AAA in AWS
Authentication, Authorization, and Access Control
Authentication, Authorization, and Access Control
Using Access Control List (ACL) Plugin in Kong
Kubernetes plugins enforcing API policies
Accelerate Digital Transformation
Artificial Intelligence and Machine Learning
Using AI Prompt Decorator Plugin in Kong
Using AI Prompt Plugin in Kong
Using AI Prompt Template Plugin in Kong
Using AI Proxy Plugin in Kong
CloudWatch Alarms and EventBridge
Fully managed 'front-door' for applications
Serverless, interactive analytics service
Fully managed and scalable IAM
Fully managed NoSQL database
Intelligent threat detection
Automated and continual vulnerability management
Real-time streaming data at a large scale
Protecting sensitive data
Fully managed, open-source message brokers
Relational database service
Securing your Amazon RDS Databases
Amazon Simple Storage Service (Amazon S3)
Fully managed Pub/Sub service
Distributed message queuing service
First things you need to know
Azure Analytics
Linux security module for application access control.
Deploying Cloud Native Applications
Layer 7 LoadBalancer for your applications
Application Lifecycle Management
ArgoCD
Attach and detaching from containers
Audit Logs for Access Monitoring
Authentication and Authorization
Authentication Mechanisms
Authorization Mechanisms
Basics of AWS Compute
What good automation looks like
Compliance Management with Artifact and Macie
Provision and manage SSL/TLS certificates
Using CLI and SDK
Infrastructure As Code by AWS
Fully managed continuous integration
Private Git repositories in AWS
AWS CodeDeploy
Fully managed continuous delivery
Basics of AWS Compute
Assess, audit, and evaluate configurations
Running containers in AWS
Different database options in AWS
Disaster Recovery Methods
Managed application deployment
Using CLI and SDK
Create and control your cryptographic keys
AWS Logs
Build and deploy serverless applications
Centrally manage your secrets
Resources for the exam
Migrate petabyte-scale data to AWS
Use cloud storage with on-prem applications
Optimize costs, performance, etc.
Active Directory in Azure
Fully managed platform as a service (PaaS)
Architecting solutions in Azure
Scalable and secure object storage in the cloud
Virtual machines in Azure
Analyze all your data in a single place
Integration with Azure over a private connection
Managed File Shares and Storage
Azure's Content Delivery Network (CDN)
Serverless compute in Azure
Identity and Access Management
Distributign traffic across backend resources
Serverless workflow integration platform
Block storage for Azure Virtual Machines
Secure yoru Azure resources with MFA.
Migrating applications to Azure
Durable queues for large-volume cloud services.
Azure Security
Highly available storage in the cloud
Storage for non-relational structured data in the cloud
Private networks in Azure
Centralized protection of your web applications
Using Basic Authentication in Kong
Cloud Architects
Being Cloud Native
The Change of Business Dynamics and Procedure
Introduction
Notes for the Microsoft Azure Security Technologies (AZ-500)
Changing deprecated API versions
Cheatsheet: Kubernetes Commands
Set up CI/CD pipelines in AWS
CIS Security Benchmarks
Passing an Argument
Overview
Public Cloud
Overview
What is Cloud Native
Being Cloud Native
Software as a Service - SaaS
Amazon CloudTrail
Amazon CloudWatch
Cluster Maintenance
Defining default commands on containers
CNCF Projects
Overview
Communications between networks and resources
Etsy
Components of an Azure LoadBalancer
Storing non-sensitive data
Consumers, Plugins, and Upstreams
Container Best Practices
Container Resource Requirements
Isolating containers for enhanced security
Container Security
Containerized Kong and Other Applications
Container Management Challenges
Containers in Azure
Custom Kuberenetes resource types
Container Management Challenges
Datacenters
Data Processing in Azure
Ways to protect your data in AWS
Database Security
A 10,000 ft view of Microsoft Azure
Distributed Denial of Service (DDoS)
Dependencies in Docker Compose
Deployments
In a Nutshell
Disable open ports
Docker Architecture
Docker Cheatsheet
Managing multiple containers
Docker Compose Issues
Layers for containers
Networking for containers
Docker Objects
Running Docker on Windows
Where you store and share container images
Cluster of nodes working together
Dynamic Data Masking in Azure SQL
Based on naming convention, pricing, and purpose.
