Changes

Jump to navigation Jump to search
no edit summary
This course covers topics such as the following:
 # [[AWS Accounts and Organizations including Service Control Policies (SCPs)]] # [[Identity Management and Permissions including RBAC, ABAC and permissions boundaries]]# AWS Directory Services and Federation including Identity Federation, AWS SSO, and Cognito# Advanced Amazon VPC including a routing deep dive and multi-account VPC configurations# Hybrid Connectivity including S2S VPN, Direct Connect, and AWS Transit Gateway# Compute, Auto Scaling, and Load Balancing including ALB, NLB, EC2, and NAT# AWS Storage Services including EBS, EFS, and Amazon S3# DNS, Caching, and Performance Optimization including Route 53, CloudFront, and AWS Global Accelerator# AWS Database Services including Amazon RDS, Aurora, ElastiCache and DynamoDB# Serverless Applications including AWS Lambda, EventBridge, SQS, SNS, and API Gateway# Docker Containers and PaaS including Amazon ECS, Fargate, and Elastic Beanstalk# Deployment and Management including AWS CodeCommit, CodePipeline, Service Catalog, Systems Manager and more# Migration and Transfer Service including AWS DMS, SMS, DataSync, and Snowball# Analytics Services including Amazon Athena, AWS Glue, RedShift, EMR, and Kinesis# Monitoring, Logging and Auditing including CloudWatch, CloudTrail and AWS X-Ray# Defense in Depth including how to build a secure application with ACM, KMS, Config, Inspector and WAF/Shield# Cost Management including how AWS services are priced, consolidated billing, and AWS Budgets
Detailed notes are broken down according to each section of the course
# [[Section 1: Introduction and Course Download]] 1-3
# [[Section 2: AWS Accounts and Organizations]] 4-16
# [[Section 3: Identity Management and Permissions]] 17-24
# [[Section 4: AWS Directory Services and Federation]] 37-41
# [[Section 5: Advanced Amazon VPC]] 42-56
# [[Section 6: Hybrid Connectivity]] 57-63
# [[Section 7: Compute, Auto Scaling, and Load Balancing]] 64-85
# [[Section 8: AWS Storage Services]] 86-102
# [[Section 9: DNS, Caching, and Performance Optimization]] 103-115
# [[Section 10: AWS Database Services]] 116-133
# [[Section 11: Serverless Applications]] 134-149
# [[Section 12: Docker Containers and PaaS]] 150-167
# [[Section 13: Deployment and Management]] 168-195
# [[Section 14: Migration and Transfer Services]] 196-203
# [[Section 15: Analytics Services]] 204-211
# [[Section 16: Monitoring, Logging and Auditing]] 212-219
# [[Section 17: Security: Defense in Depth]] 220-238
# [[Section 18: Additional Services]] 239-248
# [[Section 19: Sample Practice Test]]
# [[Section 20: Additional Training Resources]] 249
#[[Section 1: Introduction and Course Download]] 1-3
#[[Section 2: AWS Accounts and Organizations]] 4-16
#[[Section 3: Identity Management and Permissions]] 17-36
#[[Section 4: AWS Directory Services and Federation]] 37-41
#[[Section 5: Advanced Amazon VPC]] 42-56
#[[Section 6: Hybrid Connectivity]] 57-63
#[[Section 7: Compute, Auto Scaling, and Load Balancing]] 64-85
#[[Section 8: AWS Storage Services]] 86-102
#[[Section 9: DNS, Caching, and Performance Optimization]] 103-115
#[[Section 10: AWS Database Services]] 116-133
#[[Section 11: Serverless Applications]] 134-149
#[[Section 12: Docker Containers and PaaS]] 150-167
#[[Section 13: Deployment and Management]] 168-195
#[[Section 14: Migration and Transfer Services]] 196-203
#[[Section 15: Analytics Services]] 204-211
#[[Section 16: Monitoring, Logging and Auditing]] 212-219
#[[Section 17: Security: Defense in Depth]] 220-238
#[[Section 18: Additional Services]] 239-248
#[[Section 19: Sample Practice Test]]
#[[Section 20: Additional Training Resources]] 249
<li> 15. AWS Control Tower
<li> 16. [HOL] Create a Landing Zone
<li> 17. Introduction<li> 18. How IAM Works<li> 19. Overview of Users, Groups, Roles and Policies<li> 20. IAM Authentication Methods<li> 21. AWS Security Token Service (STS)<li> 22. Multi-Factor Authentication (MFA)<li> 23. [HOL] Setup Multi-Factor Authentication (MFA)<li> 24. Identity-Based Policies and Resource-Based Policies<li> 25. Access Control Methods - RBAC & ABAC<li> 26. Permissions Boundaries<li> 27. IAM Policy Evaluation<li> 28. IAM Policy Structure<li> 29. [HOL] Using Role-Based Access Control (RBAC)<li> 30. [HOL] Using Attribute-Based Access Control (ABAC)<li> 31. [HOL] Apply Permissions Boundary<li> 32. Use Cases for IAM Roles<li> 33. [HOL] Cross-Account Access to S3<li> 34. Access Keys and IAM Roles with EC2<li> 35. [HOL] Amazon EC2 Instance Profile<li> 36. AWS IAM Best Practices
<li> 37. Introduction
 
<li> 38. AWS Directory Services
<li> 39. Identity Providers and Federation

Navigation menu