Autoplay
Autocomplete
Previous Lesson
Complete and Continue
AWS Solutions Architect Associate**
Introduction to the AWS Solutions Architect Associate course
Introduction (1:02)
Chapter 1: AWS Cloud Services Overview
Cloud Computing Defined (8:12)
Benefits of Cloud Computing (9:35)
Cloud Computing Models (6:36)
History (6:58)
Platform (5:43)
Services, Part 1 (10:02)
Services, Part 2 (7:41)
Security and Compliance (6:46)
Regions and Availability (6:30)
Chapter 2: AWS Storage Design
Storage Services (6:36)
S3 Storage Class (7:26)
S3 Terminology (9:29)
S3 Advanced Features (7:53)
Creating S3 Buckets Lab (8:20)
S3 Bucket Properties (8:09)
S3 Managing Objects Lab (11:17)
Glacier (7:20)
Setting up a Glacier Vault Lab (8:01)
Elastic Block Store (EBS) (7:43)
Creating EBS Volumes Lab (7:29)
Elastic File System (EFS) (7:01)
Creating an EFS File System Lab (7:27)
Integrating On-Premises Storage (6:52)
Storage Access Security Lab (9:57)
Storage Performance (8:22)
Chapter 3: Virtual Private Cloud (VPC)
Virtual Private Cloud (VPC) Overview (9:58)
Creating a VPC Lab (10:56)
Configuring DHCP Options Lab (4:28)
Elastic IP Addresses (EIPs) (6:41)
Elastic Network Interfaces (ENIs) (4:56)
Endpoints (7:09)
VPC Peering (7:52)
Creating a VPC Peering Connection Lab (9:12)
Security Groups Overview (6:37)
Network Address Translation (NAT) (10:37)
Gateways (VPGs and CGWs) (8:07)
Chapter 4: Compute Services Design
EC2 Overview (11:16)
EC2 Instance Types (9:22)
EC2 Pricing (13:27)
EBS and EC2 (5:27)
Chapter 5: Compute Services Implementation
Launching an EC2 Linux Instance Lab (12:53)
Configuring an EC2 Linux Instance Lab (8:23)
Setting up an EC2 Windows Instance Lab (12:00)
Shared Tenancy (5:08)
Dedicated Hosts (7:54)
Dedicated Instances (5:53)
AMI Virtualization (12:10)
Chapter 6: Compute Services Management
Instance Management (9:30)
Connecting to Instances Lab (8:40)
Working with Security Groups (10:05)
Working with Security Groups Lab (10:14)
Elastic Container Service (ECS) (8:32)
Elastic Beanstalk Environment (11:16)
Chapter 7: Identity and Access Management (IAM)
Identity and Access Management (IAM) Overview (7:13)
Principles (10:12)
Root User (6:15)
Authentication (6:16)
Authorization Policies (12:39)
Multi-Factor Authentication (7:55)
Key Rotation (9:43)
Multiple Permissions (6:18)
AWS Compliance Program (6:58)
Shared Responsibility Model (6:21)
Chapter 8: IAM Best Practices
User Accounts (11:26)
Password Policies (9:09)
Credential Rotation (5:47)
Principle of Least Privilege (5:11)
IAM Roles (8:19)
Policy Conditions (8:22)
CloudTrail (11:56)
Chapter 9 - Auto Scaling Solutions
Auto Scaling Overview (6:03)
Auto Scaling Groups (4:08)
Termination Policies (6:47)
Auto Scaling Configuration Lab (12:35)
Launch Methods (4:14)
Load Balancer Concepts (8:15)
Elastic Load Balancing (ELB) (9:40)
Chapter 10 - Virtual Network Services
DNS (14:30)
Configuring Route 53 Lab (6:56)
Configuring DNS Lab (13:05)
Configuring ACLs and NACLs Lab (9:24)
Flow Logs (6:57)
Chapter 11 - AWS Application Deployment
Application and Deployment Services (4:29)
Lambda (6:29)
APO Gateway (8:59)
Kinesis (5:41)
Kinesis Data Streams and Firehose (5:37)
Kinesis Data Analytics (4:04)
Reference Architectures (5:36)
CloudFront (8:11)
Web Application Firewall (WAF) (7:15)
Simple Queue Service (SQS) (9:39)
Simple Notification Service (SNS) (7:48)
Simple Workflow (SWF) (6:56)
Step Functions (4:02)
OpsWorks (7:44)
Cognito (3:43)
Elastic MapReduce (EMR) (5:27)
CloudFormation (10:22)
CloudWatch (4:42)
Trusted Advisor (5:16)
Organizations (8:06)
Chapter 12 - AWS Database Design
Database Types (8:09)
Relational Databases (7:54)
Database Hosting Methods (4:41)
High Availability Solutions (6:12)
Scalability Solutions (4:47)
Database Security (8:06)
Aurora (6:29)
Redshift (8:17)
DynamoDB (9:53)
Chapter 13 - Database Deployment
DynamoDB Tables Lab (8:32)
MySQL Lab (13:26)
Configuration Lab (12:58)
Backups Lab (4:13)
Restore Lab (4:26)
Snapshot Lab (7:49)
Monitoring Lab (5:53)
Chapter 14 - Additional AWS Services
Media Content Delivery (13:11)
Desktop & Appstreaming (5:50)
ElastiCache (5:22)
Security Services Lab (12:33)
Analytics Engines (11:02)
Development Operations (DevOps) (12:21)
Chapter 15 - Operational Excellence with AWS
The Operational Excellence Process (8:17)
Widget Makers Scenario (6:33)
Resilient Design (7:49)
Resilient Design Scenario (5:02)
Performant Design (9:17)
Performant Design Scenario (6:07)
Secure Design (8:09)
Secure Design Scenario (5:16)
Cost Optimization (6:51)
Cost Optimization Scenario (5:08)
General Best Practices (8:10)
Redshift
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock