Courses

E-Learning

LIVE ONLINE

Curriculum

  • Sl. No.
  • Chapter
  • Chapter - 1.0
  • Designing highly available, cost-efficient, fault-tolerant, scalable systems
  • Chapter - 1.1
  • Identify and recognize cloud architecture considerations, such as fundamental components and effecti
  • Chapter - 1.2
  • Content may include the following:
  • Chapter - 1.3
  • How to design cloud services
  • Chapter - 1.4
  • Planning and design
  • Chapter - 1.5
  • Monitoring and logging
  • Chapter - 1.6
  • Familiarity with:
  • Chapter - 1.6.1
  • Best practices for AWS architecture
  • Chapter - 1.6.2
  • Developing to client specifications, including pricing/cost (e.g., on Demand vs. Reserved vs Spot; R
  • Chapter - 1.6.3
  • Architectural trade-off decisions (e.g., high availability vs. cost, Amazon Relational DatabaseServi
  • Chapter - 1.6.4
  • Hybrid IT architectures (e.g., Direct Connect, Storage Gateway, VPC, Directory Services)
  • Chapter - 1.6.5
  • Elasticity and scalability (e.g., Auto Scaling, SQS, ELB, CloudFront)
  • Chapter - 2.0
  • Implementation/Deployment
  • Chapter - 2.1
  • Identify the appropriate techniques and methods using Amazon EC2, Amazon S3, AWS Elastic Beanstalk,
  • Chapter - 2.1.1
  • Configure an Amazon Machine Image (AMI)
  • Chapter - 2.1.2
  • Operate and extend service management in a hybrid IT architecture
  • Chapter - 2.1.3
  • Configure services to support compliance requirements in the cloud
  • Chapter - 2.1.4
  • Launch instances across the AWS global infrastructure
  • Chapter - 2.1.5
  • Configure IAM policies and best practices
  • Chapter - 3.0
  • Data Security
  • Chapter - 3.1
  • Recognize and implement secure practices for optimum cloud deployment and maintenance. Content may i
  • Chapter - 3.1.1
  • AWS shared responsibility model
  • Chapter - 3.1.2
  • AWS platform compliance
  • Chapter - 3.1.3
  • AWS security attributes (customer workloads down to physical layer)
  • Chapter - 3.1.4
  • AWS administration and security services
  • Chapter - 3.1.5
  • AWS Identity and Access Management (IAM)
  • Chapter - 3.1.6
  • Amazon Virtual Private Cloud (VPC)
  • Chapter - 3.1.7
  • AWS CloudTrail
  • Chapter - 3.1.8
  • Ingress vs. egress filtering, and which AWS services and features fit
  • Chapter - 3.1.9
  • “Core” Amazon EC2 and S3 security feature sets
  • Chapter - 3.1.10
  • Incorporating common conventional security products (Firewall, VPN)
  • Chapter - 3.1.11
  • Design patterns
  • Chapter - 3.1.12
  • DOS mitigation
  • Chapter - 3.1.13
  • Encryption solutions (e.g., key services)
  • Chapter - 3.1.14
  • Complex access controls (building sophisticated security groups, ACLs, etc.)
  • Chapter - 3.1.15
  • Amazon CloudWatch for the security architect
  • Chapter - 3.1.16
  • Trusted Advisor
  • Chapter - 3.1.17
  • CloudW attached Logs
  • Chapter - 3.2
  • Recognize critical disaster recovery techniques and their implementation. Content may include the fo
  • Chapter - 3.2.1
  • Disaster recovery
  • Chapter - 3.2.2
  • Recovery time objective
  • Chapter - 3.2.3
  • Recovery point objective
  • Chapter - 3.2.4
  • Amazon Elastic Block Store
  • Chapter - 3.2.5
  • AWS Import/Export
  • Chapter - 3.2.6
  • AWS Storage Gateway
  • Chapter - 3.2.7
  • Amazon Route53
  • Chapter - 3.2.8
  • Validation of data recovery method
  • Chapter - 4.0
  • Troubleshooting : Content may include the following:
  • Chapter - 4.1
  • General troubleshooting information and questions

Contact Us

AWS Certified Solutions Architect - Associate, this Course and batch also available in other locations View

Top