
Architecting Solutions with AWS (AWS Certified Solution Architect - Associate)
- AWS Foundations & IAM
Understand AWS’s global infrastructure, IAM users, roles, groups, policy types, and the shared responsibility model. - Secure Access Design
Implement secure access using IAM Identity Center (SSO), cross-account access, service control policies (SCPs), and federated identity. - Application Security Essentials
Apply security best practices for applications with VPC security layers, WAF, AWS Shield, Cognito, GuardDuty, and Secrets Manager. - Data Protection & Encryption
Master encryption with AWS KMS and ACM, learn to protect data at rest and in transit, and enforce data lifecycle and compliance controls. - Scalable Architecture Design
Design loosely coupled, event-driven systems using services like Lambda, SQS, SNS, and EventBridge. - High Availability & Fault Tolerance
Deploy resilient systems using multi-AZ setups, auto scaling, Route 53 failover, and disaster recovery (DR) strategies. - Scalable Storage Solutions
Explore Amazon S3, EBS, and EFS with lifecycle policies, replication strategies, and hybrid storage design. - Elastic Compute & Containers
Work with EC2, Auto Scaling Groups, Fargate, and orchestrate containerized applications with ECS and EKS. - High-Performance Databases
Understand database options like RDS, Aurora, DynamoDB, ElastiCache, read replicas, and performance tuning. - Scalable Networking
Design efficient network topologies using VPC, NAT gateways, VPN, Direct Connect, Global Accelerator, and CloudFront. - Data Ingestion & Analytics
Use AWS Glue, Kinesis, Athena, and Quicksight to ingest, process, and visualize data for real-time insights. - Compute & Storage Cost Optimization
Learn how to use EC2 spot instances, Savings Plans, storage tiering, and data transfer cost strategies. - Cost-Effective Database Solutions
Select the right database engines and caching strategies to meet business needs while minimizing cost. - Optimized Network Architecture
Implement cost-effective networking with VPC peering, endpoints, Transit Gateway, and bandwidth allocation strategies. - AWS Well-Architected Framework
Apply the five pillars of AWS architecture: operational excellence, security, reliability, performance efficiency, and cost optimization using Trusted Advisor and AWS Well-Architected Tool.
Advanced Architecting Solutions with AWS (AWS Certified Solution Architect - Professional)
- Exam Overview & Well-Architected Framework
Get familiar with the exam structure, scoring, question types, and the pillars of the AWS Well-Architected Framework. - Network Design & Connectivity
Understand VPC architecture, routing strategies, hybrid DNS, and secure multi-account connectivity. - Security Best Practices
Master IAM roles and policies, encryption methods, centralized security event management, and compliance tools. - High Availability & Disaster Recovery
Design resilient systems using multi-AZ/multi-region strategies, backup solutions, and disaster recovery techniques. - Multi-Account Architecture & Governance
Set up AWS Organizations, Control Tower, and implement centralized logging and event handling across accounts. - Cost Optimization & Usage Visibility
Utilize AWS Budgets, Cost Explorer, Savings Plans, and tagging strategies to reduce cloud spending and gain insights. - Infrastructure Deployment & Automation
Automate deployments using CloudFormation, CI/CD pipelines, and Systems Manager for scalable configuration management. - Application Security & Threat Mitigation
Configure WAF, Shield, and GuardDuty for DDoS protection and intrusion detection, and apply secure service endpoints. - Reliability Engineering & Fault Tolerance
Implement Auto Scaling, decoupled services (SQS/SNS), and DNS-based routing for resilient application architectures. - Performance Optimization Techniques
Design elastic, scalable systems using caching, load balancing, and purpose-built AWS databases. - Monitoring & Operational Excellence
Enable effective logging, monitoring, alerting, and automated remediation for efficient operations. - Secrets Management & Compliance Automation
Use Secrets Manager, SSM, and AWS Config rules to enforce least privilege and automate patching. - Global Performance & SLA Monitoring
Enhance performance using CloudFront, Global Accelerator, and monitor SLAs and KPIs with CloudWatch and X-Ray. - Scalable & Reliable Architecture Patterns
Design architectures that support growth, eliminate single points of failure, and incorporate self-healing capabilities. - Cloud Cost Efficiency & Optimization Strategies
Implement billing alerts, identify underutilized resources, and optimize storage, compute, and networking costs. - Migration Planning & Application Assessment
Evaluate legacy systems, categorize them using the 7Rs, and prioritize migrations using AWS Migration Hub. - Data, Database & App Migration Tools
Use AWS DMS, DataSync, and Transfer Family for seamless migration of workloads, databases, and data lakes. - Modern AWS Architecture Design
Refactor monolithic apps into containers or serverless architectures with optimal compute and database services. - Application Modernization & Integration
Build event-driven systems with Lambda, EventBridge, Step Functions, and leverage serverless patterns.
