万本电子书0元读

万本电子书0元读

顶部广告

AWS Certified Developer – Associate Guide电子书

售       价:¥

5人正在读 | 0人评论 9.8

作       者:Tankariya Vipul,Parmar Bhavin

出  版  社:Packt Publishing

出版时间:2019-06-03

字       数:88.3万

所属分类: 进口书 > 外文原版书 > 小说

温馨提示:数字商品不支持退换货,不提供源文件,不支持导出打印

为你推荐

  • 读书简介
  • 目录
  • 累计评论(0条)
  • 读书简介
  • 目录
  • 累计评论(0条)
Learn from the AWS subject-matter experts, explore real-world scenarios, and pass the AWS Certified Developer – Associate exam Key Features ?This fast-paced guide will help you clear the AWS Certified Developer – Associate (DVA-C01) exam with confidence ?Gain valuable insights to design, develop, and deploy cloud-based solutions using AWS ?Develop expert core AWS skills with practice questions and mock tests Book Description This book will focus on the revised version of AWS Certified Developer Associate exam. The 2019 version of this exam guide includes all the recent services and offerings from Amazon that benefits developers. AWS Certified Developer - Associate Guide starts with a quick introduction to AWS and the prerequisites to get you started. Then, this book will describe about getting familiar with Identity and Access Management (IAM) along with Virtual private cloud (VPC). Next, this book will teach you about microservices, serverless architecture, security best practices, advanced deployment methods and more. Going ahead we will take you through AWS DynamoDB A NoSQL Database Service, Amazon Simple Queue Service (SQS) and CloudFormation Overview. Lastly, this book will help understand Elastic Beanstalk and will also walk you through AWS lambda. At the end of this book, we will cover enough topics, tips and tricks along with mock tests for you to be able to pass the AWS Certified Developer - Associate exam and develop as well as manage your applications on the AWS platform. What you will learn ?Create and manage users, groups, and permissions using AWS IAM services ?Create a secured VPC with Public and Private Subnets, NAC, and Security groups ?Launching your first EC2 instance, and working with it ?Handle application traffic with ELB and monitor AWS resources with CloudWatch ?Work with AWS storage services such as S3, Glacier, and CloudFront ?Get acquainted with AWS DynamoDB a NoSQL database service ?Use SWS to coordinate work across distributed application components Who this book is for This book is for IT professionals and developers looking to clear the AWS Certified Developer Associate 2019 exam. Developers looking to develop and manage their applications on the AWS platform will also find this book useful. No prior AWS experience is needed. Table of Contents 1.Overview of AWS Certified Developer - Associate certification 2.Understanding the Fundamentals of Amazon Web Services 3.Identity and Access Management (IAM) 4.Virtual Private Clouds 5.Getting Started with Elastic Compute Cloud (EC2) 6.Handling Application Traffic with ELB 7.Monitoring with CloudWatch 8.Simple Storage Service, Glacier, and CloudFront 9.Other AWS Storage Options 10.AWS Relational Database Service 11.AWS DynamoDB - A NoSQL Database Service 12.Amazon Simple Queue Service (SQS) 13.Simple Notification Service (SNS) 14.Simple Workflow Service (SWF) 15.CloudFormation Overview 16.Understanding Elastic Beanstalk 17.Overview of AWS Lambda 18.Key Management Services 19.Working with AWS Kinesis 20.Working with AWS CodeBuild 21.Getting Started with AWS CodeDeploy 22.Working with AWS CodePipeline 23.CI/CD on AWS 24.Serverless Computing 25.Amazon Route 53 26.ElastiCache Overview 27.Mock Tests 28.Exploring AWS CodeCommit
目录展开

Title Page

Copyright and Credits

AWS Certified Developer – Associate Guide Second Edition

About Packt

Why subscribe?

Packt.com

Contributors

About the authors

About the reviewers

Packt is searching for authors like you

Preface

Who this book is for

What this book covers

To get the most out of this book

Download the color images

Conventions used

Get in touch

Reviews

Overview of AWS Certified Developer - Associate Certification

Frequently asked questions about the exam

Understanding the Fundamentals of Amazon Web Services

Examples of cloud services

The evolution of cloud computing

More about AWS

The benefits of using AWS over a traditional data center

Comparing AWS cloud and on-premises data centers

Total cost of ownership versus return on investment

TCO

ROI

Accessing AWS services

An overview of AWS

AWS' global infrastructure

Regions and AZs

What are SaaS, PaaS, and IaaS?

