This month, we started our blog with some big news from Stuart Scott. AWS just announced some big changes to their certification exams. Stuart takes a look at each of these, starting with the biggest news: the newest AWS certification. >>Read more.


Trending blog highlights
Now let’s dive right into the blog topics for October.
New articles by topic
AWS
AWS Security: Bastion Host, NAT instances and VPC Peering
Effective security requires close control over your data and resources. Bastion hosts, NAT instances, and VPC peering can help you improve your AWS security posture. In this article, we’ll look at strategies to avoid unnecessarily exposing your data on the internet using a bastion host to tighten access to your resources, along with some insight into NAT instances, NAT Gateways, and VPC peering.
AWS Security Groups: Instance Level Security
Instance security requires that you fully understand AWS security groups, along with a whole group of small but important details that need to be considered on a per-instance basis. In this article, we look at instance security, AWS security groups, along with OS patch protocols, key pairs, and your various tenancy options.
Big Changes with AWS Certification Exams
AWS just announced some big changes to their certification exams. We’ll look at each of these, starting with the biggest news: the newest AWS certification.
Top 13 Amazon Virtual Private Cloud (VPC) Best Practices
Amazon VPC brings a host of advantages to the table, including static private IP addresses, Elastic Network Interfaces, secure bastion host setup, DHCP options, Advanced Network Access Control, predictable internal IP ranges, VPN connectivity, movement of internal IPs and NICs between instances, heightened security, and more. Read this article to learn more about some key implementation-related best practices for developers and companies that utilize Amazon VPC.
Microsoft Azure
10 Reasons You Should Be Microsoft Azure Certified
To pursue a career in cloud computing, all major cloud services providers offer career paths and certifications, but Microsoft Azure is the single cloud service provider that offers role-based certifications that are specifically designed according to the market requirements and the job roles. Find out why becoming a Microsoft Azure certified professional can catapult your career and lead to advancement opportunities.
How to Search for Text in Documents and Images with Azure Search
Azure Search is an AI-powered cloud search service that enables full-text searches within documents and images with the capability of system integration. In this post, we will create a search engine and integrate with Azure Cognitive Services (specifically Vision API), all through the Azure Portal in a few minutes.
Blockchain
What is Blockchain Technology?
Blockchain is a technology used to manage, securely track, and verify transactions without a central authority between a number of parties using a distributed ledger. In this article, we’ll cover the history of blockchain, Amazon-managed blockchain, and the technology concept of blockchain.
Cloud Adoption
8 Surprising Ways Cloud Computing Is Changing Education
Over the years, the education industry has come a long way. Teaching and learning are no longer confined to textbooks and classrooms and now reach computers and mobile devices. Today, learners are always connected — whether they are on or off school grounds. At the same time, the right technologies empower them with real-world and career-ready skills. Technology plays a massive role in this disruptive change. In this article, we’ll describe the eight surprising ways cloud computing is changing education.
Read more articles on Cloud Adoption
Security
Cybersecurity vs. Information Security: Is There a Difference?
Is there really a difference between cybersecurity and information security? Although these two terms are often used interchangeably, there are quite a few differences. Some people like to swap the two terms, while others — who understand the differences — like to keep it specific. In this article, we’ll explore the five major differences.
Cybersecurity Lessons from the Biggest Data Breaches of the Decade
With an increasing number of products and services being dependent on the internet, consumers entrust more and more of their personal information to businesses online. However, businesses don’t often see the vulnerabilities of their cybersecurity systems which lead to devastating data breaches. In this article, we’ll look at cybersecurity lessons from the biggest data breaches of the decade.
DevOps
How to Write a Great Software Engineer Resume
When looking for a new role, a great resume can be the difference. We’ll explain how you can put together an effective software engineer resume.
Content & platform updates
New on Cloud Academy: ITIL® 4, Microsoft 365 Tenant, Jenkins, TOGAF® 9.1, and more
This is our monthly content blog that focuses on Cloud Academy’s content and platform updates. If you like to know what’s new, then this is the blog for you.

