74 KiB
74 KiB
<style>
#mindmap {
display: block;
width: 70vw;
height: 80vh;
}
</style>
Mind Map to outlining essential topics for AWS Cloud Practitioner certification
Below is a Mind Map outlining essential topics for AWS Cloud Practitioner certification. Start your review from the main node, and each sub-node includes a link to a detailed explanation for further information. To learn more about each topic in depth, simply click on the corresponding link within the mind map.
<script src="https://cdn.jsdelivr.net/npm/d3@7.8.5/dist/d3.min.js"></script><script src="https://cdn.jsdelivr.net/npm/markmap-view@0.15.4/dist/browser/index.js"></script><script src="https://cdn.jsdelivr.net/npm/markmap-toolbar@0.15.4/dist/index.js"></script><script>(()=>{setTimeout(()=>{const{markmap:M,mm:ge}=window,me=new M.Toolbar;me.attach(ge);const fe=me.render();fe.setAttribute("style","position:absolute;bottom:20px;right:20px"),document.body.append(fe)})})()</script><script>((F,I,R,H)=>{const X=F();window.mm=X.Markmap.create("svg#mindmap",(I||X.deriveOptions)(H),R)})(()=>window.markmap,null,{"type":"list_item","depth":0,"payload":{"lines":[0,1]},"content":"AWS Cloud Practitioner Study Notes","children":[{"type":"list_item","depth":1,"payload":{"lines":[1,2]},"content":"Study Guide","children":[]},{"type":"list_item","depth":1,"payload":{"lines":[2,3]},"content":"Cloud Computing","children":[{"type":"list_item","depth":2,"payload":{"lines":[3,4]},"content":"What is Cloud Computing?","children":[{"type":"list_item","depth":3,"payload":{"lines":[4,5]},"content":"The Deployment Models of the Cloud","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[5,6]},"content":"The Five Characteristics of Cloud Computing","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[6,7]},"content":"Six Advantages of Cloud Computing","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[7,8]},"content":"Problems solved by the Cloud","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[8,9]},"content":"Types of Cloud Computing","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[9,10]},"content":"Example of Cloud Computing Types","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[10,11]},"content":"Pricing of the Cloud – Quick Overview","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[11,12]},"content":"AWS Cloud Use Cases","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[12,13]},"content":"AWS Global Infrastructure","children":[{"type":"list_item","depth":3,"payload":{"lines":[13,14]},"content":"AWS Regions","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[14,15]},"content":"How to choose an AWS Region?","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[15,16]},"content":"AWS Availability Zones","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[16,17]},"content":"AWS Points of Presence (Edge Locations)","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[17,18]},"content":"Tour of the AWS Console","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[18,19]},"content":"Shared Responsibility Model","children":[]}]},{"type":"list_item","depth":1,"payload":{"lines":[19,20]},"content":"IAM: Identity Access & Management","children":[{"type":"list_item","depth":2,"payload":{"lines":[20,21]},"content":"What Is IAM?","children":[{"type":"list_item","depth":3,"payload":{"lines":[21,22]},"content":"IAM: Users & Groups","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[22,23]},"content":"IAM: Permissions","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[23,24]},"content":"IAM Policies Inheritance","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[24,25]},"content":"IAM Policies Structure","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[25,26]},"content":"IAM – Password Policy","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[26,27]},"content":"IAM Roles for Services","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[27,28]},"content":"IAM Security Tools","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[28,29]},"content":"IAM Guidelines & Best Practices","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[29,30]},"content":"Shared Responsibility Model for IAM","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[30,31]},"content":"Multi Factor Authentication - MFA","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[31,32]},"content":"MFA devices options in AWS","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[32,33]},"content":"How can users access AWS ?","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[33,34]},"content":"What’s the AWS CLI?","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[34,35]},"content":"What’s the AWS SDK?","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[35,36]},"content":"IAM Section – Summary","children":[]}]},{"type":"list_item","depth":1,"payload":{"lines":[36,37]},"content":"EC2: Virtual Machines","children":[{"type":"list_item","depth":2,"payload":{"lines":[37,38]},"content":"What is Amazon EC2?","children":[{"type":"list_item","depth":3,"payload":{"lines":[38,39]},"content":"EC2 sizing & configuration options","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[39,40]},"content":"EC2 User Data","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[40,41]},"content":"EC2 Instance Types - Overview","children":[{"type":"list_item","depth":4,"payload":{"lines":[41,42]},"content":"General Purpose","children":[]},{"type":"list_item","depth":4,"payload":{"lines":[42,43]},"content":"Compute Optimized","children":[]},{"type":"list_item","depth":4,"payload":{"lines":[43,44]},"content":"Memory