Amazon AWS-Step 2: Create a Security Group

Posted filed under Uncategorized.

A security group acts as a virtual firewall to control the traffic for its associated instances. To use a security group, you add the inbound rules to control incoming traffic to the instance, and outbound rules to control the outgoing traffic from your instance.

Getting Started with Amazon Simple Storage Service

Posted filed under Uncategorized.

Amazon Simple Storage Service (Amazon S3) is storage for the Internet. You can use Amazon S3 to store and retrieve any amount of data at any time, from anywhere on the web. You can accomplish these tasks using the AWS Management Console, which is a simple and intuitive web interface. This guide introduces you to… Read more »

Introduction to Amazon S3

Posted filed under Uncategorized.

This introduction to Amazon Simple Storage Service is intended to give you a detailed summary of this web service. After reading this section, you should have a good idea of what it offers and how it can fit in with your business. Topics Overview of Amazon S3 and This Guide Advantages to Amazon S3 Amazon… Read more »

Working with Amazon S3 Buckets

Posted filed under Uncategorized.

Amazon S3 is cloud storage for the Internet. To upload your data (photos, videos, documents etc.), you first create a bucket in one of the AWS regions. You can then upload any number of objects to the bucket. In terms of implementation, buckets and objects are resources, and Amazon S3 provides APIs for you to… Read more »

Working with Amazon S3 Objects

Posted filed under Uncategorized.

Amazon S3 is a simple key, value store designed to store as many objects as you want. You store these objects in one or more buckets. An object consists of the following: Key – The name that you assign to an object. You use the object key to retrieve the object. For more information, see… Read more »

Managing Access Permissions to Your Amazon S3 Resources

Posted filed under Uncategorized.

By default, all Amazon S3 resources—buckets, objects, and related subresources (for example, lifecycleconfiguration and website configuration)—are private: only the resource owner, an AWS account that created it, can access the resource. The resource owner can optionally grant access permissions to others by writing an access policy. Amazon S3 offers access policy options broadly categorized as resource-based… Read more »

Amazon S3

Posted filed under Amazon AWS.

Amazon S3 Amazon Simple Storage Service (Amazon S3), provides developers and IT teams with secure, durable, highly-scalable cloud storage. Amazon S3 is easy to use object storage, with a simple web service interface to store and retrieve any amount of data from anywhere on the web. With Amazon S3, you pay only for the storage… Read more »

Amazon AWS-What is Amazon VPC?

Posted filed under Amazon AWS.

Source By: <docs.aws.amazon.com>   Amazon Virtual Private Cloud (Amazon VPC) enables you to launch Amazon Web Services (AWS) resources into a virtual network that you’ve defined.

Setting Up with Amazon EC2

Posted filed under Amazon AWS.

If you’ve already signed up for Amazon Web Services (AWS), you can start using Amazon EC2 immediately. You can open the Amazon EC2 console, click Launch Instance, and follow the steps in the launch wizard to launch your first instance.

What Is Amazon EC2?

Posted filed under Amazon AWS.

Amazon Elastic Compute Cloud (Amazon EC2) provides scalable computing capacity in the Amazon Web Services (AWS) cloud. Using Amazon EC2 eliminates your need to invest in hardware up front, so you can develop and deploy applications faster.

Cisco CCNA OSI Model

Posted filed under Cisco CCNA.

Follow @ASM_Educational Description of OSI layers The recommendation X.200 describes seven layers, labeled 1 to 7. Layer 1 is the lowest layer in this model.

Cisco CCNA – Call Manager Express Part 2

Posted filed under Cisco CCNA.

Cisco Call Manager Express Part 1

Follow @ASM_Educational The Trunk port between the router and switch had to be manually configured using sub-interfaces. Note, however, that the DATA vlan traffic and the phone VOICE vlan traffic for each host is carried over the same link (multiple vlan traffic over the same port).

Cisco CCNA How to configure Multi-Layer Switch

Posted filed under Cisco CCNA.

mulli-Layer Switch

Follow @ASM_Educational Cisco CCNA- How to Configure Multi-Layer Switch Layer 3 Switch Now that we have seen how a “router on a stick” works, we can introduce the Layer 3 switch.  In the “router on a stick” topology, what if we could bring the router inside the switch?

CompTIA Linux+ Installation

Posted filed under CompTIA Linux+.

Media Linux installation can be done using a variety of different media. Each installation method has different pros and cons depending on the environment you have. Here are some examples:

CompTIA Linux+ Planning the Implemenation

Posted filed under CompTIA Linux+.

Linux Uses Linux is a pretty flexible operating system. Although it has got a lot of credibility over the years as a stable server platform, it is also an excellent desktop platform. Databases, mail servers as well as many appliances can be installed.

CompTIA Linux+ What is Linux?

Posted filed under CompTIA Linux+.

Linux is a 32 bit open source operating system. It is based on the very popular Unix operating system and it’s code is freely available (thus explaining the “open source” label as opposed to closed source where the code is not available freely).

What Is AWS Amazon S3?

Posted filed under Amazon AWS.

Amazon Simple Storage Service is storage for the Internet. It is designed to make web-scale computing easier for developers.

CISSP Security & Risk Management- Global Legal and Regulatory Issues

Posted filed under CISSP.

Computer/Cyber Crime CryptoLocker Ransomware – Spreads via email and propagates rapidly. Encrypts various file types and then a pop-up window appears to inform user about the actions performed on computer and, therefore demand a monetary payment for files to be decrypted.

CISSP Security & Risk Management- Computer Crimes

Posted filed under CISSP.

Computer as incidental to other crimes Involves crimes where computers are not really necessary for such crimes to be committed. Instead computers facilitate these crimes and make them difficult to detect. Examples of crimes in this category may include money laundering and unlawful activities on bulletin board systems.

CompTIA Network+ | Microsoft MTA Networking: Methods of User Authentication

Posted filed under CompTIA Network+, MICROSOFT MTA NETWORKING.

User authentication is the verification of an active human-to-machine transfer of credentials required for confirmation of a user’s authenticity; the term contrasts with machine authentication, which involves automated processes that do not require user input. Source mc mcse Certification Resources PKI (Public Key Infrastructure) – A public key infrastructure (PKI) is the combination of software,… Read more »