# Serverless

AWS provides a range of fully managed services that you can use to build serverless applications, such as AWS Lambda, Amazon API Gateway, and Amazon DynamoDB. To get started with serverless development in the AWS Cloud, review these serverless learning resources.

## Get started with serverless

- [Serverless Developer Guide](/serverless/latest/devguide/): Provides a conceptual overview of serverless development in the AWS Cloud, fundamental instructions for core serverless AWS services, and related learning resources for developers.
- [Serverless Land](https://serverlessland.com/): Brings together the latest blogs, videos, code, and learning resources for serverless AWS services.

## Developer tools

- [AWS SAM Developer Guide](/serverless-application-model/latest/developerguide/): Introduces you to the AWS Serverless Application Model. Shows you how to use AWS SAM templates and the AWS SAM CLI to define, test, and deploy serverless applications.

## Serverless services

The following serverless AWS services have a [service starter](https://docs.aws.amazon.com/serverless/latest/devguide/serverless-starters-overview.html) section in the [Serverless Developer Guide](https://docs.aws.amazon.com/serverless/latest/devguide/).

- [Lambda Developer Guide](/lambda/latest/dg/): Provides an overview and instructions for AWS Lambda, which you can use to run code without provisioning or managing servers.
- [API Gateway Developer Guide](/apigateway/latest/developerguide/): Provides an overview of Amazon API Gateway, which you can use to create and deploy your own REST, HTTP, and WebSocket APIs.
- [DynamoDB Developer Guide](/amazondynamodb/latest/developerguide/): Provides a conceptual overview of Amazon DynamoDB, which you can use to create scalable, fully managed NoSQL key-value data stores.
- [IAM User Guide](/IAM/latest/UserGuide/): Introduces you to AWS Identity and Access Management, helps you set up users and groups, and shows you how to protect your AWS resources with access control policies.

---

