Labsforbootcamp 1682060063700
Labsforbootcamp 1682060063700
Labsforbootcamp 1682060063700
https://aws.amazon.com/free/?all-free-tier.sort-by=item.additionalFields.SortRank&all-free-
tier.sort-order=asc
Note: As long as you're careful, and only choose resources that are marked as free-tier
compatible you will not be charged. These labs are not precise step-by-step labs but “big
picture labs” where I'm making the assumption that you'll be able to go through and find the
components that I'm suggesting you look for. The reason for this, is that Amazon changes their
cloud, sometimes daily. You wouldn't enjoy the typos, and I wouldn't enjoy the constant
updating, so we will meet somewhere in the middle.
The first time you log into the AWS Management you will be operating in the North Virginia
region; that's the default region. you can see this by looking up to the top right-hand corner and
seeing N.Virginia. listed as the region you are in.
1
Review Availability Zones
Availability zones show up when you're making requests for infrastructure like networking,
databases, or launching an EC2 instance from the console.
1. Click the AWS logo in the top left-hand corner to show the default AWS Management
Console.
2. Open the EC2 Dashboard, and scrolling down, review the Zone status. Notice the
availability zones that are currently operating normally.
3. Switch your current region to another AWS region and note the different availability
zones in the new region.
4. Switch back to your initial region.
5. in the middle of the EC2 Dashboard page select Launch Instance / Launch Instance.
6. For image click Select to select the Amazon Linux AMI.
7. For Instance select t2.micro, as it is free tier eligible.
8. Click the Next: Configure Instance Details button.
9. Note the Network that is selected is the default VPC.
10. For Subnet selection, click No preference, and review the availability zones.
11. Switch region to another AWS regions and note the different subnet possibilities.
2
Review Edge Services
Click the AWS logo in the top left-hand corner to show the default AWS Management Console.
1. Note the current region selection in the menu bar. In my example it's currently N.
Virginia.
2. In the search bar Find Services enter CloudFront and press Enter.
Make note of the change to the region selection for this service:
3. When edge services are selected, the region selection is Global, indicating region
selection is not required as the service is not a regional service.
4. Using the search bar Find Services, search for the following services noting the region
selection:
Route 53
WAF and Shield
AWS Firewall Manager
S3
3
Order a VPC and select Availability Zones
1. Click the AWS logo in the top left-hand corner to show the default AWS Management
Console.
2. In the search bar Find Services enter VPC and press Enter.
3. On the left-hand side of the VPC Dashboard select Your VPC’s
4. Click the orange button Create VPC
5. Under VPC settings enter the following values:
Name tag: Test VPC
IPv4 CIDR block: 192.168.0.0/16
No IPv6 CIDR block
Tenancy: Default
6. Review your selections, and then click Create VPC. You have created a VPC with no
subnets. Let's create two separate subnets in different availability zones.
4
Review EFS, FSx and RDS deployment options
1. Click the AWS logo in the top left-hand corner to show the default AWS Management
Console.
Note we are not creating a file system for this example because FSX is not part of the free
tier.
13. Next click the AWS logo in the top left-hand corner to show the default AWS
Management Console.
5
Lab: Create CloudFront Distribution
6
<html>
<head>My CloudFront Test</head>
<body>
<p>My text content goes here.</p>
<p><img src="https://<domain name>/<object name>" alt="my test image"/></p>
</body>
</html>
35. Replace <domain name with your CloudFront domain name which you can find by
clicking on your CloudFront distribution, and on the General tab, copying the domain
name which will look something like c111111abcdef8.cloudfront.net
36. Replace <object name> with the name of your file that you uploaded to your S3 bucket
37. Your string should look something like this:
https://c111111abcdef8.cloudfront.net/image.jpg
38. Save the html text in a file that has an HTML file name extension
39. Open your HTML file in a browser to review your content being served from CloudFront.
40. Now go back to the CloudFront console , and disable your distribution, wait about 15
minutes and then delete your distribution.
1. Click the AWS logo in the top left-hand corner to show the default AWS Management
Console.
2. Scroll down in the AWS Management Console and find Security, Identity, & Compliance
and from the list of services select GuardDuty.
3. Click the orange button Get started.
4. Under Service permissions note that a service linked role will be assigned to guard duty
to be able to do its job and analyze CloudTrail, VPC Flow Logs, and DNS query logs.
5. Click the orange button Enable GuardDuty.
6. From the GuardDuty console select Usage. This is where you would see your costs. Note
that you have a free trial for 30 days from this date.
7. Select Findings. This is where you would see any issues that GuardDuty found.
7
8. Select Settings. This is where you could set or modify the service role permissions and
add delegated administrators.
9. Scrolling down to the bottom, under Sample findings, is an option to generate sample
findings to illustrate what GuardDuty can find.
10. Click the button Generate sample findings.
11. Move back and select Findings.
12. Take a few moments to take a look at the different findings that GuardDuty could
generate.
