AWS Training Program
Unlock the Power of AWS
AWS DevOps Training Program Overview
Our AWS training program is a comprehensive six-month course designed to equip IT career aspirants with the skills needed for four key roles within the cloud space: Solutions Architect, Cloud Engineer, DevOps Engineer, and Security Architect/Engineer. Whether you have little or no prior IT experience, this program will guide you from the basics of using your laptop to becoming a highly skilled Cloud professional.
In addition to technical training, we offer interview preparation and resume-building support, ensuring you can showcase the skills acquired during the program. This training also prepares you for the following certification exams:
Certification Preparation
By the end of the course, you will be fully prepared to sit for the following AWS certification exams:
- AWS Solutions Architect Associate
- AWS Solutions Architect Professional
- AWS DevOps Engineer
Our all-inclusive training is available at a discounted rate of $1000, with flexible payment options. You can start with a $400 deposit and pay the remaining balance in monthly installments of $200.
For a detailed curriculum and schedule, please refer to our latest technology stack.
Course Prerequisites
What You’ll Need
- Laptop
- Notebook/Desktop
- Passion
Curriculum
AWS DevOps Training Program
Core AWS Services and Fundamentals
Compute
- Introduction to AWS Compute Services
- Amazon Machine Images (AMIs)
- Amazon EC2 Families
- Amazon EC2 Pricing Options
- Amazon EC2 Auto Scaling
- Elastic Load Balancing (ELB)
- AWS EC2 Lifecycle Manager
- Global Infrastructure and Reliability
Storage
- Benefits of Using AWS Storage
- AWS Storage Advantages
- Challenges of Cloud Storage
- Optimizing Storage Costs
- Comparing On-Premises vs. Cloud Storage
- AWS Cloud Data Storage Solutions
- Hybrid Cloud Storage Options
- Types of AWS Storage Services:
- Block Storage (AWS Block Storage Services)
- File Storage (AWS File Storage Services)
- Object Storage (AWS Object Storage Services)
- Hybrid Storage (AWS Storage Gateway)
- Choosing an AWS Storage Service
- Data Storage Considerations
- Amazon Backup Services
- AWS Data Transfer Options:
- Overview of AWS Migration and Data Transfer Services
- Data Transfer from On-Premises to AWS Cloud
- Connection Options: Internet, AWS VPN, AWS Direct Connect
- Automating Data Transfers using AWS CLI and SDKs
Networking
- Introduction to AWS Networking
- Deploying a Basic VPC with One Subnet and Internet Gateway
- VPC Design and Components Overview
- Deployment via AWS Management Console or AWS CLI
- Securing VPCs:
- VPC Access Management with AWS IAM
- Network ACLs vs. Security Groups
- VPC Security Best Practices
- High Availability VPC Setup:
- Adding a Second Availability Zone for High Availability
- Configuring an Application Load Balancer for Traffic Distribution
- Production-Ready VPC (Three-Tier Architecture):
- Best Practices: Limiting Resource Exposure
- Three-Tier VPC Architecture Design
- When to Use a Single-Tier vs. Multi-Tier VPC
- Hands-On Lab: Build a Three-Tier VPC
- VPC Strategy:
- Corporate Data Center Connectivity with Amazon VPC
- VPNs using IPSec
- AWS Direct Connect and Direct Connect Gateway
- AWS PrivateLink for Secure Connections
- Elastic Network Interfaces (ENI)
- Benefits of Hybrid Deployments
Databases
- Introduction to Databases on AWS
- AWS Relational Database Service (RDS)
- Backup and Monitoring for AWS Databases
- Security and Compliance for Databases
Security
- Introduction to AWS Security
- Security Overview: On-Premises vs. AWS Cloud
- Security in the AWS Cloud:
- AWS Well-Architected Framework
- Identity and Access Management (IAM):
- Authentication vs. Authorization
- AWS IAM for Access Management
- Amazon Cognito for Mobile Authentication
- AWS Directory Service for User Federation
- Detective Controls:
- Monitoring Overview
- Amazon GuardDuty for Threat Detection
- AWS Security Hub for Prioritizing Security Findings
- Amazon Macie for Data Monitoring
- Infrastructure Protection:
- Securing Compute Resources
- AWS WAF for Traffic Filtering
- AWS Shield for DDoS Protection
- Data Protection:
- Encryption on AWS
- AWS Key Management Service (KMS) for Key Management
- AWS Certificate Manager (ACM) for Securing Communications
- AWS Secrets Manager for Managing Credentials
- Incident Response:
- Rethinking Incident Response Strategies
- Using AWS Config for Responding to Incidents
Cloud Orchestration and Automation Tools
AWS CloudFormation
- Introduction to CloudFormation
- Parameters and Intrinsic Functions Overview
- Bootstrapping with User Data and
cfn-init
- CloudFormation Outputs and Cross-Stack Access
- CloudFormation Conditions
- Updating Stacks using Change Sets
- Layering with Nested Stacks
- Handling Dependencies:
DependsOn
- WaitConditions and WaitConditionHandles
- Using CreationPolicy for Stack Creation
- Stack Policies for Protection
- Custom Resource Workflow
- Working with StackSets
- CloudFormation Helper Scripts (
cfn-init
,cfn-hup
,cfn-signal
, etc.)
