Description
In this course, you will learn :
- Introduction to AWS
- Classic Data Center
- Virtualization
- Cloud and Cloud Computing
- Cloud Computing Service Models
- Cloud Computing Deployment Models
- Service Comparison: AWS, Azure, and GCP
- Amazon Web Services (AWS) and its Benefits
- AWS Global Infrastructure
- AWS Regions and Replication of data between the Regions
- Availability Zones and High Availability
- PoP Locations
- Signup an AWS Free Tier Account
- Different Amazon Web Services
- Ways to access AWS: CLI, Console, and SDKs
- Explore Management Console and Configure AWS CLI
- AWS CloudShell
- Identity and Access Management in AWS
- Threats to AWS Security
- AWS Shared Responsibility Model
- AWS Security Solutions
- Identity and Access Management (IAM)
- Managing Users with IAM
- Managing Permissions with Groups
- IAM Policy and its Elements
- IAM Roles
- Password Policy
- MFA
- Best Practices for IAM
- AWS Security Token Services
- AWS Single Sign-on
- AWS Resources Access Manager
- Active directory
- Microsoft Active directory
- AWS Directory Services
- AWS Artifact
- AWS Audit Manager
- AWS Certificate Manager
- Accessing Billing and Alerts
- Amazon EC2
- Compute Virtualization
- Amazon Elastic Compute Cloud (EC2) and Its Benefits
- Amazon Machine Image (AMI)
- Security Groups in AWS
- Authentication through Key-pair
- Hardware Tenancy – Shared vs. Dedicated
- Networking Layer in EC2: VPC
- Elastic Network Interface (ENI) and Its Attributes
- Public IP vs. Elastic IP
- Instance Store
- Elastic Block Store (EBS), Its Features and Volume Types
- Solid State Drive: General Purpose SSD and Provisioned IOPS
- Hard Disk Drive: Throughput Optimized HDD and Cold HDD
- Snapshots
- Elastic File System (EFS) and Its Features
- Amazon Batch
- Windows File Server
- Amazon FSx for Windows File Server
- Use case of Amazon FSx for Windows File Server
- Amazon FSx for Lustre
- AWS Storage Options
- Traditional Storage
- Need to Move to Cloud Storage
- Traditional vs. Cloud Storage Cost
- Cloud Storage
- Different Storage Options Available on AWS
- Simple Storage Service (S3) and Its Components
- Working of S3
- Bucket Policy
- Access Control List (ACL)
- Versioning
- S3 Replicate
- Cross-Region Replication (CRR) and Its Use Case
- Amazon S3 Transfer Acceleration
- Choice of Storage Classes on S3
- Lifecycle Policy of S3 Bucket
- AWS Backup
- CDN: CloudFront
- Storage Gateway
- Networking using AWS
- Traditional and Virtual Network
- Virtual Private Cloud (VPC) and Its Benefits
- Default and Non-default VPC
- Major Steps to Configure VPC
- IP Address
- CIDR- Classless Inter-domain Routing
- Subnet
- Private and Public Subnet
- Internet Gateway and Route Tables
- Security Group with VPC
- NACL and Security Group
- NAT Gateway and NAT Instance
- Limitations of VPC Peering
- Transit VPC
- Transit Gateway
- VPC Endpoints
- AWS Private Link
- VPN and Direct Connect
- AWS Global Accelerator
- Load Balancing, Auto Scaling, and Routing using AWS
- Elastic Load Balancer
- Network Load Balancer
- Application Load Balancer
- Gateway Load Balancer
- Advanced Features of ELB
- Benefits and Components of Application Load Balancer
- Load Balancer Troubleshoot
- Auto Scaling and its Benefits
- Auto Scaling Components
- Launch Configurations/ Launch Templates
- Scaling Policies
- Lifecycle of Auto Scaling
- Working on Load Balancer and Auto Scaling
- Scaling Policy
- Use Case of DNS
- Need of Route 53
- Route 53 and it’s Working
- Various Routing Policies
- AWS Database Services
- Database
- AWS Database Services – Use Cases
- Amazon RDS
- Read Replica
- IAM in Amazon RDS
- Difference Between SQL and NoSQL Databases
- Amazon DynamoDB and its Data Structure
- Amazon ElastiCache
- Memcached vs. Redis
- Amazon RedShift and its features
- AWS Redshift Architecture
- Aurora Database
- Connection Management in Aurora
- Amazon Aurora Reliability
- Amazon Aurora Global Database
- Amazon Aurora Serverless
