Category Archives for AWS Solutions Architect

AWS Database Migration Service

AWS Database Migration Service

Are you looking for a way to migrate your on-premise database to the cloud? AWS Database Migration Service (DMS) is a managed service that provides a quick and secure way to migrate your on-premise databases to the cloud. Check out this blog at k21academy.com/awssa34 to know more about AWS Database Migration Service: • What is […]

Read More
AWS Route 53

Introduction to AWS Route 53

AWS Route 53 is one of the most popular and widely used services of Amazon Web Services. This is generally because it is highly available and reliable and flexible for customer/user to use. In this blog at k21academy.com/awssa33, we are going to cover everything that you need to understand about AWS Route 53:- 1.Overview of […]

Read More
aws database

AWS Database Service – Amazon RDS, Aurora, DynamoDB, ElastiCache

AWS Database Service is Amazon’s fully managed and scalable database solution for your applications. Amazon provides a wide range of database options such as Amazon RDS, Aurora, DynamoDB, ElasticCache, and Redshift. Check out this blog post at k21academy.com/awssa32 to know more about AWS Database Services: • AWS Database Service • AWS Relational Database Service (RDS) […]

Read More
EC2 Instance

Create and Connect To Amazon AWS Windows EC2 Instance

The EC2 is a computing service that provides scalable computing capacity and eliminates the investment in hardware up-front, so the applications can be developed and deployed faster. Virtual machines on AWS EC2, are called instances. Here in this blog >> k21academy.com/awssa31, we are going to covers how to launch a Windows-based instance. This blog will […]

Read More
AWS Solutions Architect

Roles and Responsibilities of AWS Solutions Architect

After becoming an AWS Certified Solutions Architect, many questions would come to your mind that what will be my roles, what would be my responsibilities as a Solutions Architect. Conducting architectural analysis and designing a complex company level solution configuration is a part of day to day job of a Solutions Architect. To know more […]

Read More
AWS Trusted Advisor

AWS Trusted Advisor: Everything You Need to Know

AWS Trusted Advisor is your personal cloud expert! It helps you to provide best practices for AWS by inspecting your AWS environment with a motto toward saving money, improving system performance and reliability, and closing security gaps to protect. Check out the blog post at https://k21academy.com/awsdevops19, where we are going to cover the important things […]

Read More
AWS VPC

AWS Virtual Private Cloud (VPC)

AWS Virtual Private Cloud enables you to launch AWS resources into the virtual network and you can have full control over who has the access to the resources that you have placed inside your AWS VPC. It is an on-demand configurable pool of shared computing resources and provides a certain level of isolation between different […]

Read More
KMS

Amazon AWS Key Management Service (KMS)

AWS KMS is a managed service that enables you to easily encrypt your data. AWS KMS provides a highly available key storage, management, and auditing solution for you to encrypt data within your own applications and control the encryption of stored data across AWS services. To know more about KMS, check this blog post at […]

Read More
5 Pillars of AWS Well-Architected Framework

Case Study: 5 Pillars Of AWS Well-Architected Framework

Essentially, a well-architected Amazon AWS framework is a concept of architecting cloud infrastructure for performing, resilient, and efficiency. The 5 pillars are the deciding factor that makes applications and workloads well architected. It seems simple and not important but trust us this is what separates an expert from the rest. Read the blog post at […]

Read More
Identity and Access Management

AWS Identity And Access Management (IAM)

AWS IAM is the heart of the AWS security because it empowers you to control access by creating users and groups, assigning specific permissions and policies to specific users, Managing Root Access Keys, setting up MFA Multi-Factor authentication, for additional security, and so much more. And the cherry on top, IAM is free to use! […]

Read More