13. Now let's move down to Lists, which is under Settings.
14. Here you could add trusted IP's that would not be analyzed by GuardDuty when
connecting to your AWS environment. You can also add a threat list of malicious IP
addresses that you know.
15. Select S3 Protection; this is where you can enable protection for S3 buckets.
16. Select Accounts; this is great could add additional AWS accounts, as GuardDuty support
AWS Organizations.
17. When you're done reviewing the options for GuardDuty select Settings.
18. Under Suspend GuardDuty click the button Suspend GuardDuty.
19. One more time click Suspend.
1. Click the AWS logo in the top left-hand corner to show the default AWS Management
Console.
8
10. At the bottom of the screen click the blue button Review and Launch.
11. On Step 7: Review Instance Launch screen click the blue button Launch.
12. On the Select an existing key pair or create a new key pair dialog box select Proceed
without a key pair and check the “I acknowledge….checkbox.
13. Click Launch Instances.
14. On the launch Status screen click the link for your instance.
15. On the Instances page click the button Clear filters.
16. Once your instant state is Running, check the dialog box to the left of your instance ID.
17. Select the Monitoring tab to show the default CloudWatch metrics.
18. Review the available CloudWatch metrics.
19. Click the Status Checks tab.
20. Hopefully your status checks for the system and instance have passed.
21. Click the Actions menu and select Create status check alarm.
22. Notice that it starts the process of creating a CloudWatch alarm.
23. Accept the default setting Create a new alarm.
24. Turn off the Alarm notification.
25. Enable Alarm Action and from the drop-down options select Recover.
26. Note the Alarm thresholds has been set to Status Check Failed.
27. Review the other types of data that you could sample / select.
28. Scroll to the bottom Create.
29. Review your instance alarm status by clicking the round circle with three dots.
30. Click services and under Management & Governance select CloudWatch.
31. Check the Alarms by AWS Service, you should see EC2 listed.
32. This alarm will not actually swing into action unless there are issues with the status
checks of the instance.
33. On the left-hand side of the ClooudWatch console click Metrics.
34. Click EC2, and then Per-Instance Metrics.
35. Note all the metrics available for EC2 instances.
36. Scroll down and check CPUUtilization.
37. Click the Graphed metric tab.
38. Review the settings for Statistics, and Period.
39. Under Actions click the Alarm bell.
40. Here's what we could set conditions for the CPUUtilization metric and alarm.
41. From the menu bar click Services and on the left in Recently visited click EC2.
42. On the left-hand side of the EC2 Dashboard select Instances.
43. Click the checkbox to the left of your instance ID and from the Actions menu select
Instance state and then Terminate instance.
44. Click the orange button Terminate.
9
Lab: Create a custom CloudTrail trail
45. Click the AWS logo in the top left-hand corner to show the default AWS Management
Console.
10
Labs for Networking Services
10. Click Services and in Networking & Content Delivery select VPC
11. Select the link Your VPCs
11
12. Select the checkbox to the left of default VPC
13. Take a few moments to review the Details, and the CIDRs tab
14. On the left-hand side of the VPC Dashboard select Subnets and review the subnets for the
default VPC.
15. Select Route Tables and review the route table for the default VPC
16. Select Internet Gateway’s and review the Internet gateway attached to the default VPC.
Create Subnets
1. Log into the AWS console using your credentials for your free AWS account.
2. Click the AWS logo in the top left-hand corner to show the default AWS Management Console.
12
Availability Zone: Pick the same AZ as in step 5
IPv4 CIDR block: 192.168.2.0/24
8. Click Create
13
Description: SSH for Dev Admins
7. Under Outbound rules review the default options
8. Click Create security group
9. Review the Dev A security group settings
10. In the top right-hand corner click Actions and review the available options
11. Click the AWS logo in the top left-hand corner to show the default AWS Management Console.
12. Click Services and from Networking & Content Delivery select VPC
13. On the left-hand side of the VPC Dashboard, scroll down, under Security select Security Groups
14. Note that the Security Groups listing is the same as the EC2 Dashboard values
3. Click Services and from Networking & Content Delivery select VPC
4. On the left-hand side of the VPC Dashboard, scroll down under Security, select Network ACLs
5. Click Create network ACL
6. Name Tag: 443traffic
7. VPC: Select Dev VPC and click Create
8. Select the Network ACL 443traffic
9. Click the Inbound Rules tab
10. Click the button Edit inbound rules
11. Click the button Add Rule
Rule #: 100
Port Range: 443
14
Source: 0.0.0.0/0
Allow / Deny: Allow
12. Note the * rule which denies all inbound IP version 4 traffic not already handled by a preceding
rule, in our case, Rule # 100
13. Click Save
14. Click the Outbound Rules tab
Click the button Edit outound rules
15. Click the button Add Rule
Rule #: 100
Port Range: 443
Source: 0.0.0.0/0
Allow / Deny: Allow
16. Note the * rule which denies all inbound IP version 4 traffic not already handled by a preceding
rule, in our case, Rule # 100
17. Click Save
18. Click the Subnet Associations tab. Note the subnets that the NACL is associated with; currently
no subnets are associated with this NACL
15
14. In the search dialog box type cloudwatch
15. Select CloudWatchFullAccess
16. In the Policy Name dialog box change the name to CloudWatchFullAccess
17. Click Create Policy
18. Go back to the main AWS console
19. Click VPC under Networking
20. Click Subnets
21. Select Private Subnet 1 associated with the VPC Dev VPC
22. Click Subnet Actions and select Create Flow Log
23. For Role select CloudWatchFullAccess
24. For Destination Log Group select PrivateSubnetTraffic
25. Click Create Flow Log
26. Select the Flow Logs tab
27. Note that the flow log is active
16
Labs for Compute Services and more
EBS Volumes
1. Log into the AWS console using your credentials for your free AWS account.
2. Click the AWS logo in the top left-hand corner to show the default AWS Management
Console. Click Services.
Create Snapshots
1. Log into the AWS console using your credentials for your free AWS account.
2. Click the AWS logo in the top left-hand corner to show the default AWS Management
Console. Click Services.
17
The Root Account
1. Log into the AWS console using your credentials for your free AWS account.
2. Click the AWS logo in the top left-hand corner to show the default AWS Management
Console. Click Services.
click your name, and from the drop-down menu select My Security Credentials.
6. You should receive a warning, indicating that you are using the root account, and it’s a
best practice to use IAM. All of the options under Your Security Credentials are worth
exploring for security knowledge and for the certification test.
18
IAM Users and Groups
1. Log into the AWS console using your credentials for your free AWS account.
2. Click the AWS logo in the top left-hand corner to show the default AWS Management
Console. Click Services.
19
19. Click Create New Group
20. For Group Name enter Admins and click Next Step
21. On the Attach Policy screen select AdministratorAccess
22. Click Next Step
23. Click Create Group
24. From the IAM console click Groups
25. Select, and click the group you just created
26. On the Permissions tab and review the managed policy attached to this group.
27. Click the Users tab
28. Click Add Users to Group
29. Add the user account you created earlier in this exercise
30. From the IAM console click Dashboard
31. At the top of the IAM dashboard create an sign-in URL and then copy the IAM users sign
in link
32. Logout and back in to AWS
33. You have now logged in as an IAM user that has been assigned administrative access to
your AWS account
Policy Simulator
1. Click the AWS logo in the top left-hand corner to show the default AWS Management
Console. Click Services.
20
5. At the top of the Policy Simulator screen click Select service and select a service
6. Click Select All
7. Review the actions available
8. Click Run Simulation and review the permissions that are allowed or denied, depending
on the service that you select
Password Policy
1. Click the AWS logo in the top left-hand corner to show the default AWS Management
Console. Click Services.
Trusted Advisor
1. Click the AWS logo in the top left-hand corner to show the default AWS Management
Console. Click Services.
21
Labs for Storage
Create Snapshots
11. Log into the AWS console using your credentials for your free AWS account.
12. Click the AWS logo in the top left-hand corner to show the default AWS Management
Console. Click Services.
22
Create an S3 Bucket and upload content
1. Log into the AWS console using your credentials for your free AWS account.
2. Click the AWS logo in the top left-hand corner to show the default AWS Management
Console. Click Services.
Enable Versioning
1. Log into the AWS console using your credentials for your free AWS account.
2. Click the AWS logo in the top left-hand corner to show the default AWS Management
Console. Click Services.
23
5. Click the Properties tab
6. Click the Versioning tile
7. Select enable versioning and click Save
8. Click the Overview tab
9. Create a text file on your computer called red.txt. Add the text payroll, and save the file
10. Upload the file, after selecting the file, click three times and then click Upload
11. Back on your computer system edit the file red.txt, and add the year and resave the file
12. Now upload the new copy of the file, after selecting the file, click three times and then
click Upload
13. After the upload is completed click the Show button beside the heading Versions
14. Note the two copies of the same object in your bucket
24
Setup RDS
To do this exercise, you need two private subnets in a VPC with each subnet in a different
availability zone.
1. Log into the AWS console using your credentials for your free AWS account.
2. Click the AWS logo in the top left-hand corner to show the default AWS Management
Console. Click Services.
25
14. Under Database options enter a Database Name
15. Under Backup review the Backup Retention Period
16. Under Maintenance review the options for version upgrades, and Maintenance
Window.
17. Click Launch DB Instance
18. In a few seconds, click View Your DB Instances
19. Take some time to review your options under Show Monitoring, and Instance Actions
20. When have finished reviewing, click Instance Actions and delete your database
DynamoDB
1. Log into the AWS console using your credentials for your free AWS account.
2. Click the AWS logo in the top left-hand corner to show the default AWS Management
Console. Click Services.
https://qwiklabs.com/searches/lab?keywords=introduction%20to%20amazon%20dynamod
b&utm_source=ddbconsole&utm_medium=link&utm_campaign=ddbconsole
26
27