- Amazon Keyspaces
- Apache Cassandra
- Security Management in AWS
- AWS Cognito
- AWS Config
- AWS Firewall Manager
- AWS Network Firewall
- Web Application Firewall (WAF)
- AWS Shield
- Amazon Detective
- AWS Inspector
- AWS Macie
- AWS GuardDuty
- AWS Security Hub
- KMS
- CloudHSM
- AWS Secrets Manager
- Trusted Advisor
- Monitoring Resources and Governance in AWS
- Cloud Monitoring Services
- Amazon CloudWatch
- Amazon Managed Grafana
- Amazon Managed Services for Prometheus
- CloudWatch Events and Logs
- Cloud Monitoring Service: AWS CloudTrail
- CloudTrail Use Cases
- AWS CLI
- AWS Organizations
- AWS License Manager
- AWS Control Tower
- AWS Health Dashboard
- AWS Compute Optimizer
- AWS System Manager
- Application Services, Serverless Computing and Provisioning Infrastructure
- Application Services
- Amazon Simple Email Service (SES)
- Amazon Simple Notification Service (SNS)
- Amazon Simple Queue Service (SQS)
- Dead-Letter Queues
- Simple Workflow Service (SWF)
- Amazon MQ
- Amazon EventBridge
- Serverless Computing
- AWS Lambda
- AWS Serverless Application Model (SAM)
- AWS Step Functions
- Amazon States Language
- Elastic Beanstalk
- Concepts of Elastic Beanstalk
- AWS CloudFormation
- Templates and Stack in CloudFormation
- Cloud Analytics and Cost Management on AWS
- What is Cloud Analytics?
- AWS Analytics Services
- Amazon Athena
- Amazon Kinesis
- Visualize Web Traffic Using Kinesis Data Stream
- Amazon Elasticsearch (Opensearch)
- Amazon QuickSight
- AWS Cost Management
- AWS Cost Management Services
- AWS Cost Explorer
- AWS Budgets
- AWS Cost Optimization
- AWS Architectural Designs – I
- AWS Well-Architected Framework
- Pillars of AWS Well-Architected Framework
- Resilience
- Design Highly Available and Fault-Tolerant Architectures
- Choose Appropriate Resilient Storage
- Designing Decoupling Mechanisms Using AWS Services
- Design a Multi-tier Architecture Solution
- Disaster Recovery (DR)
- Options to Implement DR Plans
- Design High-Performance Architecture
- Achieve Performance Efficiency
- Achieve Performance Efficiency by Monitoring
- Achieve Performance Efficiency by Performing Trade-offs
- AWS Architectural Designs – II (Self-paced)
- Design Secure Applications and Architectures
- Cloud Security
- AWS IAM
- How IAM Secures your Resources?
- Identity and Federation
- Shared Responsibility Model
- Network Security Layer
- Multi-Layer Architecture With Network Security
- AWS HSM and its working
- AWS S3 Security
- AWS Security and Compliance Centre
- Design Cost-Optimized Architectures
- Cost Optimization
- Cost Optimization Design Principles
- Cost Effective Resources
- Migrating to Cloud (Self-paced)
- Why Cloud Migration?
- What is Cloud Migration?
- Migration Phases
- CAF Perspectives and Their Roles
- AWS Migration Hub
- AWS Migration Hub Use Cases
- AWS Application Discovery Service
- Application Discovery Tools
- Application Migration to AWS
- Application Migration Phases
- AWS Server Migration Service (SMS)
- Database Migration Service
- Working of DMS
- AWS Database Migration use cases
- Types of data transfer: Homogenous and Heterogenous
- Database Schema Migration tool
- Database Migration best practices
- Containers in AWS (Self-paced)
- ECS Introduction
- ECS Cluster
- ECS Task Definition
- ECS Service
- ECR Introduction
- Push an image to ECR
- ECS Service with a load balancer
- Deploy an application over the ECS cluster
- EKS
- EKS Architecture
- EKS Cluster
- Creating an EKS Cluster
- EKS Cluster cost
- Elastic Beanstalk
- AWS Machine Learning (Self-paced)
- Machine Learning (ML)
- AI vs. Machine Learning vs. Deep Learning
- Steps of Machine Learning
- Types of Machine Learning algorithms
- Machine Learning on AWS cloud platform
- Amazon SageMaker
- Business Intelligence - Amazon QuickSight
- What are Chatbots?
- Amazon Lex
- Working on Amazon Lex
- Amazon Rekognition
- Working of Amazon Rekognition
- Amazon Polly
- Working of Amazon Polly