Optimized","children":[]},{"type":"list_item","depth":4,"payload":{"lines":[44,45]},"content":"Storage Optimized","children":[]}]},{"type":"list_item","depth":3,"payload":{"lines":[45,46]},"content":"EC2 Instance Types: example","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[46,47]},"content":"Introduction to Security Groups","children":[{"type":"list_item","depth":3,"payload":{"lines":[47,48]},"content":"Deeper Dive","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[48,49]},"content":"Security Groups Diagram","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[49,50]},"content":"Good to know","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[50,51]},"content":"Classic Ports to know","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[51,52]},"content":"EC2 Instance Launch Types","children":[{"type":"list_item","depth":3,"payload":{"lines":[52,53]},"content":"On Demand Instance","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[53,54]},"content":"Reserved Instances","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[54,55]},"content":"Savings Plans","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[55,56]},"content":"Spot Instances","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[56,57]},"content":"Dedicated Hosts","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[57,58]},"content":"Dedicated Instances","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[58,59]},"content":"Capacity Reservations","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[59,60]},"content":"Which purchasing option is right for me?","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[60,61]},"content":"Price Comparison Example – m4.large – us-east-1","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[61,62]},"content":"Shared Responsibility Model for EC2","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[62,63]},"content":"EC2 Section – Summary","children":[]}]},{"type":"list_item","depth":1,"payload":{"lines":[63,64]},"content":"EC2 Instance Storage","children":[{"type":"list_item","depth":2,"payload":{"lines":[64,65]},"content":"EBS Volumes","children":[{"type":"list_item","depth":3,"payload":{"lines":[65,66]},"content":"What’s an EBS Volume?","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[66,67]},"content":"EBS Volume","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[67,68]},"content":"EBS – Delete on Termination attribute","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[68,69]},"content":"EBS Snapshots","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[69,70]},"content":"EBS Snapshots Features","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[70,71]},"content":"EFS: Elastic File System","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[71,72]},"content":"EFS Infrequent Access (EFS-IA)","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[72,73]},"content":"Amazon FSx – Overview","children":[{"type":"list_item","depth":3,"payload":{"lines":[73,74]},"content":"Amazon FSx for Windows File Server","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[74,75]},"content":"Amazon FSx for Lustre","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[75,76]},"content":"EC2 Instance Store","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[76,77]},"content":"Shared Responsibility Model for EC2 Storage","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[77,78]},"content":"AMI Overview","children":[{"type":"list_item","depth":3,"payload":{"lines":[78,79]},"content":"AMI Process (from an EC2 instance)","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[79,80]},"content":"EC2 Image Builder","children":[]}]},{"type":"list_item","depth":1,"payload":{"lines":[80,81]},"content":"Elastic Load Balancing & Auto Scaling Groups","children":[{"type":"list_item","depth":2,"payload":{"lines":[81,82]},"content":"Scalability & High Availability","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[82,83]},"content":"Vertical Scalability","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[83,84]},"content":"Horizontal Scalability","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[84,85]},"content":"High Availability","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[85,86]},"content":"High Availability & Scalability For EC2","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[86,87]},"content":"Scalability vs Elasticity (vs Agility)","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[87,88]},"content":"What is load balancing?","children":[{"type":"list_item","depth":3,"payload":{"lines":[88,89]},"content":"Why use a load balancer?","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[89,90]},"content":"Why use an Elastic Load Balancer?","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[90,91]},"content":"What’s an Auto Scaling Group?","children":[{"type":"list_item","depth":3,"payload":{"lines":[91,92]},"content":"Auto Scaling Groups Scaling Strategies","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[92,93]},"content":"ELB & ASG Summary","children":[]}]},{"type":"list_item","depth":1,"payload":{"lines":[93,94]},"content":"Amazon S3","children":[{"type":"list_item","depth":2,"payload":{"lines":[94,95]},"content":"S3 Use cases","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[95,96]},"content":"Amazon S3 Overview - Buckets","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[96,97]},"content":"Amazon S3 Overview - Objects","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[97,98]},"content":"S3 Security","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[98,99]},"content":"S3 