AWS and Linode: The Ultimate Guide to Cloud Computing [IaaS]


Cloud Computing | Linux Foundations | Apache | NGINX | DBMS | Firewalls | Load Balancers | AWS IAM | Amazon EC2

What you will learn

Cloud Computing Fundamentals

Cloud Computing Service Models (IaaS, PaaS, SaaS)

Cloud Server Deployment and Configuration on Linode

Foundations of Linux

LAMP Stack Installation and Configuration

Foundations of Server Security (Network & Hosted Firewalls, UFW)

Scaling Instances Vertically and Horizontally

Cloud Deployment Models (Private, Public, Community)

AWS Foundations (Account Registration and Basic Security)

AWS IAM Foundations (Users, Groups, Policies, Roles, Access Keys)

Amazon Elastic Compute Cloud (EC2) Foundations

IAM Roles for EC2

Secure Socket Shell (SSH) for Instance Administration

Description

This course offers a comprehensive guide for aspiring cloud practitioners interested in learning the complete lifecycle of virtual instance deployment and configuration on popular cloud platforms like AWS and Linode. The course starts right from the basics, where we explore various cloud computing service models. This includes infrastructure as a service, platform as a service, and software as a service. From there students gain hands-on experience with creating and administering remote virtual instances, complete with Ubuntu, Apache, MariaDB, and PHP. Students will learn the difference between popular web servers like Apache and NGINX, along with a detailed overview of various database management systems. This includes both SQL and NoSQL databases, in addition to database transaction standards such as ACID and CAP Theorem. In addition to a theoretical deep dive, the course demonstrates how to install, configure, and secure LAMP stack on Ubuntu for hosting dynamic, database driven web apps. We offer a detailed segment on server security, where students will configure both software and network firewalls for their instance using strict firewall policies, UFW and custom SSH ports. At this stage students will also learn to scale their servers both vertically and horizontally using application load balancers.

The second half of the course provides a comprehensive guide to Amazon Web Services. We start with demonstrating how to setup, secure, and navigate an AWS account. This includes setting up billing alerts and multi-factor authentication. From there, we take a deep dive into AWS Identity and Access management for enhanced account security, and the management of user accounts for various AWS services. Here we explore IAM User management and permissions, IAM Groups, IAM Policies, and access key rotation. Following the IAM section, weโ€™ll jump into the Amazon Elastic Compute Cloud (EC2) service. In this module students lean to deploy virtual instances on AWS using Amazon Machine Images, Elastic IPs, and Launch Templates. We will also explore IAM roles for EC2, EC2 Security Groups, SSH key pair authentication, and remote administration using both terminal and EC2 Instance connect.


Subscribe to latest coupons on our Telegram channel.

As you can see this course covers a tremendous bit of ground and we hope youโ€™re just as excited about this course as we are, if so – hit that enroll button and letโ€™s get started.

English
language

Content

Foundations of Cloud Computing with Linode

Intro to Cloud Computing
Benefits of Cloud Computing
Cloud Computing Service Models

Cloud Computing Service Models

Infrastructure as a Service (IaaS)
Platform as a Service (PaaS)
Software as a Service (SaaS)
IaaS vs PaaS vs SaaS

Cloud Server Deployment on Linode

Linode Account Setup
Exploring the Linode Cloud Manager
Enabling TFA on Linode
Deploying a Linode Virtual Instance
Exploring the Linode Instance Dashboard
Remote Server Admin via SSH
Password vs SSH Key Authentication
SSH Key Pair Authentication on Windows
SSH Key Pair Authentication on MacOS
Connecting with LISH
Adding SSH Public Keys to Linode

Linux Foundations

Introduction to Linux
The Linux Filesystem
Linux Maintenance Commands
Linux Directory Commands [Part 1]
Linux Directory Commands [Part 2]
Ubuntu Basic Server Configuration
Introduction to User Accounts
Creating a Non-Root Account
Securing the New User Account
Disabling Root User Access and Password Authentication

