AgentEdX
PromptSq2CommunityFun Chat

AgentEdX — Stay current as agentic AI evolves.

© 2026 AgentEdX

AWS Foundations

Cloud basics for builders

7 parts · For everyone

Your Progress0%

7 modules remaining

01

FOUNDATIONS

Your Account & the AWS Map

“Secure the account, then learn the city — every service has a place.”

Your AWS account is the boundary for billing and administration. Protect the root user with MFA and use it only for account-level tasks (billing, closing the account). For everyday work, use IAM users or your organization’s identity provider. Turn on AWS Budgets and alerts so spend is visible early.

A Region is a geographic area with multiple Availability Zones (isolated datacenters). You choose a Region when you create most resources. An ARN (Amazon Resource Name) uniquely identifies a resource in API calls and policies. The AWS SDK (for example boto3 or @aws-sdk/client-s3) signs requests so your code does not implement raw cryptography by hand.

The city analogy

Picture AWS as a city: EC2 is renting an office building you manage yourself. S3 is the warehouse district for objects. IAM is the security desk — who may enter which building. Lambda is a courier that shows up only when called. VPC is the gated community where you control roads and gates. The cards below name every core service beginners touch most often; later modules go deeper.

💻

EC2

Virtual machines: OS, instance type, and networking under your control — you patch and scale.

🪣

S3

Object storage in buckets; keys look like paths; pair with lifecycle and encryption.

λ

Lambda

Run code on events without provisioning servers; pay per invocation and duration.

🔐

IAM

Users, groups, roles, and JSON policies — who can call which API on which resource.

🧠

Bedrock

Foundation models via API; agents and knowledge bases for grounded answers.

🗄️

DynamoDB

Managed NoSQL — partition key design and capacity mode matter from day one.

🚪

API Gateway

HTTP, REST, or WebSocket front ends that invoke Lambda or other backends.

🗝️

Secrets Manager

Store and rotate secrets; grant retrieve via IAM instead of hardcoding keys.

📊

CloudWatch

Logs, metrics, and alarms — first place to look when something errors or slows down.

🌊

Kinesis

Ingest and process streaming data at high throughput for real-time pipelines.

📨

SQS

Queues that decouple producers and consumers with retries and dead-letter queues.

🌐

VPC

Your private network: subnets, routes, security groups, and optional endpoints.

📌Tip

Pick one default Region for tutorials and stay consistent so console views, ARNs, and examples line up.

02
02

SECURITY

IAM Users & Groups

“People get badges — one person, one user.”

The office building

Imagine AWS as a corporate office building. Everything inside — compute, storage, databases — is a service. IAM is the security system for who enters, which rooms they may use, and what they may do there.

IAM User — analogy: full-time employee

An IAM User is a full-time employee with a photo ID. They have a permanent badge with their name. They sign in to the console with a password (humans) or use access key ID + secret for the CLI and SDK (automation). One person, one User — never share a User between people, or you lose audit trails and clean revocation.

IAM Groups batch users for the same job: attach policies to Developers or ReadOnly, add users to the group, and everyone inherits the same permissions. Prefer attaching policies to groups, not directly to users, so moves between teams are a group membership change.

🔑

Credentials

Console: password (+ MFA). Programmatic: access keys for CLI/SDK — never commit keys to source control.

👥

Groups

Attach least-privilege policies to a group; add the user — scalable and auditable.

Root user — the master key

The root user created the account. It can do things no IAM user can (for example close the account or change billing). Do not use root for daily work. Enable MFA on root, create a personal IAM administrator for yourself, and leave root logged out until you truly need it.

🔑Key idea

MFA is a second factor after the password — like a second key for your badge. Enable it for every human user with meaningful permissions.

03
03

SECURITY

IAM Roles & Policies

“Services wear temporary badges — policies define the doors.”

IAM Role — analogy: contractor badge

An IAM Role is a contractor badge kept in a drawer at reception. When a delivery robot (for example Lambda) arrives, reception hands it the badge. The robot enters only the rooms allowed on the access list, finishes the job, and returns the badge. The badge has no permanent owner — AWS issues short-lived credentials when the role is assumed. That is why Lambda, EC2, and Bedrock use roles, not long-lived user keys in code.

IAM Policy — analogy: door access list

An IAM Policy is the laminated list on each door: who may enter, which actions they may perform inside (read, write, delete), and which rooms (resources) the rule applies to. In JSON, that is Effect (Allow/Deny), Action, and Resource — plus optional Condition. A User or Role only gains power when a policy is attached.

Default is deny. Nothing is allowed until a policy Allow says so. An explicit Deny always wins over Allow — use Deny for guardrails nobody can override with a broader Allow elsewhere.

Trust policy vs permission policy

A trust policy on a role answers: who may assume this role (for example lambda.amazonaws.com). Permission policies answer: what may this role do once assumed (for example s3:GetObject on one bucket ARN). Mixing them up is a common source of “I attached a policy but nothing works.”

⛔Watch out

Do not embed IAM user access keys in application code or shared documents. Use roles for services and temporary credentials for people where possible.

04
04

NETWORKING

VPC & Networking

“A private network inside the public cloud.”

A VPC is your isolated network in a Region. You split it into subnets across Availability Zones. Route tables send traffic to an Internet Gateway (public subnets), a NAT gateway (private outbound), or VPC endpoints (private access to AWS APIs). Security groups are stateful firewalls attached to ENIs; network ACLs are optional subnet-level rules.