Bucket Policies","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[99,100]},"content":"Bucket settings for Block Public Access","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[100,101]},"content":"S3 Websites","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[101,102]},"content":"S3 - Versioning","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[102,103]},"content":"S3 Access Logs","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[103,104]},"content":"S3 Replication (CRR & SRR)","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[104,105]},"content":"S3 Storage Classes","children":[{"type":"list_item","depth":3,"payload":{"lines":[105,106]},"content":"S3 Durability and Availability","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[106,107]},"content":"S3 Standard General Purpose","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[107,108]},"content":"S3 Storage Classes - Infrequent Access","children":[{"type":"list_item","depth":4,"payload":{"lines":[108,109]},"content":"S3 Standard Infrequent Access (S3 Standard-IA)","children":[]},{"type":"list_item","depth":4,"payload":{"lines":[109,110]},"content":"S3 One Zone Infrequent Access (S3 One Zone-IA)","children":[]}]},{"type":"list_item","depth":3,"payload":{"lines":[110,111]},"content":"Amazon S3 Glacier Storage Classes","children":[{"type":"list_item","depth":4,"payload":{"lines":[111,112]},"content":"Amazon S3 Glacier Instant Retrieval","children":[]},{"type":"list_item","depth":4,"payload":{"lines":[112,113]},"content":"Amazon S3 Glacier Flexible Retrieval (formerly Amazon S3 Glacier)","children":[]},{"type":"list_item","depth":4,"payload":{"lines":[113,114]},"content":"Amazon S3 Glacier Deep Archive - for long term storage","children":[]}]},{"type":"list_item","depth":3,"payload":{"lines":[114,115]},"content":"S3 Intelligent-Tiering","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[115,116]},"content":"S3 Object Lock & Glacier Vault Lock","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[116,117]},"content":"Shared Responsibility Model for S3","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[117,118]},"content":"AWS Snow Family","children":[{"type":"list_item","depth":3,"payload":{"lines":[118,119]},"content":"Data Migrations with AWS Snow Family","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[119,120]},"content":"Time to Transfer","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[120,121]},"content":"Snowball Edge (for data transfers)","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[121,122]},"content":"AWS Snowcone","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[122,123]},"content":"AWS Snowmobile","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[123,124]},"content":"Snow Family - Usage Process","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[124,125]},"content":"What is Edge Computing?","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[125,126]},"content":"Snow Family - Edge Computing","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[126,127]},"content":"AWS OpsHub","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[127,128]},"content":"Hybrid Cloud for Storage","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[128,129]},"content":"AWS Storage Gateway","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[129,130]},"content":"Amazon S3 - Summary","children":[]}]},{"type":"list_item","depth":1,"payload":{"lines":[130,131]},"content":"Databases & Analytics","children":[{"type":"list_item","depth":2,"payload":{"lines":[131,132]},"content":"Databases Intro","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[132,133]},"content":"Relational Databases","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[133,134]},"content":"NoSQL Databases","children":[{"type":"list_item","depth":3,"payload":{"lines":[134,135]},"content":"NoSQL data example: JSON","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[135,136]},"content":"Databases & Shared Responsibility on AWS","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[136,137]},"content":"AWS RDS Overview","children":[{"type":"list_item","depth":3,"payload":{"lines":[137,138]},"content":"Advantage over using RDS versus deploying DB on EC2","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[138,139]},"content":"RDS Deployments: Read Replicas, Multi-AZ","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[139,140]},"content":"RDS Deployments: Multi-Region","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[140,141]},"content":"Amazon Aurora","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[141,142]},"content":"Amazon ElastiCache Overview","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[142,143]},"content":"DynamoDB","children":[{"type":"list_item","depth":3,"payload":{"lines":[143,144]},"content":"DynamoDB Accelerator - DAX","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[144,145]},"content":"DynamoDB - Global Tables","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[145,146]},"content":"Redshift Overview","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[146,147]},"content":"Amazon EMR","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[147,148]},"content":"Amazon Athena","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[148,149]},"content":"Amazon QuickSight","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[149,150]},"content":"DocumentDB","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[150,151]},"content":"Amazon Neptune","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[151,152]},"content":"Amazon