Understanding virtualization

Virtualization types based on virtualization software

Virtualization types based on virtualization methods

Elasticity versus scalability

Creating a new AWS account

AWS' free tier

Root user versus non-root user

Deleting an AWS account

Understanding the AWS dashboard

Components of the AWS dashboard

Core AWS services

AWS compute services

AWS storage services

AWS database services

AWS networking and content delivery services

AWS migration services

AWS developer tools

AWS management tools

AWS security, identity, and compliance services

AWS analytics services

AWS machine learning services

AWS IoT services

AWS game development services

AWS mobile services

AWS application integration services

AWS desktop and app streaming services

AWS business productivity services

AWS customer engagement services

AWS media services

The shared security responsibility model

AWS soft limits

DR with AWS

The backup and restore DR model

The pilot light DR model

The warm standby DR model

The multi-site DR model

Summary

Identity and Access Management (IAM)

Understanding the AWS root user

Elements of IAM

Users

Access key ID and secret key

Password policies

Multi-factor authentication

Security token-based MFA

Steps for enabling a virtual MFA device for a user

Creating an AWS IAM user using the AWS dashboard

Introducing the AWS CLI

Installing the AWS CLI

Getting an AWS user access key and secret key

Configuring the AWS CLI

AWS CLI syntax

Getting AWS CLI help

Creating an IAM user using the AWS CLI

Groups

Creating a new IAM group

Creating an IAM group using the CLI

Adding existing users to a group

IAM role

Creating roles for an AWS service

Creating IAM roles using the AWS CLI

Policy

Managed policies

Inline policies

Resource-based policies

IAM policy simulator

Active Directory Federation Service (AD FS)

Integration between AD FS and the AWS console

Web identity federation

Security Token Service (STS)

AWS account ID and alias

AWS account IDs

AWS account aliases

Controlling user access to the AWS Management Console

IAM best practices

Exam tips

Summary

Virtual Private Clouds

Introduction to VPCs

Subnets

Private subnets

Public subnets

IP addressing

Private IPs

Public IPs

Elastic IP addresses

Creating a VPC

VPCs with a single public subnet

VPCs with private and public subnets

VPCs with public and private subnets and hardware VPN access

VPCs with a private subnet only and hardware VPN access

Security

Security groups

NACLs

Security groups versus NACLs

Flow logs

Controlling access

VPC networking components

ENI

Route tables

IGWs

Egress-only IGWs

NATs

Comparison of NAT instances and NAT gateways

DHCP option sets

DNS

VPC peering

VPC endpoints

ClassicLink

VPC best practices

Summary

Getting Started with Elastic Compute Cloud (EC2)

Introducing EC2

Pricing for EC2

On-demand

Spot instances

Reserved instances

Scheduled reserved instances

Dedicated hosts

EC2 instance life cycle

Instance launch

Instance stop and start

Instance reboot

Instance retirement

Instance termination

Amazon Machine Images (AMIs)

Root device types

EC2 instance virtualization types

Creating an EC2 instance

Changing the EC2 instance type

Connecting to the EC2 instance

Connecting to a Linux EC2 instance from a Microsoft Windows system

Converting a PEM file to a private key (PPK)

Connecting to an EC2 instance using a PuTTY session

Troubleshooting SSH connection issues

EC2 instance metadata and user data

Placement groups

Introducing EBS

Types of EBS

General Purpose SSD (gp2)

Provisioned IOPS SSD (io1)

Throughput optimized HDD (st1)

Cold HDD (sc1)

Encrypted EBS

Monitoring EBS volumes with CloudWatch

Snapshots

EBS-optimized EC2 instances

EC2 best practices

Summary

Handling Application Traffic with ELB

Introducing ELB

Benefits of using ELB

Types of ELB

Classic Load Balancer

Creating a Classic Load Balancer

Application Load Balancer

Network Load Balancer

Features of ELB

How ELB works

The working of the Classic Load Balancer

The working of the Application Load Balancer

ELB best practices

Summary

Monitoring with CloudWatch

Introducing CloudWatch

How Amazon CloudWatch works

Elements of Amazon CloudWatch

Namespaces

Metrics

Dimensions

Statistics

Percentile

Alarms

Creating a CloudWatch alarm

Billing alerts

CloudWatch dashboards

Monitoring types – basic and detailed

CloudWatch best practices

Summary

Simple Storage Service, Glacier, and CloudFront

Introducing Amazon S3

Creating a bucket

Bucket restrictions and limitations

Bucket access control

Bucket policy

User policies

Transfer Acceleration

Enabling Transfer Acceleration

Requester Pays model

Enabling Requester Pays on a bucket

Understanding objects

Object keys

Object key naming guide

Object metadata

System-defined metadata

User-defined metadata

Versioning

Enabling versioning on a bucket

Object tagging

S3 storage classes

S3 Standard storage

S3-IA storage

S3 One Zone-IA

S3 RRS

S3 Intelligent-Tiering

Glacier

Comparison of S3 storage classes and Glacier

Life cycle management

Life cycle configuration use cases

Defining a life cycle policy for a bucket

Hosting a static website on S3

Cross-origin resource sharing (CORS)