The gated community mental model still fits: you decide what is visible from the internet and what stays internal. Start with default VPC documentation in your Region, then learn public vs private subnets before running databases or internal APIs.

Diagram

VPC building blocks

VPC CIDR
e.g. 10.0.0.0/16
→
Subnets
per AZ
→
Routes
IGW, NAT, endpoints
→
Security group
instance firewall
05
05

BUILD

Compute & Object Storage

“EC2, Lambda, S3, and Secrets Manager — run code and hold data.”

EC2 gives you full control of a virtual server: AMI, instance family, storage, and patching. Attach an IAM instance profile (a role) so applications use temporary credentials. Lambda runs a handler on events (HTTP, queues, schedules) with no servers to SSH into; watch timeouts, memory, and cold starts.

S3 stores objects in buckets with global unique names. Use Block Public Access, encryption, and IAM or bucket policies — not accidental public ACLs. Secrets Manager stores API keys and database passwords with optional rotation; grant GetSecretValue via IAM to Lambdas or EC2 roles instead of baking secrets into images.

🖥️

EC2 vs Lambda

EC2 for steady workloads and full OS control; Lambda for event-driven, short-lived code with managed scaling.

🪣

S3 + Secrets

Objects in S3; secrets in Secrets Manager — both accessed via IAM from your compute.

06
06

INTEGRATE

APIs, Queues & Streams

“API Gateway, DynamoDB, SQS, and Kinesis — connect systems at scale.”

API Gateway fronts HTTP or WebSocket APIs with throttling, authentication, and integration to Lambda or HTTP backends. DynamoDB is a managed key-value and document store: design partition keys for even access patterns; use on-demand or provisioned capacity.

SQS buffers work between services with visibility timeouts and dead-letter queues for poison messages. Kinesis ingests streams for real-time analytics and fan-out consumers. Together they let you build pipelines that stay responsive under load.

🚪

API Gateway

Stable HTTPS entry points with optional API keys and authorizers.

🗄️

DynamoDB

Single-digit millisecond access at scale when keys match your query pattern.

📬

SQS / Kinesis

Queues for async work; streams for high-volume ordered processing.

07
07

AI & OPS

AI Services & Operations

“Bedrock, Knowledge Bases, CloudWatch, and CloudTrail.”

Amazon Bedrock exposes foundation models through a single API so you are not operating GPU fleets. Knowledge Bases combine retrieval with models for RAG — answers grounded in your documents stored in S3 or connected sources. Model and feature availability varies by Region; check quotas and pricing where you deploy.

CloudWatch is where logs, metrics, and alarms live for Lambda, API Gateway, and nearly every service. CloudTrail records management events — who changed IAM, bucket policies, or network rules — which you need for security reviews and compliance. Pair observability with least-privilege IAM from modules 02–03.

🧠

Bedrock

Invoke models and build agents with tools; ground answers with Knowledge Bases.

📈

CloudWatch

Troubleshoot errors and latency; alarm before customers notice.

📋

CloudTrail

Audit API activity across the account — essential for IAM and data governance.

✓Takeaway

Success check: you covered account safety, the core service map, IAM users and roles (with scenarios), networking, compute and storage, integration and streaming data, and AI plus observability — each with inline checks above.

☁️

You Have a Map of the Cloud

Optional extras on this same site: expanded beginner companion and interactive IAM deep dive — not required to complete the modules above.

ACCOUNT · IAM · DATA · COMPUTE · EDGE · AI

More courses →Start over from the topAll courses
Question 1

What should you do first to protect the root user of a new AWS account?

Question 2

What is an AWS Availability Zone (AZ)?

Question 3

What is an Amazon Resource Name (ARN) used for?

Choose an answer — you get instant feedback and a quick celebration when it’s right.

Question 1

In the building analogy, an IAM User is most like:

Question 2

What is the recommended way to give the same permissions to many developers?

Question 3

What is the safest way to structure permissions for a team of 5 developers?

Choose an answer — you get instant feedback and a quick celebration when it’s right.

Question 1

In the building analogy, an IAM Policy is most like:

Question 2

Your Lambda function gets an "Access Denied" error when trying to write to S3. What is the most likely cause?

Question 3

You need to give your EC2 instance access to read from DynamoDB. What should you do?

Choose an answer — you get instant feedback and a quick celebration when it’s right.

Question 1

What is the primary role of a VPC?

Question 2

What is a security group?

Question 3

Why place databases in private subnets?

Choose an answer — you get instant feedback and a quick celebration when it’s right.

Question 1

When would you typically choose EC2 over Lambda?

Question 2

What is a Lambda cold start?

Question 3

What should you enable on S3 buckets by default to avoid accidental public exposure?

Choose an answer — you get instant feedback and a quick celebration when it’s right.

Question 1

What is a common use for Amazon API Gateway?

Question 2

Why does DynamoDB partition key design matter?

Question 3

What is a dead-letter queue (DLQ) used for with SQS?

Choose an answer — you get instant feedback and a quick celebration when it’s right.

Question 1

What does retrieval-augmented generation (RAG) with a Bedrock Knowledge Base typically improve?

Question 2

What is CloudWatch primarily used for?

Question 3

What does AWS CloudTrail capture?

Choose an answer — you get instant feedback and a quick celebration when it’s right.