Security Speciality on AWS (AWS Certified Security – Speciality)
- Incident Response Planning & Security Finding Formats (ASFF)
Learn how to design an effective incident response strategy using AWS best practices - Threat Detection with AWS Services
Dive into GuardDuty, Macie, Security Hub, and other tools for identifying anomalies and threats - Response Techniques for Compromised Resources
Understand root cause analysis, forensic data capture, and containment procedures - Monitoring and Alerting Strategies
Build centralized alerting systems using CloudWatch, EventBridge, and Security Hub integrations - Troubleshooting Monitoring Systems
Diagnose and fix issues related to missing or misconfigured alerts and monitoring gaps - AWS Logging Services and Lifecycle Management
Explore VPC Flow Logs, DNS logs, CloudTrail, and log retention policies - Log Analysis and Threat Correlation
Use services like Athena and CloudWatch Logs Insights to interpret, correlate, and act on log data - Edge Security Controls for Web Applications
Protect apps with WAF, Shield, CloudFront, and layered perimeter defenses - Network Security Design
Implement segmentation, traffic control, and secure connectivity using VPCs, NACLs, and VPNs - Securing Compute Workloads
Harden EC2 instances, scan for vulnerabilities, and manage secure image pipelines - Network Security Troubleshooting
Identify, analyze, and resolve connectivity and security anomalies across your network - Authentication for AWS Resources
Implement and manage identity providers, IAM, Cognito, MFA, and temporary credentials - Authorization Strategies and IAM Policies
Apply RBAC, ABAC, and fine-grained IAM policies to control access across services - Data-in-Transit Security
Encrypt communication using TLS, VPN, and secure APIs to maintain confidentiality and integrity - Data-at-Rest Protection
Utilize encryption (KMS, CloudHSM), access control, and integrity validation mechanisms - Data Lifecycle and Retention Management
Define and enforce retention policies using lifecycle rules for S3, snapshots, and logs - Secrets and Key Management
Manage secure storage and rotation of credentials, API keys, and cryptographic materials - Multi-Account Governance
Design organizational structures, SCPs, and centralized security controls with AWS Organizations - Infrastructure as Code (IaC) & Secure Deployments
Use CloudFormation, tag policies, and Service Catalog to ensure consistent and compliant deployments - Compliance Monitoring and Audit Tools
Track compliance using AWS Config, Macie, Security Hub, and Audit Manager - Security Gap Analysis and Cost Optimization
Use Trusted Advisor, Well-Architected Tool, and usage reports to improve security posture and reduce attack surfaces
Advanced Networking Speciality on AWS (AWS Certified Advanced Networking – Speciality)
- Edge Network Services & Global Architectures
Explore content delivery and global traffic management using CloudFront, Global Accelerator, and API Gateway. - DNS Solutions (Public, Private & Hybrid)
Understand DNS protocols, Route 53 configurations, health checks, resolvers, and hybrid DNS patterns. - Designing Scalable Load Balancing Architectures
Dive into L3/L4/L7 balancing, sticky sessions, TLS termination, and ELB integrations with EKS and WAF. - Logging and Monitoring Network Performance
Configure CloudWatch, Flow Logs, Reachability Analyzer, and Network Manager for end-to-end visibility. - Hybrid Connectivity with On-Premise Networks
Learn BGP, VPN, Direct Connect, LAGs, and SD-WAN setups with Transit Gateway Connect. - Multi-Account and Multi-Region Network Design
Architect VPC Peering, Transit Gateway, PrivateLink, and VPC sharing strategies across accounts. - Routing and Connectivity Implementation
Set up static/dynamic routes, accelerated VPNs, Direct Connect gateways, and hybrid DNS integration. - Inter-VPC and Cross-Region Networking
Implement secure multi-account networking with PrivateLink, RAM, MPLS, and third-party SD-WANs. - Complex DNS Architectures and Traffic Management
Design and implement advanced DNS forwarding, delegation, DNSSEC, and latency-based routing. - Network Infrastructure Automation
Use AWS CDK, CloudFormation, and CLI to automate event-driven networking with hybrid capabilities. - Maintaining Hybrid Routing and Connectivity
Configure Direct Connect with BGP, manage route tables, and optimize route propagation. - Monitoring and Troubleshooting Network Traffic
Analyze VPC Flow Logs, traffic mirroring, packet size mismatches, and use Reachability Analyzer. - Performance and Cost Optimization Techniques
Choose between VPC peering, transit gateways, and proxy solutions; optimize subnets and interfaces. - Implementing Network Security Features
Secure AWS networks using WAF, Shield, Network Firewall, and security group segmentation. - Monitoring and Auditing Network Security
Set up CloudWatch alarms, Flow Logs, and audit configurations using Firewall Manager and CloudTrail. - Encrypting Network Communications and Data in Transit
Apply TLS, IPsec, VPN over Direct Connect, and secure DNS communications using ACM and DNSSEC.