Using CORS in different scenarios

Configuring CORS on a bucket

Enabling CORS on a bucket

Cross-region replication

Enabling cross-region replication

CloudFront

CloudFront regional edge caches

Setting up CloudFront content and delivery

Summary

Other AWS Storage Options

Storage and backup services provided by AWS

Amazon EFS

AWS Storage Gateway

File gateways

Volume gateways

Gateway–cached volumes

Gateway–stored volumes

Tape-based storage solutions

VTL

AWS Snowball

AWS Snowmobile

Summary

AWS Relational Database Service

Introducing RDS

Amazon RDS components

DB instances

Regions and AZs

Security groups

DB parameter groups

DB option groups

RDS engine types

Amazon Aurora DB

Comparing Amazon RDS Aurora to Amazon RDS MySQL

MariaDB

Microsoft SQL Server

MySQL

Oracle

PostgreSQL

Creating an Amazon RDS MySQL DB instance

Monitoring RDS instances

Creating a snapshot

Restoring a DB from a snapshot

Changing an RDS instance type

Amazon RDS and VPC

Amazon RDS and high availability

Connecting to an Amazon RDS DB instance

Connecting to an Amazon Aurora DB cluster

Connecting to a MariaDB instance

Connecting to a MySQL instance

Connecting to an Oracle instance

RDS best practices

Summary

AWS DynamoDB - A NoSQL Database Service

Understanding RDBMSes

Understanding SQL

Understanding NoSQL

Key-value pair databases

Document databases

Graph databases

Wide column databases

Using NoSQL databases

SQL versus NoSQL

Introducing DynamoDB

DynamoDB components

Primary key

Secondary indexes

DynamoDB Streams

Read consistency model

Naming rules and data types

Naming rules

Data types

Scalar data types

Document types

Set types

Creating a DynamoDB table

Adding a sort key while creating a DynamoDB table

Using advanced settings while creating a DynamoDB table

Creating secondary indexes

Read/write capacity mode

Provisioned capacity

Auto Scaling

Encryption at rest

Methods of accessing DynamoDB

DynamoDB console

DynamoDB CLI

Working with APIs

DynamoDB provisioned throughput

Read capacity units

Write capacity units

Calculating table throughput

Examples for understanding throughput calculation

Example 1

Example 2

Example 3

Example 4

Partitions and data distribution

Data distribution – partition key

Data distribution – partition key and sort key

GSIs and LSIs

The difference between GSIs and LSIs

DynamoDB Query

Query with AWS CLI

DynamoDB Scan

Reading an item from a DynamoDB table

Writing an item to a DynamoDB table

PutItem

UpdateItem

DeleteItem

Conditional writes

User authentication and access control

Managing policies

DynamoDB API permissions

DynamoDB best practices

Summary

Amazon Simple Queue Service (SQS)

Why use SQS?

How do queues work?

Main features of SQS

Types of queues

Standard queues and FIFO queues

Dead Letter Queue (DLQ)

Queue attributes

Operations in a queue

Creating a queue

Sending a message in a queue

Viewing/deleting a message from a queue

Purging a queue

Deleting a queue

Subscribing a queue to a topic

Adding user permissions to a queue

SQS limits

Queue monitoring and logging

CloudWatch metrics available for SQS

Logging SQS API actions

SQS security

Authentication

Server-Side Encryption (SSE)

Summary

Simple Notification Service (SNS)

Introducing Amazon SNS

Amazon SNS fanout

Application and system alerts

Mobile device push notifications

Push emails and text messaging

Creating an Amazon SNS topic

Subscribing to an SNS topic

Publishing a message to an SNS topic

Deleting an SNS topic

Managing access to Amazon SNS topics

When to use access control

Key concepts

Architectural overview

Accessing request evaluation logic

Invoking the Lambda function using SNS notifications

Sending Amazon SNS messages to Amazon SQS queues

Monitoring SNS with CloudWatch

SNS best practices

Summary

AWS Simple Workflow Service (SWF)

