Containerized Applications on AWS
About this Course
This course introduces you to container technologies and how they can be used to modernize your applications, as well as exploring how different AWS services can be used to manage and orchestrate those containers. Container technologies have existed for years, and are still gaining popularity. Two of the most prevalent options are Docker and Kubernetes - each with its own distinct set of features. Regardless of which technology you choose, one of the biggest challenges with containers is their orchestration. Unlike traditional, monolithic applications where you can only scale at a macro level - an executable, for example - containerized applications scale at the container level. When coupled with a microservices approach, each container can contain the code necessary to execute a single task or function. While this provides a number of benefits, a single application can consist of hundreds of containerized microservices. How do you handle starting, stopping, scaling out and scaling in all of these containers? AWS offers a number of services that help with container orchestration, including Amazon Elastic Container Service (ECS), Amazon Elastic Kubernetes Service (EKS), Amazon Lightsail, and Amazon Elastic Container Registry (ECR). Throughout this course, expert instructors will dive deep into these services as well as general container technologies and capabilities. This course uses a combination of video-based lectures, delivered by AWS technical trainers, demonstrations, and hands-on lab exercises (Verified Learners only), to enable you to deploy and manage a containerized application.Created by: Amazon Web Services
Level: Introductory

Related Online Courses
In this course, we build upon the knowledge we built up so far on cache side-channel attacks as well as the side-channel and security mindset. We will then go beyond software-based side-channel... more
Knowing how to work with Version Control Systems Git and GitHub are essential tools for today’s Software Developers, Data Scientists, and Data Engineers. They provide both a version control s... more
Data is driving our world today. However, we hear about data breaches and identity thefts all the time. Trust on the Internet is broken, and it needs to be fixed. As such, it is imperative that we... more
El curso presenta los elementos básicos y las tendencias actuales para realizar una evaluación completa del entorno construido y desarrolla las herramientas para el análisis de impacto de la po... more
Cybersecurity risk management guides a growing number of IT decisions. Cybersecurity risks continue to have critical impacts on overall IT risk modeling, assessment and mitigation. In this course,... more