ABOUT THIS COURSE
The goal of this course is to examine the competing forces that influence different isolation strategies, weighing the pros and cons of each approach. This highlights how each of these models are realized on AWS and outlines mechanisms that can be used to prevent cross-tenant access.