QLDB","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[152,153]},"content":"Amazon Managed Blockchain","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[153,154]},"content":"AWS Glue","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[154,155]},"content":"DMS - Database Migration Service","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[155,156]},"content":"Databases & Analytics Summary","children":[]}]},{"type":"list_item","depth":1,"payload":{"lines":[156,157]},"content":"Other Compute","children":[{"type":"list_item","depth":2,"payload":{"lines":[157,158]},"content":"What is Docker?","children":[{"type":"list_item","depth":3,"payload":{"lines":[158,159]},"content":"Where Docker images are stored?","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[159,160]},"content":"Docker versus Virtual Machines","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[160,161]},"content":"ECS","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[161,162]},"content":"Fargate","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[162,163]},"content":"ECR","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[163,164]},"content":"What’s serverless?","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[164,165]},"content":"Why AWS Lambda ?","children":[{"type":"list_item","depth":3,"payload":{"lines":[165,166]},"content":"Benefits of AWS Lambda","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[166,167]},"content":"AWS Lambda language support","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[167,168]},"content":"AWS Lambda Pricing: example","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[168,169]},"content":"Amazon API Gateway","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[169,170]},"content":"AWS Batch","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[170,171]},"content":"Batch vs Lambda","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[171,172]},"content":"Amazon Lightsail","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[172,173]},"content":"Lambda Summary","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[173,174]},"content":"Other Compute Summary","children":[]}]},{"type":"list_item","depth":1,"payload":{"lines":[174,175]},"content":"Deploying and Managing Infrastructure at Scale","children":[{"type":"list_item","depth":2,"payload":{"lines":[175,176]},"content":"What is CloudFormation?","children":[{"type":"list_item","depth":3,"payload":{"lines":[176,177]},"content":"Benefits of AWS CloudFormation","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[177,178]},"content":"CloudFormation Stack Designer","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[178,179]},"content":"AWS Cloud Development Kit (CDK)","children":[{"type":"list_item","depth":3,"payload":{"lines":[179,180]},"content":"Example of AWS CDK (Python)","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[180,181]},"content":"Developer problems on AWS","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[181,182]},"content":"Typical architecture: Web App 3-tier","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[182,183]},"content":"AWS Elastic Beanstalk Overview","children":[{"type":"list_item","depth":3,"payload":{"lines":[183,184]},"content":"Elastic Beanstalk vs CloudFormation","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[184,185]},"content":"Elastic Beanstalk - Health Monitoring","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[185,186]},"content":"AWS CodeDeploy","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[186,187]},"content":"AWS CodeCommit","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[187,188]},"content":"AWS CodeBuild","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[188,189]},"content":"AWS CodePipeline","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[189,190]},"content":"AWS CodeArtifact","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[190,191]},"content":"AWS CodeStar","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[191,192]},"content":"AWS Cloud9","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[192,193]},"content":"AWS Systems Manager (SSM)","children":[{"type":"list_item","depth":3,"payload":{"lines":[193,194]},"content":"How Systems Manager works","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[194,195]},"content":"Systems Manager - SSM Session Manager","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[195,196]},"content":"AWS OpsWorks","children":[{"type":"list_item","depth":3,"payload":{"lines":[196,197]},"content":"OpsWorks Architecture","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[197,198]},"content":"Deployment - Summary","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[198,199]},"content":"Developer Services - Summary","children":[]}]},{"type":"list_item","depth":1,"payload":{"lines":[199,200]},"content":"Global Infrastructure","children":[{"type":"list_item","depth":2,"payload":{"lines":[200,201]},"content":"Why make a global application?","children":[{"type":"list_item","depth":3,"payload":{"lines":[201,202]},"content":"Global AWS Infrastructure","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[202,203]},"content":"Global Applications in AWS","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[203,204]},"content":"Amazon Route 53 Overview","children":[{"type":"list_item","depth":3,"payload":{"lines":[204,205]},"content":"Route 53 - Diagram for A Record","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[205,206]},"content":"Route 53 Routing