Running & Managing Containers on AWS ( EKS & ECS )
- Kubernetes Fundamentals
Kubernetes architecture and components, Control Plane and Node interactions, Pods, ReplicaSets, Deployments and Services, Labels, selectors, taints, tolerations, Namespaces and resource management - Amazon EKS Essentials
EKS control plane and node group architecture, Cluster creation with eksctl and AWS Console, IAM integration for Kubernetes workloads, Managed node groups vs Fargate, Add-ons and version upgrades in EKS - Helm and Application Deployment
Helm chart structure and templating, Writing and customizing Helm charts, Deploying applications using Helm, Integrating Amazon S3 for storing and serving static assets - Scaling and GitOps
Horizontal Pod Autoscaler and Cluster Autoscaler, Karpenter for cost-efficient scaling, GitOps workflows using Jenkins, Declarative CI/CD deployment strategies - Networking in Amazon EKS
VPC and subnet setup for EKS, Amazon VPC CNI plugin and custom IP management, Pod-to-pod and pod-to-service communication, Kubernetes network policies for traffic control - Monitoring and Observability
CloudWatch Container Insights and metrics collection, Prometheus and Grafana integration, Dashboard creation and real-time alerting - Amazon ECS Introduction
ECS architecture and components, ECS vs EKS comparison and use cases, ECS task definitions and service management, EC2 and Fargate launch types explained - ECS Networking and Storage
VPC networking and ENI configuration in ECS, IAM roles for ECS task execution, Mounting EFS volumes to ECS containers, Configuring secure communication within ECS - CI/CD and Advanced ECS Deployments
Docker pipelines using GitHub Actions and CodePipeline, Blue/green deployment strategy with ALB, ECS service autoscaling and rolling updates - Security and IAM Integration
IAM roles for service accounts (IRSA) in EKS, Task-level IAM roles in ECS, Kubernetes RBAC and access control, Managing secrets with AWS Secrets Manager and KMS - Capstone and Architecture Strategy
Deploying applications across both ECS and EKS, Comparing cost, performance, and operations, Choosing the right orchestration platform for your workload
Managing Cloud Operations on AWS (System Operations)
- Introduction to AWS SysOps & Exam Overview
Certification scope, Target candidate profile, Exam format and scoring, Study approach - Monitoring and Logging with CloudWatch
CloudWatch Logs, Metrics and Insights, CloudWatch Agent, Alarms and Dashboards - Remediation using EventBridge & Systems Manager
EventBridge rules, Automation runbooks, AWS Config for remediation - Scalability and Elasticity
Auto Scaling plans, Caching, RDS/Aurora replicas, Loosely coupled architectures - High Availability & Fault Tolerance
Elastic Load Balancer, Multi-AZ deployments, Route 53 health checks, Fault tolerant architectures - Backup, Restore, and Disaster Recovery
Automated backups, Lifecycle policies, RTO/RPO, Cross-region replication - Provisioning Resources with AMIs and CloudFormation
AMI management, CloudFormation templates, StackSets and cross-account roles - Deployment Strategies & Automation
Blue/Green, Rolling deployments, Automated patching, EventBridge scheduling - IAM & Access Policies
IAM roles, MFA, Policies, SAML, Resource policies, Permissions boundaries - Access Auditing & Security Checks
IAM Access Analyzer, Policy simulator, Trusted Advisor, SCP validation - Data Protection & Encryption
KMS, Encryption at rest and in transit, Secrets Manager, ACM, VPN - Networking Basics & VPC Setup
Subnets, Route tables, NACLs, Security groups, NAT Gateway - Private Connectivity & Network Protection
VPC Peering, VPN, Session Manager, WAF, AWS Shield - Route 53 and DNS Management
Hosted zones, Record types, Routing policies, DNS resolution - CloudFront and Content Delivery
CloudFront distribution, OAC, Static website hosting - Network Troubleshooting
VPC Flow Logs, ELB logs, WAF logs, Hybrid troubleshooting - Cost Optimization Techniques
Cost Explorer, Budgets, Spot Instances, Cost allocation tags - Performance Optimization Strategies
