<?xml version="1.0" encoding="UTF-8"?><oembed><type>video</type><version>1.0</version><html>&lt;iframe src=&quot;https://www.loom.com/embed/a25835f7ad6c4cad99b83d215b7ee036&quot; frameborder=&quot;0&quot; width=&quot;1152&quot; height=&quot;864&quot; webkitallowfullscreen mozallowfullscreen allowfullscreen&gt;&lt;/iframe&gt;</html><height>864</height><width>1152</width><provider_name>Loom</provider_name><provider_url>https://www.loom.com</provider_url><thumbnail_height>864</thumbnail_height><thumbnail_width>1152</thumbnail_width><thumbnail_url>https://cdn.loom.com/sessions/thumbnails/a25835f7ad6c4cad99b83d215b7ee036-f6d260f0f95cb0a6.gif</thumbnail_url><duration>897.865</duration><title>Understanding AWS VPC and Networking Security 🔒</title><description>In this video, I walk through the fundamentals of AWS VPC and networking security. I built a small AWS environment from scratch, including a VPC, public and private subnets, route tables, and EC2 instances with least privilege security groups. I emphasize that the distinction between public and private subnets lies in their route tables. I invite viewers to share their thoughts or suggestions on tightening the design further in the comments. This is part of my ongoing journey into cloud engineering and security.</description></oembed>