Autoplay
Autocomplete
Previous Lesson
Complete and Continue
AWS Certified Solutions Architect - Associate Certification 2020
Fundamentals of Cloud Computing Platform
Introduction to Cloud Computing (11:50)
Cloud Computing Models (6:26)
Architecture of Cloud Environment (10:17)
On-Demand & Self Service - Characteristics of Cloud (2:45)
Characteristic of CSP - Elasticity (8:12)
Characteristic of CSP - Elasticity 02 (7:03)
Infrastructure & Networking
Introduction to Amazon Web Services (11:03)
AWS Global Infrastructure (11:39)
Setting up LAB environment (5:08)
Launching our first EC2 instance (12:02)
Introduction to Network Switches & Virtual Private Cloud (20:46)
VPC - Part 2 ( Routing ) (10:26)
VPC & Subnetworks (9:53)
Internet Gateways (10:59)
Public & Private Subnets (5:39)
Public & Private Subnets - Practical (14:01)
IP Addressing in AWS (16:40)
Deploying full VPC based EC2 Infrastructure (13:19)
Understanding EC2 Instance Types (8:58)
EC2 Pricing Models (18:54)
Understanding VPC Peering (4:56)
VPC Peering - Part 02 (8:50)
Inter Region VPC Peering (7:40)
EC2 Placement Groups (19:43)
Understanding basics of Firewalls (15:31)
Understanding AWS Firewall - Security Groups (5:09)
Network ACL (NACL) (9:17)
Storage
Introduction to Block & Object storage mechanism (7:17)
Introduction to Elastic Block Store (6:21)
Feature of EBS - Portability (14:03)
Understanding NAS Solutions (5:24)
Feature of EBS - Elasticity (14:06)
Understanding Virtualization Snapshots (10:18)
EBS Snapshots (8:05)
EBS - Volume Types (16:48)
Instance Store Volumes (16:39)
Introduction to Simple Storage Service (S3) (16:38)
Features of S3 - Storage Classes (11:55)
Features of S3 - Version Control (6:02)
Feature of S3 - Lifecycle Management (8:25)
Features of S3 - Cross Region Replication (8:01)
Understanding AWS Storage Gateway (13:10)
Snowball (9:35)
High Availability
Understanding High Availability Configuration (13:52)
RTO & RPO (6:35)
Getting started with Elastic Load Balancers (7:37)
ELB Configuration - Health Checks (12:14)
Configuring our first ELB (8:23)
ELB - Nodes & Availability Zones (9:31)
ELB Configuration - Cross Zone Load Balancing (5:59)
Overview of Elastic File System (EFS) (6:43)
Creating our First EFS (10:31)
Characteristic of Cloud - Elasticity
Introduction to Auto Scaling (9:45)
Auto Scaling - Practical (10:25)
Auto Scaling - Scaling Up Operations (6:51)
Auto Scaling - Scaling Down Operations (3:45)
Auto Scaling Plans (8:37)
Identity & Access Management
Understanding the principle of least privilage (10:40)
POLP - It starts with ROOT (5:09)
Introduction to Identity & Access Management (IAM) (9:23)
Understanding the IAM Policies (15:25)
IAM Policy Evaluation Logic (11:57)
AWS CLI (11:54)
IAM Role (11:32)
EC2 Instance Metadata (8:13)
IAM - Credential Reports (7:44)
Understanding working of an IAM role (8:03)
AWS STS (7:46)
Cryptography Kung Fu
Introduction to Cryptography (12:14)
Understanding communication Protocols (4:46)
Plain Text vs Encrypted Protocols (7:07)
Challenge with storing encryption keys & Intro to CloudHSM (6:36)
Serverless Architecture
Introduction to Serverless Computing (8:52)
Getting started with AWS Lambda (11:16)
Introduction to API (15:30)
Understanding working of API (9:54)
Building the function for our API (4:18)
Building our API with API Gateway (6:03)
Database Primer
Introduction to Relational Databases (13:33)
Installing an RDMS system in an EC2 instance (5:17)
Creating our first database structure in MySQL (11:10)
Understanding the INSERT statements (5:44)
Primary Key & Null Values (7:39)
Getting started with AWS RDS (11:50)
Connect to RDS via CLI and MySQL Workbench (6:29)
Understanding the Parameter & Subnet Groups in RDS (12:29)
Creating our first blog and connect it with RDS (13:07)
Exploring the Wordpress database structure in RDS (6:40)
Implementing Read replicas - Part 01 (8:24)
Implementing Read replicas - Part 02 (10:47)
Understanding RDS Snapshots (5:40)
Multi-AZ Architecture for RDS (6:39)
Understanding NoSQL Database (7:59)
Getting started with DynamoDB (12:22)
DynamoDB queries with CLI (11:58)
DynamoDB - Consistency Models (5:43)
Real World Use Case for NoSQL Database (7:13)
DynamoDB - Read & Write Capacity Units (7:32)
Building Scalable Applications
Introduction to Message Brokers (11:48)
Message Broker - Practical (5:22)
Introduction to SQS (10:48)
SQS - Understanding "Visibility Timeout" parameter (6:34)
SQS - Understanding different polling methods (6:41)
SQS - Understanding different queue types (4:53)
Understanding Simple Notification Service (SNS) (6:01)
Implementing SNS - Practical (6:42)
Domain Name System
Introduction to DNS (7:56)
Traffic packet capture of DNS packets (9:20)
Understanding DNS Records (9:39)
DNS Records - A & AAAA (8:28)
Introduction to Route53 (5:40)
Integrating Route53 with VPC (4:30)
DNS Records - CNAME & Alias (9:29)
DNS Records - Mail Exchange (4:29)
DNS Records - TXT records (3:27)
Advanced Route53 Configurations (6:40)
Route53 - Health Checks (8:09)
Implementing Health Checks with Route53 for Nginx (9:30)
Understanding Route53 FailOver Routing Policy (5:47)
Analytics
Understanding Streaming Data (6:16)
Configuring our first streams in AWS Kinesis (11:41)
AWS Kinesis - Practical (11:41)
AWS Import / Export (16:47)
Elastic Map Reduce (13:11)
Business Intelligence & Data Warehouse (15:06)
Understanding RedShift (12:54)
AWS SWF (5:57)
The DevOps Section
Introduction to Infrastructure as a Code (14:56)
Understanding CloudFormation (6:16)
AWS Elastic Beanstalk (10:08)
AWS Elastic Beanstalk - Part 02 (3:50)
AWS Code Commit (9:16)
Content Delivery Networks
Introduction to Reverse Proxies (10:15)
Understanding the Content Delivery Networks (5:30)
Understanding Edge Locations (7:47)
Deploying CloudFront Distribution - Part 01 (7:22)
Deploying CloudFront Distribution - Part 02 (5:22)
Understanding the Origin Access Identity (7:02)
S3 Transfer Acceleration (8:08)
Monitoring
Understanding CloudWatch (6:04)
Auditing AWS environment with CloudTrail (9:28)
AWS Trusted Advisor (8:47)
AWS Well Architected Framework (16:58)
Personal Health Dashboard (17:36)
AWS Risks and Compliance
Shared Responsibility Model (13:26)
Client Security Responsibility Model (8:38)
Introduction to Reverse Proxies
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock