On the Cloud Academy community, we love getting questions from our users. Security, the importance of certifications, and the how and why of cloud migration are just some of the topics that are top of mind with users when it comes to cloud computing.
I recently had a chance to chat with Stuart Scott, a security expert and AWS trainer here at Cloud Academy, to cover some of the most recent topics discussed in our community. Listen to my conversation with Stuart where we talk about:
- What cloud computing might look like in 20 years
- How companies like Meetup.com, Evernote, and Spotify migrated to the cloud and why multi-cloud solutions are increasingly the norm
- How to evaluate which cloud platform is right for you
- Security in the cloud: Why it holds companies back from cloud migration and why understanding the boundaries of where a vendor’s security solution stops and yours starts is key
- Certifications, and how you can leverage them for your career
- Why he likes the Serverless framework
Stuart has more than two decades of experience in the IT industry. At Cloud Academy, Stuart has taught more than 15,000 students and is the author of The Complete Guide to AWS Security for Developers and Sysadmins eBook and many courses on the business impact of cloud migration, AWS security, and other cloud topics. He was recognized as the 2015 Expert of the Year from Experts Exchange for sharing his knowledge within the cloud services community.
Show Notes: Links to articles, events, and other topics mentioned in the conversation
- Meetup , Evernote , and Spotify migrate to the cloud
- Which AWS Compute service do you need?
- AWS’s Dr. Matt Wood and artificial intelligence at AWS
- Check out Stuart’s ebook on security from Cloud Academy:
Poor security within the public cloud can lead to attacks and loss of data, both of which are detrimental to your business. As more organizations implement the cloud, having an understanding of the security of that architecture is essential.
AWS security best practices begin with the AWS Shared Responsibility Model that dictates which security controls are AWS’s responsibility, and which are yours (the user). This model lies at the very foundation of AWS Security.
In this eBook, we cover those essential elements of security within AWS. We go in detail on security at the Instance and Network level, and you will learn about Identity & Access Management (IAM), one of the key security services within AWS. You will also learn about Federated Access and AWS Trusted Advisor, and we’ll show you how to keep your financial information safe with AWS Billing Controls. Finally, we’ll introduce you to the security elements of S3 that you can choose to deploy based on your data requirements.
Stuart’s eBook, The Complete Guide to AWS Security for Developers and Sysadmins is available for download at Cloud Academy.
You can read more from Stuart in his posts about AWS Security and other topics on the Cloud Academy blog.
WaitCondition Controls the Pace of AWS CloudFormation Templates
AWS's WaitCondition can be used with CloudFormation templates to ensure required resources are running.As you may already be aware, AWS CloudFormation is used for infrastructure automation by allowing you to write JSON templates to automatically install, configure, and bootstrap your ...
The 9 AWS Certifications: Which is Right for You and Your Team?
As companies increasingly shift workloads to the public cloud, cloud computing has moved from a nice-to-have to a core competency in the enterprise. This shift requires a new set of skills to design, deploy, and manage applications in cloud computing.As the market leader and most ma...
Two New EC2 Instance Types Announced at AWS re:Invent 2018 – Monday Night Live
The announcements at re:Invent just keep on coming! Let’s look at what benefits these two new EC2 instance types offer and how these two new instances could be of benefit to you. If you're not too familiar with Amazon EC2, you might want to familiarize yourself by creating your first Am...
Google Cloud Certification: Preparation and Prerequisites
Google Cloud Platform (GCP) has evolved from being a niche player to a serious competitor to Amazon Web Services and Microsoft Azure. In 2018, research firm Gartner placed Google in the Leaders quadrant in its Magic Quadrant for Cloud Infrastructure as a Service for the first time. In t...
Understanding AWS VPC Egress Filtering Methods
In order to understand AWS VPC egress filtering methods, you first need to understand that security on AWS is governed by a shared responsibility model where both vendor and subscriber have various operational responsibilities. AWS assumes responsibility for the underlying infrastructur...
S3 FTP: Build a Reliable and Inexpensive FTP Server Using Amazon’s S3
Is it possible to create an S3 FTP file backup/transfer solution, minimizing associated file storage and capacity planning administration headache?FTP (File Transfer Protocol) is a fast and convenient way to transfer large files over the Internet. You might, at some point, have conf...
Microservices Architecture: Advantages and Drawbacks
Microservices are a way of breaking large software projects into loosely coupled modules, which communicate with each other through simple Application Programming Interfaces (APIs).Microservices have become increasingly popular over the past few years. The modular architectural style,...
What Are Best Practices for Tagging AWS Resources?
There are many use cases for tags, but what are the best practices for tagging AWS resources? In order for your organization to effectively manage resources (and your monthly AWS bill), you need to implement and adopt a thoughtful tagging strategy that makes sense for your business. The...
How to Optimize Amazon S3 Performance
Amazon S3 is the most common storage options for many organizations, being object storage it is used for a wide variety of data types, from the smallest objects to huge datasets. All in all, Amazon S3 is a great service to store a wide scope of data types in a highly available and resil...
How to Optimize Cloud Costs with Spot Instances: New on Cloud Academy
One of the main promises of cloud computing is access to nearly endless capacity. However, it doesn’t come cheap. With the introduction of Spot Instances for Amazon Web Services’ Elastic Compute Cloud (AWS EC2) in 2009, spot instances have been a way for major cloud providers to sell sp...
What are the Benefits of Machine Learning in the Cloud?
A Comparison of Machine Learning Services on AWS, Azure, and Google CloudArtificial intelligence and machine learning are steadily making their way into enterprise applications in areas such as customer support, fraud detection, and business intelligence. There is every reason to beli...
How to Use AWS CLI
The AWS Command Line Interface (CLI) is for managing your AWS services from a terminal session on your own client, allowing you to control and configure multiple AWS services.So you’ve been using AWS for awhile and finally feel comfortable clicking your way through all the services....