NYU Classifieds>NYU Online Courses>Containerized Applications on AWS

Containerized Applications on AWS

About this Course

This course introduces you to container technologies and how they can be used to modernize your applications, as well as exploring how different AWS services can be used to manage and orchestrate those containers. Container technologies have existed for years, and are still gaining popularity. Two of the most prevalent options are Docker and Kubernetes - each with its own distinct set of features. Regardless of which technology you choose, one of the biggest challenges with containers is their orchestration. Unlike traditional, monolithic applications where you can only scale at a macro level - an executable, for example - containerized applications scale at the container level. When coupled with a microservices approach, each container can contain the code necessary to execute a single task or function. While this provides a number of benefits, a single application can consist of hundreds of containerized microservices. How do you handle starting, stopping, scaling out and scaling in all of these containers? AWS offers a number of services that help with container orchestration, including Amazon Elastic Container Service (ECS), Amazon Elastic Kubernetes Service (EKS), Amazon Lightsail, and Amazon Elastic Container Registry (ECR). Throughout this course, expert instructors will dive deep into these services as well as general container technologies and capabilities. This course uses a combination of video-based lectures, delivered by AWS technical trainers, demonstrations, and hands-on lab exercises (Verified Learners only), to enable you to deploy and manage a containerized application.

Created by: Amazon Web Services

Level: Introductory


Related Online Courses

This course is the first of a two-course sequence: Introduction to Computer Science and Programming Using Python, and Introduction to Computational Thinking and Data Science. Together, they are... more
Network security plays a vital role in most organizations. It is the process of preventing and detecting unauthorized use of an organization’s networking infrastructure. Network Defense E... more
This programming course takes a unique approach, as it focuses on learning a systematic programming method rather than a programming language. This practical approach will help you channel your... more
En este curso lograrás familiarizarte con los principios filosóficos y algorítmicos de las técnicas más populares de inteligencia artificial. El curso está estructurado como un compendio de algor... more
Build on your existing knowledge of conditionals, loops, and functions by studying more about complex Python data structures, including strings, lists, dictionaries, and file input and output.... more

CONTINUE SEARCH

FOLLOW COLLEGE PARENT CENTRAL