Skip to content

Latest commit

 

History

History
19 lines (16 loc) · 74.5 KB

mind-map-aws-ccp.md

File metadata and controls

19 lines (16 loc) · 74.5 KB

Mind Map to outline essential topics

<style> * { margin: 0; padding: 0; } #mindmap { display: block; width: 70vw; height: 80vh; } </style>

Below is a Mind Map outlining essential topics for AWS Cloud Practitioner certification. Start your review from the main node, and each sub-node includes a link to a detailed explanation for further information. To learn more about each topic in depth, simply click on the corresponding link within the mind map. You have the option to zoom in and out within the mind map for a closer or wider view.

<script src="https://cdn.jsdelivr.net/npm/d3@7.8.5/dist/d3.min.js"></script><script src="https://cdn.jsdelivr.net/npm/markmap-view@0.15.4/dist/browser/index.js"></script><script src="https://cdn.jsdelivr.net/npm/markmap-toolbar@0.15.4/dist/index.js"></script><script>(()=>{setTimeout(()=>{const{markmap:M,mm:ge}=window,me=new M.Toolbar;me.attach(ge);const fe=me.render();fe.setAttribute("style","position:absolute;bottom:20px;right:20px"),document.body.append(fe)})})()</script><script>((F,I,R,H)=>{const X=F();window.mm=X.Markmap.create("svg#mindmap",(I||X.deriveOptions)(H),R)})(()=>window.markmap,null,{"type":"list_item","depth":0,"payload":{"lines":[0,1]},"content":"AWS Cloud Practitioner Study Notes","children":[{"type":"list_item","depth":1,"payload":{"lines":[1,2]},"content":"Study Guide","children":[]},{"type":"list_item","depth":1,"payload":{"lines":[2,3]},"content":"Cloud Computing","children":[{"type":"list_item","depth":2,"payload":{"lines":[3,4]},"content":"What is Cloud Computing?","children":[{"type":"list_item","depth":3,"payload":{"lines":[4,5]},"content":"The Deployment Models of the Cloud","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[5,6]},"content":"The Five Characteristics of Cloud Computing","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[6,7]},"content":"Six Advantages of Cloud Computing","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[7,8]},"content":"Problems solved by the Cloud","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[8,9]},"content":"Types of Cloud Computing","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[9,10]},"content":"Example of Cloud Computing Types","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[10,11]},"content":"Pricing of the Cloud – Quick Overview","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[11,12]},"content":"AWS Cloud Use Cases","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[12,13]},"content":"AWS Global Infrastructure","children":[{"type":"list_item","depth":3,"payload":{"lines":[13,14]},"content":"AWS Regions","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[14,15]},"content":"How to choose an AWS Region?","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[15,16]},"content":"AWS Availability Zones","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[16,17]},"content":"AWS Points of Presence (Edge Locations)","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[17,18]},"content":"Tour of the AWS Console","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[18,19]},"content":"Shared Responsibility Model","children":[]}]},{"type":"list_item","depth":1,"payload":{"lines":[19,20]},"content":"IAM: Identity Access & Management","children":[{"type":"list_item","depth":2,"payload":{"lines":[20,21]},"content":"What Is IAM?","children":[{"type":"list_item","depth":3,"payload":{"lines":[21,22]},"content":"IAM: Users & Groups","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[22,23]},"content":"IAM: Permissions","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[23,24]},"content":"IAM Policies Inheritance","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[24,25]},"content":"IAM Policies Structure","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[25,26]},"content":"IAM – Password Policy","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[26,27]},"content":"IAM Roles for Services","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[27,28]},"content":"IAM Security Tools","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[28,29]},"content":"IAM Guidelines & Best Practices","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[29,30]},"content":"Shared Responsibility Model for IAM","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[30,31]},"content":"Multi Factor Authentication - MFA","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[31,32]},"content":"MFA devices options in AWS","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[32,33]},"content":"How can users access AWS ?","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[33,34]},"content":"What’s the AWS CLI?","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[34,35]},"content":"What’s the AWS SDK?","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[35,36]},"content":"IAM Section – Summary","children":[]}]},{"type":"list_item","depth":1,"payload":{"lines":[36,37]},"content":"EC2: Virtual Machines","children":[{"type":"list_item","depth":2,"payload":{"lines":[37,38]},"content":"What is Amazon EC2?","children":[{"type":"list_item","depth":3,"payload":{"lines":[38,39]},"content":"EC2 sizing & configuration options","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[39,40]},"content":"EC2 User Data","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[40,41]},"content":"EC2 Instance Types - Overview","children":[{"type":"list_item","depth":4,"payload":{"lines":[41,42]},"content":"General Purpose","children":[]},{"type":"list_item","depth":4,"payload":{"lines":[42,43]},"content":"Compute Optimized","children":[]},{"type":"list_item","depth":4,"payload":{"lines":[43,44]},"content":"Memory Optimized","children":[]},{"type":"list_item","depth":4,"payload":{"lines":[44,45]},"content":"Storage Optimized","children":[]}]},{"type":"list_item","depth":3,"payload":{"lines":[45,46]},"content":"EC2 Instance Types: example","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[46,47]},"content":"Introduction to Security