When to use Amazon SWF

Workflow

Example workflow

Workflow history

How workflow history helps

Actors

Workflow starter

Decider

Activity worker

Tasks

SWF domains

Object identifiers

Task lists

Workflow-execution closure

Life cycle of a workflow execution

Polling for tasks

SWF endpoints

Managing access with IAM

SWF – IAM policy examples

Summary

CloudFormation Overview

Understanding templates

Understanding a stack

The template structure

AWSTemplateFormatVersion

Description

Metadata

Parameters

AWS-specific parameters

Mappings

Conditions

Transform

Resources

Outputs

A sample CloudFormation template

CloudFormer

Rolling updates for auto scaling groups

CloudFormation best practices

Summary

Understanding Elastic Beanstalk

Introduction to Elastic Beanstalk

Elastic Beanstalk components

Elastic Beanstalk environment tiers

The web server environment tier

The worker environment tier

Elastic Beanstalk-supported platforms

Creating a web application source bundle

Getting started using Elastic Beanstalk

Step 1 – signing in to the AWS account

Step 2 – creating an application

Step 3 – viewing information about the recently created environment

Step 4 – deploying a new application version

Step 5 – changing the configuration

Verifying the changes on the load balancer

Step 6 – cleaning up

The version life cycle

Deploying web applications to Elastic Beanstalk environments

Monitoring the web application environment

Elastic Beanstalk best practices

Summary

Overview of AWS Lambda

Introducing AWS Lambda

Understanding a Lambda function

The Lambda function invocation types

Writing a Lambda function

A Lambda function handler in Node.js

A Lambda function handler in Java

A Lambda function handler in Python

A Lambda function handler in C#

Deploying a Lambda function

AWS Lambda function versioning and aliases

Environment variables

Tagging Lambda functions

Lambda functions over VPC

Building applications with AWS Lambda

Event source mapping for AWS services

Event source mapping for AWS stream-based services

Event source mapping for custom applications

AWS Lambda best practices

Summary

Key Management Services

Introducing encryption

Symmetric encryption

Asymmetric encryption

How does KMS work?

Types of keys

Different types of CMKs

Creating a CMK

Viewing existing keys

Modifying existing CMKs

Updating the administrators or users of a key

Tagging a key

Enabling or disabling keys

AWS services supported by KMS

Summary

Working with AWS Kinesis

Kinesis Video Streams

The Kinesis Video Streams API

The producer API

The consumer APIs

Kinesis Data Streams

Architecture

Kinesis Data Streams terminology

Kinesis Data Firehose

Kinesis Data Firehose – key concepts

Kinesis Data Firehose – data flow

Kinesis Data Analytics

Kinesis Data Analytics for SQL applications

Kinesis Data Analytics for Java applications

Summary

Working with AWS CodeBuild

Introducing AWS CodeBuild

Understanding AWS CodeBuild

Working with AWS CodeBuild

Configuring a build project in AWS CodeBuild

Project configuration

Source code

Environment

Additional configuration

Buildspec

Artifacts

Logs

Summary

Getting Started with AWS CodeDeploy

The need for CodeDeploy

Introducing CodeDeploy

Components of CodeDeploy

Summary

Working with AWS CodePipeline

Introducing CodePipeline and workflows

AWS CodePipeline usages

AWS CodePipeline – a higher-level view

A high-level view of the input and output artifacts at each stage of the pipeline

AWS CodePipeline concepts

CI with AWS CodePipeline

Continuous delivery with AWS CodePipeline

Working with CodePipeline

Summary

CI/CD on AWS

Understanding CI/CD

CI

CD

Continuous deployment

AWS tools for CI/CD

Summary

Serverless Computing

Recapping AWS Lambda

An overview of API Gateway

Things that API Gateway can do for you

How API Gateway works

Understanding step functions

The difference between Step Functions and a Lambda function

The difference between Step Functions and SWF

How Step functions works

Understanding states

Commonly used state fields

Tasks

Creating a state machine

Amazon Cognito

Cognito user pool

Cognito identity pool

Common Amazon Cognito applications

Amazon Cognito Sync

Summary

Amazon Route 53

Introduction to Route 53

Working with Route 53

Hosted zones

DNS record types

A record type

AAAA record type

CAA record type

CNAME record type

MX record type

NAPTR record type

NS record type

PTR record type

SOA record type

SPF record type

SRV record type

TXT record type

Routing policies

Health checking

Summary

ElastiCache Overview

Introduction to ElastiCache

ElastiCache engine types

Amazon ElastiCache for Memcached

Amazon ElastiCache for Redis

Designing the right cache for your workload

Summary

Mock Tests

Mock test 1

Mock test 2

Assessments

Mock Test 1

Mock Test 2

Another Book You May Enjoy

Leave a review - let other readers know what you think

累计评论(0条) 0个书友正在讨论这本书 发表评论

发表评论

发表评论,分享你的想法吧!

买过这本书的人还买过

读了这本书的人还在读

回顶部