AWS Lambda
- Introduction to AWS Lambda
- Automating Administrative Tasks at Scale with AWS Systems Manager
- Why Automate?
- Collecting Metrics for Visibility
- Automating System Healing and Ensuring Compliance
- Storing Secrets and Configuration Data Securely
- Managing Configuration Drift
- Interactive Access with Session Manager
- Distributing Software Packages
- Centralizing Operational Insights
AWS Elastic Beanstalk
- Environment Setup
- Version Management
- Customization and Configuration
AWS OpsWorks
- Introduction to AWS OpsWorks
- OpsWorks Stack & Chef Integration
- Chef Recipes for Automation
Architecting Serverless Solutions
- Event-Driven Architectures Overview
- Serverless Mindset: Thinking Serverless
- Patterns for Event Submission and Data Processing
- Managing Failures in Event-Driven Architectures
- Lab: Building Event-Driven Serverless Applications
- Serverless Application Architectures
- Migrating to Serverless Architectures
- Choosing Compute Services and Data Stores
- Application Architecture Patterns for Serverless
- Scaling Serverless Architectures
- Lab Demo: AWS Lambda Power Tuning
- Scaling Considerations: Databases, Orchestration, and Streaming
- Testing for Peak Load
- Securing and Monitoring Serverless Applications
- AWS X-Ray Demo
- Lab: Troubleshooting Serverless Applications
- Serverless Deployment Strategies
- Sharing Configuration Data
- Automating the Deployment Pipeline
- API Gateway for Serverless Applications
- AWS Lambda Security & Defense in Depth
Ansible
- Introduction to Ansible
- Installing Ansible
- Working with Ansible Inventory
- Understanding YAML in Ansible
- Ansible Playbooks and Modules
- Variables, Conditionals, and Loops
- Working with Ansible Roles
Docker, ECS, and EKS
- Introduction to Microservices and Application Modernization
- Container Concepts and Constructs
- Container Benefits and Use Cases
- Container Services on AWS
- End-to-End Container Workloads on AWS
- Scaling Challenges for Microservices in Enterprises
- Key Terminology: Pod, Service, Deployment, Cluster
- Configuring EKS for Kubernetes Management
- Differentiating Between AWS Fargate and EKS Managed Node Groups
- Scheduling Options in EKS
- Kubernetes Pod Communication and Host Interaction in EKS
- Accessing Kubernetes Clusters for Monitoring and Management
- Security Considerations in EKS
- Managing Upgrades in EKS
Continuous Integration, Delivery, and Deployment (CI/CD)
- Best Practices for Docker Images
- Using AWS CodeBuild for CI
- Best Practices for Delivery and Deployment Pipelines
- Automating Deployments with AWS CodeDeploy and CodePipeline
Cloud Governance, Compliance, and Best Practices
Security Governance at Scale
Governance at Scale
- Understanding the challenges customers face during their cloud journeys
- Key focal points for governance at scale
- Addressing security governance challenges
AWS Control Tower Setup
- Lab 0: AWS Control Tower Setup Instructions
- Setting up a landing zone
- Exploring the AWS Cost Explorer dashboard
Governance Automation
- Multi-account strategies, architecture, and guidance
- Balancing agility with governance at scale
- Governance with AWS Control Tower for both new and existing customers
Lab 1: AWS Control Tower Basic Tasks
- Creating an organizational unit (OU) and enabling a guardrail
- Enrolling new AWS accounts using Account Factory
- Enrolling existing accounts
Preventive Controls
- Addressing enterprise environment challenges for developers
- Using AWS Service Catalog for resource creation
- Workflows for provisioning accounts
- Implementing preventive cost and security governance
- Enabling self-service with IT service management (ITSM) tools
Lab 2: AWS Service Catalog Portfolios
- Sharing an administrator portfolio across all accounts in an organization
- Sharing an AWS Service Catalog portfolio from the management account
- Granting catalog access permissions to AWS Single Sign-On (SSO) users
Detective Controls
- Governance operations at scale
- Resource monitoring and configuration auditing rules
- Gaining operational insights and performing remediation
AWS Control Tower Customizations
- Setting up Customizations for Control Tower (CfCT) solution
- Deploying custom guardrails and roles
Lab 4: AWS Control Tower Customization and Decommission Instructions
- Decommissioning resources and cleaning up accounts
Bringing It All Together
- Using engagement frameworks and evaluating requirements
- Case study: Governance at scale in action
Cloud Security, Identity Management, and Compliance
Security, Identity, and Compliance
Introduction
- Overview of security, identity, and compliance on AWS
- Comparing security in On-Premises environments vs. AWS Cloud
- Security in the AWS Cloud: How AWS implements security at scale
- Aligning with the AWS Well-Architected Framework for best practices
Identity and Access Management (IAM)
- Understanding Authentication vs. Authorization
- AWS Identity and Access Management (IAM) for access control
- Amazon Cognito for secure mobile authentication
- AWS Directory Service for federating users and simplifying identity management
Detective Controls
- Monitoring Overview: Setting up effective monitoring systems
- Amazon GuardDuty for threat detection and alerting
- AWS Security Hub for aggregating and prioritizing security findings
- Amazon Macie for monitoring data and detecting sensitive information
Infrastructure Protection
- Securing compute resources within the cloud
- AWS Web Application Firewall (WAF) for filtering traffic
- AWS Shield for protection against Distributed Denial of Service (DDoS) attacks
Data Protection
- Encryption on AWS: Securing data in transit and at rest
- AWS Key Management Service (KMS) for managing encryption keys
- AWS Certificate Manager (ACM) for securing communications with SSL/TLS certificates
- AWS Secrets Manager for securely managing and rotating credentials
Incident Response
- Rethinking Incident Response: Approaches to managing security incidents in the cloud
- Using AWS Config for tracking changes and responding to security incidents
AWS Migration Strategies and Tools
Migrating to AWS
Assess
- Applying the AWS Well-Architected Framework for migration planning
- Tools and resources for evaluating existing infrastructure
- Overview of the AWS Migration Methodology
- Building a strong business case for migration
Mobilize
- Using AWS Application Discovery Service for gathering data on existing applications
- Overview of key migration strategies
- Leveraging AWS Control Tower for managing multi-account environments
- AWS Management and Governance services to streamline migration
Migrate
- Migrating servers using AWS Server Migration Service (SMS)
- Migrating with CloudEndure, an AWS company for continuous replication
- AWS Database Migration Service (DMS) for migrating databases
- Utilizing the AWS Schema Conversion Tool for database schema migration
- VMware workloads migration with VMware Cloud on AWS
- Data transfer services for moving large datasets to AWS
Operations
- Key operational services for post-migration management
- Utilizing AWS Service Catalog to manage and deploy resources
- Integrations with AWS Service Catalog to streamline operations after migration
Cost Management, Optimization, and Forecasting
AWS Cost Management Tools and Features
Cost Analysis and Reporting
- AWS Cost Explorer: Visualize and analyze your AWS costs and usage.
- AWS Cost & Usage Report: Detailed billing reports for in-depth cost tracking.
- Consolidated Billing for AWS: Centralize billing across multiple accounts within an organization.
Account Management
- AWS Organizations: Manage multiple AWS accounts with consolidated billing and governance.
- AWS Purchase Order Management: Streamline and manage purchase orders directly within AWS.
Cost Monitoring and Control
- AWS Cost Anomaly Detection: Automatically detect unexpected spending patterns.
- AWS Budgets: Set custom cost and usage budgets with alerts for threshold breaches.
- Reserved Instances: Save on long-term workloads by committing to reserved capacity.
- Savings Plans: Flexible pricing plans for significant cost savings across AWS services.
Pricing Options
- Amazon EC2 Spot Instances: Utilize unused EC2 capacity at reduced costs.
- Amazon DynamoDB Pricing: Flexible pricing models for provisioned and on-demand capacity.
Optimization Tools
- AWS Instance Scheduler: Automate start/stop schedules for EC2 instances to optimize costs.
- Amazon EC2 Auto Scaling: Automatically scale EC2 instances based on demand to reduce waste.
- AWS Trusted Advisor: Get recommendations on cost optimization, performance, and security.
- Right Sizing: Identify and adjust underutilized or overprovisioned resources.
- AWS Compute Optimizer: Receive data-driven recommendations for optimizing EC2 instances and other resources.
Storage Optimization
- Amazon S3 Intelligent-Tiering: Automatically move data between storage tiers to optimize costs.
AWS Technical Essentials and Professional Skills
Introduction to AWS Core Technologies
- AWS Cloud Fundamentals: Understanding the basics of cloud computing and the benefits of using AWS.
- Why AWS: Exploring why AWS products and services are the right choice for customers.
- Core Services: Highlighting the value of AWS core services in delivering solutions to customers.
