In this section, the reader goes through the process of configuring all aspects of EC2 instances, as well as the process of penetration-testing and securing them.
The following chapters will be covered in this section:
- Chapter 4, Setting Up Your First EC2 Instances
- Chapter 5, Penetration Testing of EC2 Instances using Kali Linux
- Chapter 6, Elastic Block Stores and Snapshots – Retrieving Deleted Data