and services available […]

IAM Roles – Determining an Authentication and Access Control Strategy for Complex Organizations – SAP-C02 Study Guide

IAM Roles An IAM role is an identity that possesses specific permissions. It is like an IAM user in which it provides access to AWS resources and defines what the user or application assuming that role can do on AWS. It is different from an IAM user in that a role is not associated with […]