Groups","children":[{"type":"list_item","depth":3,"payload":{"lines":[47,48]},"content":"Deeper Dive","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[48,49]},"content":"Security Groups Diagram","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[49,50]},"content":"Good to know","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[50,51]},"content":"Classic Ports to know","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[51,52]},"content":"EC2 Instance Launch Types","children":[{"type":"list_item","depth":3,"payload":{"lines":[52,53]},"content":"On Demand Instance","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[53,54]},"content":"Reserved Instances","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[54,55]},"content":"Savings Plans","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[55,56]},"content":"Spot Instances","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[56,57]},"content":"Dedicated Hosts","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[57,58]},"content":"Dedicated Instances","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[58,59]},"content":"Capacity Reservations","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[59,60]},"content":"Which purchasing option is right for me?","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[60,61]},"content":"Price Comparison Example – m4.large – us-east-1","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[61,62]},"content":"Shared Responsibility Model for EC2","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[62,63]},"content":"EC2 Section – Summary","children":[]}]},{"type":"list_item","depth":1,"payload":{"lines":[63,64]},"content":"EC2 Instance Storage","children":[{"type":"list_item","depth":2,"payload":{"lines":[64,65]},"content":"EBS Volumes","children":[{"type":"list_item","depth":3,"payload":{"lines":[65,66]},"content":"What’s an EBS Volume?","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[66,67]},"content":"EBS Volume","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[67,68]},"content":"EBS – Delete on Termination attribute","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[68,69]},"content":"EBS Snapshots","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[69,70]},"content":"EBS Snapshots Features","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[70,71]},"content":"EFS: Elastic File System","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[71,72]},"content":"EFS Infrequent Access (EFS-IA)","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[72,73]},"content":"Amazon FSx – Overview","children":[{"type":"list_item","depth":3,"payload":{"lines":[73,74]},"content":"Amazon FSx for Windows File Server","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[74,75]},"content":"Amazon FSx for Lustre","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[75,76]},"content":"EC2 Instance Store","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[76,77]},"content":"Shared Responsibility Model for EC2 Storage","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[77,78]},"content":"AMI Overview","children":[{"type":"list_item","depth":3,"payload":{"lines":[78,79]},"content":"AMI Process (from an EC2 instance)","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[79,80]},"content":"EC2 Image Builder","children":[]}]},{"type":"list_item","depth":1,"payload":{"lines":[80,81]},"content":"Elastic Load Balancing & Auto Scaling Groups","children":[{"type":"list_item","depth":2,"payload":{"lines":[81,82]},"content":"Scalability & High Availability","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[82,83]},"content":"Vertical Scalability","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[83,84]},"content":"Horizontal Scalability","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[84,85]},"content":"High Availability","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[85,86]},"content":"High Availability & Scalability For EC2","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[86,87]},"content":"Scalability vs Elasticity (vs Agility)","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[87,88]},"content":"What is load balancing?","children":[{"type":"list_item","depth":3,"payload":{"lines":[88,89]},"content":"Why use a load balancer?","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[89,90]},"content":"Why use an Elastic Load Balancer?","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[90,91]},"content":"What’s an Auto Scaling Group?","children":[{"type":"list_item","depth":3,"payload":{"lines":[91,92]},"content":"Auto Scaling Groups Scaling Strategies","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[92,93]},"content":"ELB & ASG Summary","children":[]}]},{"type":"list_item","depth":1,"payload":{"lines":[93,94]},"content":"Amazon S3","children":[{"type":"list_item","depth":2,"payload":{"lines":[94,95]},"content":"S3 Use cases","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[95,96]},"content":"Amazon S3 Overview - Buckets","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[96,97]},"content":"Amazon S3 Overview - Objects","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[97,98]},"content":"S3 Security","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[98,99]},"content":"S3 Bucket Policies","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[99,100]},"content":"Bucket settings for Block Public Access","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[100,101]},"content":"S3 Websites","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[101,102]},"content":"S3 - Versioning","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[102,103]},"content":"S3 Access Logs","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[103,104]},"content":"S3 Replication (CRR & SRR)","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[104,105]},"content":"S3 Storage Classes","children":[{"type":"list_item","depth":3,"payload":{"lines":[105,106]},"content":"S3 Durability and Availability","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[106,107]},"content":"S3 Standard General Purpose","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[107,108]},"content":"S3 Storage Classes - Infrequent Access","children":[{"type":"list_item","depth":4,"payload":{"lines":[108,109]},"content":"S3 Standard Infrequent Access (S3 Standard-IA)","children":[]},{"type":"list_item","depth":4,"payload":{"lines":[109,110]},"content":"S3 One Zone Infrequent Access (S3 One Zone-IA)","children":[]}]},{"type":"list_item","depth":3,"payload":{"lines":[110,111]},"content":"Amazon S3 Glacier Storage Classes","children":[{"type":"list_item","depth":4,"payload":{"lines":[111,112]},"content":"Amazon S3 Glacier Instant Retrieval","children":[]},{"type":"list_item","depth":4,"payload":{"lines":[112,113]},"content":"Amazon S3 Glacier Flexible Retrieval (formerly Amazon S3 Glacier)","children":[]},{"type":"list_item","depth":4,"payload":{"lines":[113,114]},"content":"Amazon S3 Glacier Deep Archive - for long term storage","children":[]}]},{"type":"list_item","depth":3,"payload":{"lines":[114,115]},"content":"S3 Intelligent-Tiering","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[115,116]},"content":"S3 Object Lock & Glacier Vault Lock","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[116,117]},"content":"Shared Responsibility Model for S3","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[117,118]},"content":"AWS Snow Family","children":[{"type":"list_item","depth":3,"payload":{"lines":[118,119]},"content":"Data Migrations with AWS Snow Family","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[119,120]},"content":"Time to Transfer","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[120,121]},"content":"Snowball Edge (for data transfers)","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[121,122]},"content":"AWS Snowcone","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[122,123]},"content":"AWS Snowmobile","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[123,124]},"content":"Snow Family - Usage Process","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[124,125]},"content":"What is Edge Computing?","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[125,126]},"content":"Snow Family - Edge Computing","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[126,127]},"content":"AWS OpsHub","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[127,128]},"content":"Hybrid Cloud for Storage","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[128,129]},"content":"AWS Storage Gateway","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[129,130]},"content":"Amazon S3 - Summary","children":[]}]},{"type":"list_item","depth":1,"payload":{"lines":[130,131]},"content":"Databases & Analytics","children":[{"type":"list_item","depth":2,"payload":{"lines":[131,132]},"content":"Databases Intro","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[132,133]},"content":"Relational Databases","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[133,134]},"content":"NoSQL Databases","children":[{"type":"list_item","depth":3,"payload":{"lines":[134,135]},"content":"NoSQL data example: JSON","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[135,136]},"content":"Databases & Shared Responsibility on AWS","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[136,137]},"content":"AWS RDS Overview","children":[{"type":"list_item","depth":3,"payload":{"lines":[137,138]},"content":"Advantage over using RDS versus deploying DB on EC2","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[138,139]},"content":"RDS Deployments: Read Replicas, Multi-AZ","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[139,140]},"content":"RDS Deployments: Multi-Region","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[140,141]},"content":"Amazon Aurora","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[141,142]},"content":"Amazon ElastiCache Overview","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[142,143]},"content":"DynamoDB","children":[{"type":"list_item","depth":3,"payload":{"lines":[143,144]},"content":"DynamoDB Accelerator - DAX","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[144,145]},"content":"DynamoDB - Global Tables","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[145,146]},"content":"Redshift Overview","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[146,147]},"content":"Amazon EMR","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[147,148]},"content":"Amazon Athena","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[148,149]},"content":"Amazon QuickSight","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[149,150]},"content":"DocumentDB","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[150,151]},"content":"Amazon Neptune","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[151,152]},"content":"Amazon QLDB","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[152,153]},"content":"Amazon Managed Blockchain","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[153,154]},"content":"AWS Glue","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[154,155]},"content":"DMS - Database Migration Service","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[155,156]},"content":"Databases & Analytics Summary","children":[]}]},{"type":"list_item","depth":1,"payload":{"lines":[156,157]},"content":"Other Compute","children":[{"type":"list_item","depth":2,"payload":{"lines":[157,158]},"content":"What is Docker?","children":[{"type":"list_item","depth":3,"payload":{"lines":[158,159]},"content":"Where Docker images are stored?","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[159,160]},"content":"Docker versus Virtual Machines","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[160,161]},"content":"ECS","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[161,162]},"content":"Fargate","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[162,163]},"content":"ECR","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[163,164]},"content":"What’s serverless?","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[164,165]},"content":"Why AWS Lambda ?","children":[{"type":"list_item","depth":3,"payload":{"lines":[165,166]},"content":"Benefits of AWS Lambda","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[166,167]},"content":"AWS Lambda language