ENIs, ENAs, and the sorts
EBS and EFS
How ELB Works
Securing your Loadbalacers
Enabling API versions
Environment Variables
Error Guides
Error: Failing to Delete CloudFormation Stack
etcd Default Server Port
Kubernetes visibility through Falco
Using security groups in Azure
Securing your AWS Account
A guide in designing and running workloads in the cloud
Amazon FSx and AWS DataSync
Pre-requisites
GitOps Basics
Introduction to GitOps
Go Cheatsheet
Helm Chart and Templates
Helm Cheat Sheet
Helm Package Manager
Using HMAC Authentication in Kong
Easy to follow checklists for helpful automations
HTTP Get Client Application
Identity and Access Management
Securing your AWS Infrastructure
Inputs and Port Mapping
Install Docker Compose
Install Docker Desktop
Install Docker on RHEL/CentOS
Install Docker on Ubuntu
Install Docker on WSL2 without Docker Desktop
Install Kong
Introduction to Kong
Jobs and CronJobs
Using JWT Authentication in Kong
Using Key Authentication in Kong
Kubeconfig File
Kubelet Security
Container Management Challenges
Kubernetes API Objects
Container Management Challenges
Kubernetes Ecosystem
Kubernetes in the Cloud
Kubernetes Ingress
Kubernetes Networking
Kubernetes Patterns for Application Developers
Services, ClusterIP, NodePort, and LoadBalancers
Labels, Selectors, and Annotations
Run code without provisioning servers
Improving Lead Time
Least Privilege Principle
Using a plugin to limit and terminate requests
Limit Node Access
Leveraging linux features
The Linux kernel enhances resource management.
Linux Privilege Escalation
Container Logging
Logging and monitoring options in AWS
CloudWatch Logs and Insights
Tools for managing Azure resources
Detecting and remediating incidents
Configuration file for resources
Metrics
A 10,000 ft view of Microsoft Azure
Overview
Best practices for securing container images
Minimize IAM Roles
Multi-Stage Builds
Mutable and Immutable Infrastructure
Network Policy
Networking Security
New Subscription shows Zero Credit
nodeSelectors and nodeAffinity
Authenticating client and server communication
Enforcing policies across systems
Persisting Data
Planning your costs in Azure
Container Management Challenges
Container Management Challenges
Security rules for pod deployments
The building blocks of Kubernetes
Product is live. What's next?
Pre-requisites for Container Labs
Connecting privately through a network interface
Probes and Multi-Container Pods
Using Prometheus Plugin in Kong
Kubectl Proxy and Port Forwarding
Using Proxy Caching plugin in Kong
Setup Go in Minutes
Reducing costs in your Azure solutions
From locally-redundant to geo-zone-redundant storage
Remove Obsolete Packages and Services
ReplicaSets and Scaling
Resources, bookmarks
Restrict Kernel Modules
Restrict Network Access
Limiting the access on your S3 Buckets
Role-Based Access Control
Rollouts and Rollbacks
Methods to encrypt S3
Optimize your S3 Buckets
Securing your S3 Bucket
S3 Storage Classes
Detect security vulnerabilities in container images.
Scheduling Pods
Schema and Handler
Filter system calls to enhance application security
Storing sensitive information
Securing each step of the automation
Securing Azure Solutions with Azure Active Directory
Securing Control Plane Communications with Ciphers
Securing the Docker Daemon
Security Contexts
Using Security Plugins in Kong
Security Primitives
Server management done by the Cloud
Server management done by the Cloud
Service Accounts
Container Management Challenges
Sharing Data in Docker Compose
Service Level Agreement and Lifecycle Policy
Difference between the three services
SSH Hardening
Stateless and Stateful
Inspect container images for security issues.
Pods managed directly by the kubelet
Status Codes and Restart Policies
Comparing AWS Storage Options
Storage Security
The Project Plan and Time Management
Adding tags to container images
Influencing the scheduling of Pods
Testing with FastAPI Endpoints
A guide to successful cloud adoption
Cloud Computing
TLS Basics
TLS in Kubernetes
Tracing Linux Syscalls
Using Transformer Plugins in Kong
Troubleshooting Basics
Tools for troubleshooting, governance, and ensuring compliance
UDP Logs and ELK Stack Integration
Uninstall Docker
Cloud Migration
Using Docker without Root Permission
Using the Kong Admin API
Checking and enforcing policies with Admission Controllers
Peering between virtual networks
Volumes and StorageClass
Seamless integration between on-premise and the cloud
Security through Managed Firewall and API Gateway features
Webhooks for validation and modification policies.
Docker containers
Limit image sources to trusted registries only.
Zero Trust Concepts
Using Zipkin Plugin in Kong