Introduction to Web Servers

Introduction to Web Servers
Self Hosting vs Hosting Provider
Web Server Software (NGINX vs Apache)
Introduction to Databases
SQL vs NoSQL Databases
Database Transaction Standards (ACID vs CAP)
CAP Theorem for NoSQL Databases
Characteristics of SQL vs NoSQL DBMSes
Key Terms: Stacks, Frameworks, & Languages [Part 1]
Key Terms: Stacks, Frameworks, & Languages [Part 2]
Key Terms: Stacks, Frameworks, & Languages [Part 3]

LAMP Stack Installation and Configuration

Installing LAMP Stack on Ubuntu via Command Line
Installing LAMP Stack using Linode Marketplace
Testing PHP on Apache
Testing MariaDB Connection from PHP [Part 1]
Testing MariaDB Connection from PHP [Part 2]
Remote Server Administration using Linode GLISH

Foundations of Server Security

Introduction to Server Security
Introduction to Firewalls
Network Firewalls
Securing SSH with a Network Firewall
Strict Network Firewall Policy
Hosted Software Firewalls UFW

Server Scaling

Introduction to Scaling
Vertical Scaling
Horizontal Scaling with Auto Load Balancers (NodeBalancer)
Instance IP Swaps

Server Images and Backups

Introduction to Images and Backups
Creating a Custom Image
Linode Backup Service

Account Clean-Up and Segment Overview

Linode Account Clean-Up
Segment Overview

The Cloud Computing Phenomenon [AWS Edition]

Before the Cloud
After the Cloud
Cloud Use-Cases
Cloud Case Study: Netflix
Cloud Case Study: Twitter

Cloud Computing Characteristics and Service Models [Revisited]

Characteristics of Cloud Computing (Part 1)
Characteristics of Cloud Computing (Part 2)
Characteristics of Cloud Computing (Part 3)
Cloud Computing: Virtualization
Introduction to Cloud Computing Service Models
Infrastructure as a Service (IaaS) Overview
Platform as a Service (PaaS) Overview
Software as a Service (SaaS) Overview

Cloud Deployment Models

Private Cloud
Community Cloud
Public vs. Hybrid Cloud
Virtual Private Cloud (VPC)

AWS by the Numbers

Cloud Computing Statistics
AWS History
AWS Usage Statistics

Getting Started with AWS

Introduction
AWS Pricing Foundations
AWS Free Tier Overview
AWS Acceptable Use Policy
AWS Account Registration
AWS Cloud Practitioner Exam – Key Topics
AWS Global vs. Regional Services
Global vs. Regional Services Example
Creating Billing Alerts
AWS Multi-Factor Authentication (MFA)
Activate MFA for the Root User Account
Creating IAM Users and Groups
IAM User Custom Sign-In Link
Configure a Custom Password Policy

AWS IAM: Identity and Access Management

Introduction to IAM
IAM Mechanics (Theory)
IAM Users
Introduction to Managing IAM Users
IAM Administration (Guide) (Listing, Deleting Users & Accounts)
Managing Permissions for IAM Users
Changing IAM User Permissions (Method 1)
Changing IAM User Permissions (Method 2)
Changing IAM User Permissions (Method 3)
IAM Groups
IAM Group Administration
IAM Groups (LAB Exercise)
IAM Policies
IAM Inline Policies (Guide)
IAM Custom Policies
IAM Custom Policies (Guide)
IAM Roles
IAM Roles (Practical Guide)
IAM Authentication and Security
Rotating Access Keys
IAM Multi-Factor Authentication (MFA)
IAM Credentials Report (Guide)

Amazon Elastic Compute Cloud (EC2)

Introduction to EC2
EC2 Instance Core Features
EC2 Instance Types
Amazon Machine Images (AMI)
Creating an IAM User for EC2
The EC2 Dashboard
Deploying an EC2 Instance
Deploying an EC2 Instance (Continued)
EC2 Instances Console
Elastic IP (Theory)
Elastic IP (Guide)
EC2 Instance Administration (Guide)
EC2 Instance Launch Templates
Creating an Amazon Machine Image (AMI)
IAM Roles for EC2 (Guide)
Introduction to Security Groups
Security Groups (Guide)
Secure Socket Shell (SSH) Overview
PuTTY (SSH) Client for Windows
EC2 Instance Connect (Guide)