From Services to Solutions
- Architectural Best Practices: Implementing best practices for designing reliable, secure, and scalable systems.
- Migration Strategies: Effective strategies for migrating workloads to AWS.
- Use Cases and Well-Architected Framework: Understanding common use cases and applying the AWS Well-Architected Framework for solution design.
Presenting AWS Solutions to Customers
- Discovery Questioning: Developing questioning techniques to understand customer needs.
- Whiteboarding Skills: Using whiteboarding effectively in mock presentations.
- Proof of Concepts (PoC): Creating successful PoCs to demonstrate AWS solutions.
- Customer Meetings: Best practices for running productive and engaging customer meetings.
Looking Ahead
- Implementation and Modernization: Planning and implementing modern solutions on AWS.
- Cost Considerations: Assessing the cost of AWS solutions and making optimizations to ensure cost-efficiency for customers.
Automating Software Delivery – CI/CD and DevOps
Understanding CI & CD
- Continuous Integration (CI) Goals: Automating code integration to improve collaboration and reduce integration issues.
- Continuous Delivery (CD): Ensuring that code changes are always in a deployable state.
- Continuous Deployment Goals: Automating the release of code to production environments without manual intervention.
- Immutable Infrastructure: Leveraging infrastructure that cannot be changed after it is deployed, ensuring consistency across environments.
AWS Code Services
- Source Code Management Options: Tools and strategies for managing code repositories.
- Branching Strategies: Best practices for branching off the master branch.
- AWS CodeBuild: Introduction to AWS CodeBuild for automating build processes.
- Creating a Build Spec YAML File: Defining build configurations for AWS CodeBuild.
- Jenkins as a CI Server: Utilizing Jenkins as an alternative CI server.
AWS CodeDeploy
- AppSpec File: Understanding the structure and use of the AppSpec file in AWS CodeDeploy.
- Revisions: Managing application revisions for deployments.
AWS CodePipeline
- Introduction to AWS CodePipeline: Orchestrating CI/CD workflows using AWS CodePipeline.
- Pipeline Actions: Different actions available within AWS CodePipeline.
- Using AWS Lambda in a Pipeline: Integrating AWS Lambda functions in CI/CD pipelines.
Testing in CI/CD Pipelines
- Testing Pyramid: Structuring tests for different stages of the pipeline.
- Continuous Testing with Infrastructure as Code (IaC): Automating testing in infrastructure deployments.
- Testing Scenarios: Key testing scenarios to implement in a CI/CD pipeline.
- Best Practices for Unit Testing: Ensuring code correctness with unit tests.
- Integration and Unit Tests: Differentiating between and implementing integration and unit tests.
- Fault Tolerance Testing: Ensuring system resilience during testing.
Deployment Strategies
- In-Place Deployments: Deploying updates in the same environment without creating new infrastructure.
- Rolling Updates: Deploying updates incrementally across instances.
- Canary Releases: Testing updates with a small subset of instances before full deployment.
- Blue/Green Deployments: Running two environments (production and new version) and switching traffic between them.
- Red-Black Deployments: Another strategy for deploying updates without downtime.
- Immutable or Disposable Updates: Using immutable infrastructure for safer deployments.
Application Deployment Strategies
- Overview of deployment strategies for ensuring high availability, fault tolerance, and reduced downtime during application delivery.
Linux for Cloud and DevOps Engineers
Linux Essentials
Introduction to the Command Line
- Understanding and navigating the Linux command line interface (CLI)
Managing Physical Storage
- Configuring and managing physical storage devices on Linux systems
Installing and Configuring Software
- Installing, configuring, and managing software components and services
Monitoring and Managing Processes
- Monitoring system performance and managing running processes
File and File System Management
- Managing, securing, and organizing files and file systems
User and Group Administration
- Creating, managing, and securing users and groups on Linux systems
System Logs and Issue Review
- Reviewing system logs and journal entries to identify and troubleshoot issues
System Troubleshooting with Red Hat Insights
- Analyzing system performance and troubleshooting issues using Red Hat Insights
Remote System Management with SSH
- Securely managing Linux systems remotely using SSH
Course Duration and Enrollment Details
Upcoming Batch Details:
🔷 Training Start Date: November 23, 2024
🔷 Enrollment Deadline: November 15, 2024
🔷 Duration: 6 Months
Pricing Options
🔷 Discounted Rate: $1000 USD
🔷 Payment Plan:
- Initial Deposit: $400 USD
- Monthly Payment: $200 USD
🔷 One-Time Payment Option: $800 USD
Please note: All sales and payments are final – NO REFUNDS.
,
Frequently Asked Questions
We empower you to view the world from new perspectives, uncover opportunities you never thought possible, and deliver
results that transform the present into the future.