Understanding how data can be lost on AWS, and what measures we can take to prevent it
Using CloudTrail and CloudWatch Logs to detect sign in attempts to AWS IAM or IAM Identity Center that fail because of MFA, and generating an email alert
A glimpse of what Amplify can do, and an analysis on why it's a good idea to use it, and why not
Detailed explanation of Provisioned and On-Demand modes of DynamoDB, how they work, how they scale, and a pricing comparison.
Let's test what happens when an instance or DB fails
Setting up AppConfig to store configurations, and CodePipeline to trigger on changes to an S3 object
Creating a VPC Endpoint to access S3 and adding a secure Bucket Policy
Using a Route 53 Private Hosted Zone to register a database endpoint as a DNS entry
Setting up AWS Web Application Firewall to protect from Cross-Site Scripting, OS command execution and SQL injections, without modifying the application code.
Setting up a cache-aside strategy, and the implications beyond just cost
Step-by-step instructions to setup Client VPN, and a comparison with jump hosts and Session Manager
Setting up Inspector to detect vulnerabilities, and a safer way to SSH into an EC2 instance