Skip to content
Learn The Content
Learn The Content
Home
About Us
Login
Register
Profile
Home
Profile
Nawfal Bonder
This user account status is Approved
About
About
Posts
Posts
Comments
Comments
This tutorial really helped clear up my confusion about using AWS Direct Connect vs VPN gateways. Thanks!
On
Designing secure connectivity between AWS and on-premises networks (for example, by using Direct Connect and VPN gateways)
Appreciate it! The breakdown of data capture mechanisms was comprehensive.
On
Data capture mechanisms
Appreciate the brevity and clarity of the blog. Really helps in my exam prep.
On
Identifying the role of Trusted Advisor, AWS Health Dashboard, and the AWS Health API to help manage and monitor environments for cost optimization
The information on IAM integration for secure access management was well-explained. Thank you!
On
Designing mechanisms to forward traffic over secure connections (for example, by using Systems Manager and EC2 Instance Connect)
I love how comprehensive the Trusted Advisor is for optimizing AWS environments.
On
Identifying the role of Trusted Advisor, AWS Health Dashboard, and the AWS Health API to help manage and monitor environments for cost optimization
The blog post provides excellent insights on AWS machine learning certification.
On
Compare models by using metrics (for example, time to train a model, quality of model, engineering costs).
This information is very helpful, thanks!
On
Implementing SCPs as a technical solution to enforce a policy (for example, limitations on the use of a root account, implementation of controls in AWS Control Tower)
I'm curious about using AWS Config with third-party security tools. Any insights?
On
Automating remediation by using AWS services (for example, AWS Lambda, AWS Step Functions, EventBridge, AWS Systems Manager runbooks, Security Hub, AWS Config)
What about identity-based policies and resource-based policies? How do they differ?
On
Different IAM policies (for example, managed policies, inline policies, identity-based policies, resource-based policies, session control policies)
Is enabling CloudTrail enough to ensure root user protection?
On
Understanding which methods can achieve root user protection
load more comments
Search for:
x