Policies","children":[{"type":"list_item","depth":3,"payload":{"lines":[206,207]},"content":"simple routing policy","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[207,208]},"content":"weighted routing policy","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[208,209]},"content":"latency routing policy","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[209,210]},"content":"failover routing policy","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[210,211]},"content":"AWS CloudFront","children":[{"type":"list_item","depth":3,"payload":{"lines":[211,212]},"content":"CloudFront - Origins","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[212,213]},"content":"CloudFront vs S3 Cross Region Replication","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[213,214]},"content":"S3 Transfer Acceleration","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[214,215]},"content":"AWS Global Accelerator","children":[{"type":"list_item","depth":3,"payload":{"lines":[215,216]},"content":"AWS Global Accelerator vs CloudFront","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[216,217]},"content":"AWS Outposts","children":[{"type":"list_item","depth":3,"payload":{"lines":[217,218]},"content":"AWS Outposts Benefits","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[218,219]},"content":"AWS WaveLength","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[219,220]},"content":"AWS Local Zones","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[220,221]},"content":"Global Applications - Summary","children":[]}]},{"type":"list_item","depth":1,"payload":{"lines":[221,222]},"content":"Cloud Integration","children":[{"type":"list_item","depth":2,"payload":{"lines":[222,223]},"content":"Section Introduction","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[223,224]},"content":"Amazon SQS - Simple Queue Service","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[224,225]},"content":"Amazon Kinesis","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[225,226]},"content":"Amazon SNS","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[226,227]},"content":"Amazon MQ","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[227,228]},"content":"Integration - Summary","children":[]}]},{"type":"list_item","depth":1,"payload":{"lines":[228,229]},"content":"Cloud Monitoring","children":[{"type":"list_item","depth":2,"payload":{"lines":[229,230]},"content":"Amazon CloudWatch","children":[{"type":"list_item","depth":3,"payload":{"lines":[230,231]},"content":"Important Metrics","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[231,232]},"content":"Amazon CloudWatch Alarms","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[232,233]},"content":"Amazon CloudWatch Logs","children":[{"type":"list_item","depth":4,"payload":{"lines":[233,234]},"content":"CloudWatch Logs for EC2","children":[]}]},{"type":"list_item","depth":3,"payload":{"lines":[234,235]},"content":"Amazon CloudWatch Events","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[235,236]},"content":"Amazon EventBridge","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[236,237]},"content":"AWS CloudTrail","children":[{"type":"list_item","depth":3,"payload":{"lines":[237,238]},"content":"CloudTrail Events","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[238,239]},"content":"CloudTrail Insights Events","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[239,240]},"content":"CloudTrail Events Retention","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[240,241]},"content":"AWS X-Ray","children":[{"type":"list_item","depth":3,"payload":{"lines":[241,242]},"content":"AWS X-Ray advantages","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[242,243]},"content":"Amazon CodeGuru","children":[{"type":"list_item","depth":3,"payload":{"lines":[243,244]},"content":"Amazon CodeGuru Reviewer","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[244,245]},"content":"Amazon CodeGuru Profiler","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[245,246]},"content":"AWS Status - Service Health Dashboard","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[246,247]},"content":"AWS Personal Health Dashboard","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[247,248]},"content":"Cloud Monitoring Summary","children":[]}]},{"type":"list_item","depth":1,"payload":{"lines":[248,249]},"content":"VPC","children":[{"type":"list_item","depth":2,"payload":{"lines":[249,250]},"content":"VPC & Subnets Primer","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[250,251]},"content":"Internet Gateway & NAT Gateways","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[251,252]},"content":"Network ACL & Security Groups","children":[{"type":"list_item","depth":3,"payload":{"lines":[252,253]},"content":"Network ACLs vs Security Groups","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[253,254]},"content":"VPC Flow Logs","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[254,255]},"content":"VPC Peering","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[255,256]},"content":"VPC Endpoints","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[256,257]},"content":"Site to Site VPN & Direct Connect","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[257,258]},"content":"Transit Gateway","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[258,259]},"content":"VPC Summary","children":[]}]},{"type":"list_item","depth":1,"payload":{"lines":[259,260]},"content":"Security & Compliance","children":[{"type":"list_item","depth":2,"payload":{"lines":[260,261]},"content":"AWS Shared Responsibility