EBS tuning, EC2 enhancements, S3 acceleration, RDS tuning - Multi-Account Strategies & Governance
Organizations, Control Tower, Service control policies, Compliance setup
Cloud Migrations to AWS
- Introduction to Cloud Migration
What is Cloud Migration, Why Migrate to AWS, Cloud vs. On-premises: Benefits and Trade-offs, Business drivers for migration, Common migration challenges, Overview of AWS Migration tools - Assessing Migration Readiness
AWS Cloud Adoption Framework (CAF), Organizational capability evaluation, Technical environment and infrastructure assessment, Governance and compliance readiness, Readiness and planning assessment tools - Migration Planning and Workstreams
Migration workstreams and phases, Identifying stakeholders and teams, Defining scope and timeline, Budgeting and forecasting, Creating a migration roadmap - Understanding AWS Landing Zones
Landing Zone architecture and components, Control Tower overview, Account provisioning and structure, Guardrails and security baselines, Network and logging configurations - Building a Landing Zone
Setting up VPCs and subnets, IAM roles and permissions, Shared services and account baselining, Monitoring and logging setup, Security and compliance implementation - Application Portfolio Discovery and Migration Strategy
Portfolio assessment approaches, Discovery tools and data collection, Application dependency mapping, 7 Rs of migration (Rehost, Replatform, Repurchase, Refactor, Retire, Retain, Relocate), Choosing the right migration path - Designing the Migration
High-level migration architecture, Tool selection and service alignment, Network and security design, Data transfer and encryption planning, Scalability and fault tolerance considerations - Executing Application Migration
Migration process steps, Cutover strategies, Post-migration validation, Downtime minimization, Rollback and contingency planning - Database and Data Migration
AWS Database Migration Service (DMS), Schema conversion and compatibility, Continuous replication vs. snapshot migration, Data validation and integrity, Migrating to Amazon Aurora - Modernizing and Optimizing Workloads
Refactoring applications for cloud-native design, Storage and compute optimization, Using Amazon S3 and ECS, Rightsizing cloud resources, Cost and performance monitoring - Operations, Testing, and Automation
Integration and functional testing, Monitoring with CloudWatch and X-Ray, CI/CD pipelines in AWS, Infrastructure as Code with CloudFormation, Deployment automation with CodePipeline - Best Practices and Final Migration Guidelines
Post-migration validation, Performance tuning and optimization, Security hardening and audit, Documentation and handoff, AWS migration best practices and case studies
Design & Implement Storage Solutions with AWS
- Introduction to AWS Storage
Overview of AWS storage services and use cases, Cloud storage benefits, Cost optimization, Performance considerations
Object, file, block storage overview, storage classes, data lifecycle, performance tiers - Amazon S3 Deep Dive
Designing Object Storage with Amazon S3, S3 storage classes, Cost optimization strategies
S3 Standard, Infrequent Access, One Zone-IA, Glacier, Intelligent-Tiering, Lifecycle policies, Data durability - S3 Access Control and Object Lambda
S3 access management, Security, Object Lambda transformations
IAM policies, Bucket policies, ACLs, S3 Object Lambda, Presigned URLs - Advanced S3 Solutions
Multipart uploads, Batch operations, Cross-region and same-region replication
Upload limits, Parallel uploads, Object versioning, CRR configuration, SRR setup, Replication rules - Implementing Amazon EBS Solutions
Block storage with EBS, Volume design, Performance tuning
EBS volume types (gp3, io2), Snapshots, Encryption, IOPS tuning, Cost comparison - EBS Data Protection Strategies
Data protection, EBS lifecycle automation, Performance management
Lifecycle Manager, Snapshot policies, Crash consistency, Scheduled backups - Amazon EFS Architecture and Integration
File storage solutions with EFS, Mount targets, Performance optimization