Model","children":[{"type":"list_item","depth":3,"payload":{"lines":[261,262]},"content":"Example, for RDS","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[262,263]},"content":"Example, for S3","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[263,264]},"content":"DDOS Protection on AWS","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[264,265]},"content":"AWS Shield","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[265,266]},"content":"AWS WAF - Web Application Firewall","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[266,267]},"content":"Penetration Testing on AWS Cloud","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[267,268]},"content":"Data at rest vs. Data in transit","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[268,269]},"content":"AWS KMS (Key Management Service)","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[269,270]},"content":"CloudHSM","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[270,271]},"content":"Types of Customer Master Keys: CMK","children":[{"type":"list_item","depth":3,"payload":{"lines":[271,272]},"content":"Customer Managed CMK","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[272,273]},"content":"AWS managed CMK","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[273,274]},"content":"AWS owned CMK","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[274,275]},"content":"CloudHSM Keys (custom keystore)","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[275,276]},"content":"AWS Certificate Manager (ACM)","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[276,277]},"content":"AWS Secrets Manager","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[277,278]},"content":"AWS Artifact (not really a service)","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[278,279]},"content":"Amazon GuardDuty","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[279,280]},"content":"Amazon Inspector","children":[{"type":"list_item","depth":3,"payload":{"lines":[280,281]},"content":"What does AWS Inspector evaluate?","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[281,282]},"content":"AWS Config","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[282,283]},"content":"Amazon Macie","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[283,284]},"content":"AWS Security Hub","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[284,285]},"content":"Amazon Detective","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[285,286]},"content":"AWS Abuse","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[286,287]},"content":"Root user privileges","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[287,288]},"content":"Summary","children":[]}]},{"type":"list_item","depth":1,"payload":{"lines":[288,289]},"content":"Machine Learning","children":[{"type":"list_item","depth":2,"payload":{"lines":[289,290]},"content":"Amazon Rekognition","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[290,291]},"content":"Amazon Transcribe","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[291,292]},"content":"Amazon Polly","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[292,293]},"content":"Amazon Translate","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[293,294]},"content":"Amazon Lex & Connect","children":[{"type":"list_item","depth":3,"payload":{"lines":[294,295]},"content":"Amazon Lex: (same technology that powers Alexa)","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[295,296]},"content":"Amazon Connect","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[296,297]},"content":"Amazon Comprehend","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[297,298]},"content":"Amazon SageMaker","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[298,299]},"content":"Amazon Forecast","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[299,300]},"content":"Amazon Kendra","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[300,301]},"content":"Amazon Personalize","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[301,302]},"content":"Amazon Textract","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[302,303]},"content":"Summary","children":[]}]},{"type":"list_item","depth":1,"payload":{"lines":[303,304]},"content":"Account Management, Billing & Support","children":[{"type":"list_item","depth":2,"payload":{"lines":[304,305]},"content":"AWS Organizations","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[305,306]},"content":"Multi Account Strategies","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[306,307]},"content":"Service Control Policies (SCP)","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[307,308]},"content":"AWS Organization - Consolidated Billing","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[308,309]},"content":"AWS Control Tower","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[309,310]},"content":"Pricing Models in AWS","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[310,311]},"content":"Compute Pricing","children":[{"type":"list_item","depth":3,"payload":{"lines":[311,312]},"content":"EC2","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[312,313]},"content":"Lambda & ECS","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[313,314]},"content":"Storage Pricing","children":[{"type":"list_item","depth":3,"payload":{"lines":[314,315]},"content":"S3","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[315,316]},"content":"EBS","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[316,317]},"content":"Database Pricing - RDS","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[317,318]},"content":"Content Delivery - CloudFront","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[318,319]},"content":"Networking Costs in AWS per GB - Simplified","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[319,320]},"content":"Savings Plan","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[320,321]},"content":"AWS Compute Optimizer","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[321,322]},"content":"Billing and Costing Tools","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[322,323]},"content":"AWS Pricing Calculator","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[323,324]},"content":"Cost Allocation Tags","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[324,325]},"content":"Tagging and Resource Groups","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[325,326]},"content":"Cost and Usage Reports","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[326,327]},"content":"Cost Explorer","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[327,328]},"content":"Billing Alarms in CloudWatch","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[328,329]},"content":"AWS Budgets","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[329,330]},"content":"Trusted Advisor","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[330,331]},"content":"Trusted Advisor - Support Plans","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[331,332]},"content":"AWS Basic Support Plan","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[332,333]},"content":"AWS Developer Support Plan","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[333,334]},"content":"AWS Business Support Plan (24/7)","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[334,335]},"content":"AWS Enterprise On-Ramp Support Plan (24/7)","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[335,336]},"content":"AWS Enterprise Support Plan (24/7)","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[336,337]},"content":"Account Best Practices - Summary","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[337,338]},"content":"Billing and Costing Tools - Summary","children":[]}]},{"type":"list_item","depth":1,"payload":{"lines":[338,339]},"content":"Advanced Identity","children":[{"type":"list_item","depth":2,"payload":{"lines":[339,340]},"content":"AWS STS (SecurityToken Service)","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[340,341]},"content":"Amazon Cognito (simplified)","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[341,342]},"content":"What is Microsoft Active Directory (AD)?","children":[{"type":"list_item","depth":3,"payload":{"lines":[342,343]},"content":"AWS Directory Services","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[343,344]},"content":"AWS Single Sign-On (SSO)","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[344,345]},"content":"Summary","children":[]}]},{"type":"list_item","depth":1,"payload":{"lines":[345,346]},"content":"Other AWS Services","children":[{"type":"list_item","depth":2,"payload":{"lines":[346,347]},"content":"Amazon WorkSpaces","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[347,348]},"content":"Amazon AppStream 2.0","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[348,349]},"content":"Amazon Sumerian","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[349,350]},"content":"AWS IoT Core","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[350,351]},"content":"Amazon Elastic Transcoder","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[351,352]},"content":"AWS Device Farm","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[352,353]},"content":"AWS Backup","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[353,354]},"content":"AWS Elastic Disaster Recovery (DRS)","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[354,355]},"content":"AWS DataSync","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[355,356]},"content":"AWS Fault Injection Simulator (FIS)","children":[]}]},{"type":"list_item","depth":1,"payload":{"lines":[356,357]},"content":"AWS Architecting & Ecosystem","children":[{"type":"list_item","depth":2,"payload":{"lines":[357,358]},"content":"Well Architected Framework General Guiding Principles","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[358,359]},"content":"AWS Cloud Best Practices - Design Principles","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[359,360]},"content":"Well Architected Framework 6 Pillars","children":[{"type":"list_item","depth":3,"payload":{"lines":[360,361]},"content":"1. Operational Excellence","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[361,362]},"content":"2. Security","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[362,363]},"content":"3. Reliability","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[363,364]},"content":"4. Performance Efficiency","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[364,365]},"content":"5. Cost Optimization","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[365,366]},"content":"6. Sustainability","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[366,367]},"content":"AWS Well-Architected Tool","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[367,368]},"content":"AWS Right Sizing","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[368,369]},"content":"AWS Ecosystem - Free resources","children":[{"type":"list_item","depth":3,"payload":{"lines":[369,370]},"content":"AWS Ecosystem - AWS Support","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[370,371]},"content":"AWS Marketplace","children":[]}]}]},{"colorFreezeLevel":2})</script>