Throughput modes, Burst credits, Access points, POSIX compliance, Mounting on EC2 - EFS with Lambda and ECS
Integrating EFS with serverless and container services
EFS with Lambda, ECS task volume configuration, Permissions, Performance benchmarking - Cloud File Storage with Amazon FSx
FSx service options and architecture, Performance tuning
FSx for Windows, FSx for Lustre, FSx for NetApp ONTAP, FSx for OpenZFS, Use cases comparison - Hybrid and Edge Storage Solutions
Storage Gateway, AWS DataSync, Hybrid deployment scenarios
File, Tape, and Volume Gateway, DataSync agents, On-prem to cloud sync, Migration automation - Backup and Disaster Recovery with AWS
AWS Backup service, Centralized backup strategy, Disaster recovery
Backup plans, Cross-region backup, Restore strategies, Point-in-time recovery, Data compliance - Monitoring, Optimization, and Course Wrap-up
Storage monitoring, Cost optimization, Automation tools, Final Q&A
CloudWatch metrics, Budget alerts, Trusted Advisor, AWS Storage Lens, Performance dashboards
Designing & Implementing Databases on AWS
- Introduction to AWS Databases
Overview of managed database services on AWS, Relational vs. Non-relational databases, Scalability and availability considerations, Use cases for different databases, Cost optimization and pricing models - Relational Databases with Amazon RDS
Amazon RDS database engines, Automated backups, Multi-AZ deployments, Read replicas, Parameter groups, Performance tuning, Security and IAM integration - Deep Dive into Amazon Aurora
Aurora architecture and scaling, Aurora Serverless and Global Databases, Replication mechanisms, Storage auto-scaling, Monitoring with CloudWatch, Aurora vs. RDS comparison - Choosing the Right Relational Database
Relational workload assessment, Migration considerations, Licensing and support, Performance analysis, Compatibility checks, Best practices - Amazon DynamoDB Essentials
NoSQL overview, DynamoDB architecture, Partitions and throughput, Tables and items, Global tables, On-demand vs. provisioned capacity, TTL, Streams - Advanced DynamoDB & Amazon Keyspaces
DynamoDB indexing and queries, Query optimization, Caching with DAX, Amazon Keyspaces CQL overview, Migration from Apache Cassandra - Amazon DocumentDB & Amazon QLDB
DocumentDB features and MongoDB compatibility, QLDB vs. Blockchain, Immutable logs, Document and ledger database use cases, Querying historical data - Choosing the Right Non-Relational Database
Data modeling best practices, Access pattern analysis, Cost-based optimization, Serverless options, Non-relational database security - Graph, Time Series & In-Memory Databases
Amazon Neptune for graph data, Amazon Timestream for time series, ElastiCache vs. MemoryDB, Redis/Memcached comparison, Query languages and security - Caching & Performance Optimization
Caching patterns, Latency reduction techniques, High throughput support, TTL management, Session management, Elastic scaling - Data Warehousing with Amazon Redshift
Redshift architecture, Spectrum integration, RA3 nodes and data sharing, Data loading techniques, Query optimization, Compression and distribution styles - Tools, Monitoring, and Final Design
AWS DMS and SCT tools, Backup and restore strategies, Monitoring and alerting with CloudWatch, Infrastructure as Code, Full-stack database architecture design
Implementing Data Lake Solutions on AWS
- Introduction to Data Lakes
What is a Data Lake, Benefits and Use Cases, Differences between Data Lake, Data Warehouse, and Data Lakehouse - Data Ingestion, Cataloging, and Preparation
Ingestion Patterns (Batch, Streaming), Using AWS Glue Crawlers, Data Cataloging Concepts, Metadata Management with AWS Glue, Data Preparation Techniques - Building the Data Lake with AWS Lake Formation
Lake Formation Overview & Architecture, Required IAM Roles and Permissions, Resource Setup: S3 Buckets and Glue Data Catalog, Setting up the Data Lake Environment, Registering S3 as a Data Lake Location, Creating Databases and Tables - Data Processing and Analytics
Querying Data with Amazon Athena, Using Amazon Redshift Spectrum, Integration with QuickSight for Visualization - AWS Lake Formation Additional Configurations and Capabilities
Row-level and Column-level Security, Tag-based Access Control, Cross-account Sharing, Using Blueprints for ETL Workflows, Automating Ingest-Catalog-Transform Pipelines - Modern Data Architecture on AWS
Decoupled Storage and Compute, Data Mesh and Domain-driven Design, Serverless Architectures with Lake Formation - Publishing and Managing Data Products
Sharing Data via AWS Lake Formation, Monitoring and Governance Tools, Creating and Sharing Data Products, Monitoring Access and Audit Logs
Implementing Data Analytics using Amazon Redshift on AWS
- Overview of Data Analytics and the Data Pipeline
data analytics lifecycle, data pipeline components, AWS analytics services overview - Using Amazon Redshift in the Data Analytics Pipeline
Amazon Redshift architecture, use cases, data warehousing concepts, integration in data analytics pipeline - Ingestion and Storage
data ingestion strategies, loading data from Amazon S3, Redshift Spectrum, storage optimization - Processing and Optimizing Data
SQL-based data transformation, Redshift performance tuning, sort keys and distribution styles - Security and Monitoring of Amazon Redshift Clusters
IAM roles, encryption at rest and in transit, logging, monitoring with CloudWatch - Designing Data Warehouse Analytics Solutions
data modeling best practices, workload management, analytics use cases and reference architectures - Developing Modern Data Architectures on AWS
serverless analytics, lake house architecture, integration with ETL tools, scalability and cost optimization - Course Wrap-up
key takeaways, final discussion, Q&A session
Implementing Data Warehousing Solutions on AWS
- Introduction to Data Warehousing on AWS
Overview of data warehousing, benefits of AWS for data warehousing, use cases, comparison with on-prem solutions, key AWS services - Data Warehouse Concepts
Data modeling and architecture, star/snowflake schemas, OLAP vs OLTP, dimensional modeling - Introduction to Amazon Redshift
Core Redshift architecture, nodes and clusters, leader/node types, columnar storage - Redshift Setup and Configuration
Cluster creation and connectivity, parameter groups, VPC settings, user access configuration - Data Loading Essentials
Data ingestion methods, COPY command, data formats (CSV, JSON, Parquet), compression techniques - Advanced Data Loading Techniques
Bulk loading strategies, staging tables, data quality checks, troubleshooting data loads - SQL Query Editor V2 & Notebooks
Query organization, notebook integration, result visualization, running SQL scripts - Backup and Recovery
Snapshots, automated vs manual backups, point-in-time recovery, restore operations - Redshift Performance Tuning I
Query optimization, EXPLAIN plans, distribution styles, sort and dist keys - Redshift Performance Tuning II
Workload management (WLM), short query acceleration, materialized views - Securing Amazon Redshift
IAM roles and policies, VPC configurations, SSL, encryption with AWS KMS - Orchestration in Data Warehousing
AWS Glue, Lambda functions, Step Functions, event-driven data pipelines - Amazon Redshift ML
CREATE MODEL syntax, Redshift-SageMaker integration, training and inference - Data Sharing with Redshift
Cross-cluster data sharing, producer and consumer clusters, use cases and setup - Redshift Spectrum
Querying external S3 data, Spectrum architecture, table partitioning, cost control - Monitoring and Auditing
CloudWatch metrics, audit logging, system table queries, alert configuration - Cost Optimization in Redshift
Reserved vs on-demand instances, concurrency scaling, pause/resume strategies - Redshift Integration with BI Tools
Connecting to QuickSight, Tableau, Looker integration, dashboard creation - Capstone Project Planning
Project scoping, dataset selection, schema design, KPI definition, use case goals - Capstone Project Execution
End-to-end DW build, data ingestion, transformation, security, visualization - Course Review and Assessment
Best practices recap, certification guidance, community resources, learner feedback