support","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[167,168]},"content":"AWS Lambda Pricing: example","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[168,169]},"content":"Amazon API Gateway","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[169,170]},"content":"AWS Batch","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[170,171]},"content":"Batch vs Lambda","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[171,172]},"content":"Amazon Lightsail","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[172,173]},"content":"Lambda Summary","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[173,174]},"content":"Other Compute Summary","children":[]}]},{"type":"list_item","depth":1,"payload":{"lines":[174,175]},"content":"Deploying and Managing Infrastructure at Scale","children":[{"type":"list_item","depth":2,"payload":{"lines":[175,176]},"content":"What is CloudFormation?","children":[{"type":"list_item","depth":3,"payload":{"lines":[176,177]},"content":"Benefits of AWS CloudFormation","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[177,178]},"content":"CloudFormation Stack Designer","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[178,179]},"content":"AWS Cloud Development Kit (CDK)","children":[{"type":"list_item","depth":3,"payload":{"lines":[179,180]},"content":"Example of AWS CDK (Python)","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[180,181]},"content":"Developer problems on AWS","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[181,182]},"content":"Typical architecture: Web App 3-tier","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[182,183]},"content":"AWS Elastic Beanstalk Overview","children":[{"type":"list_item","depth":3,"payload":{"lines":[183,184]},"content":"Elastic Beanstalk vs CloudFormation","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[184,185]},"content":"Elastic Beanstalk - Health Monitoring","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[185,186]},"content":"AWS CodeDeploy","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[186,187]},"content":"AWS CodeCommit","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[187,188]},"content":"AWS CodeBuild","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[188,189]},"content":"AWS CodePipeline","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[189,190]},"content":"AWS CodeArtifact","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[190,191]},"content":"AWS CodeStar","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[191,192]},"content":"AWS Cloud9","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[192,193]},"content":"AWS Systems Manager (SSM)","children":[{"type":"list_item","depth":3,"payload":{"lines":[193,194]},"content":"How Systems Manager works","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[194,195]},"content":"Systems Manager - SSM Session Manager","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[195,196]},"content":"AWS OpsWorks","children":[{"type":"list_item","depth":3,"payload":{"lines":[196,197]},"content":"OpsWorks Architecture","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[197,198]},"content":"Deployment - Summary","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[198,199]},"content":"Developer Services - Summary","children":[]}]},{"type":"list_item","depth":1,"payload":{"lines":[199,200]},"content":"Global Infrastructure","children":[{"type":"list_item","depth":2,"payload":{"lines":[200,201]},"content":"Why make a global application?","children":[{"type":"list_item","depth":3,"payload":{"lines":[201,202]},"content":"Global AWS Infrastructure","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[202,203]},"content":"Global Applications in AWS","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[203,204]},"content":"Amazon Route 53 Overview","children":[{"type":"list_item","depth":3,"payload":{"lines":[204,205]},"content":"Route 53 - Diagram for A Record","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[205,206]},"content":"Route 53 Routing Policies","children":[{"type":"list_item","depth":3,"payload":{"lines":[206,207]},"content":"simple routing policy","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[207,208]},"content":"weighted routing policy","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[208,209]},"content":"latency routing policy","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[209,210]},"content":"failover routing policy","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[210,211]},"content":"AWS CloudFront","children":[{"type":"list_item","depth":3,"payload":{"lines":[211,212]},"content":"CloudFront - Origins","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[212,213]},"content":"CloudFront vs S3 Cross Region Replication","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[213,214]},"content":"S3 Transfer Acceleration","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[214,215]},"content":"AWS Global Accelerator","children":[{"type":"list_item","depth":3,"payload":{"lines":[215,216]},"content":"AWS Global Accelerator vs CloudFront","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[216,217]},"content":"AWS Outposts","children":[{"type":"list_item","depth":3,"payload":{"lines":[217,218]},"content":"AWS Outposts Benefits","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[218,219]},"content":"AWS WaveLength","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[219,220]},"content":"AWS Local Zones","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[220,221]},"content":"Global Applications - Summary","children":[]}]},{"type":"list_item","depth":1,"payload":{"lines":[221,222]},"content":"Cloud Integration","children":[{"type":"list_item","depth":2,"payload":{"lines":[222,223]},"content":"Section Introduction","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[223,224]},"content":"Amazon SQS - Simple Queue Service","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[224,225]},"content":"Amazon Kinesis","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[225,226]},"content":"Amazon SNS","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[226,227]},"content":"Amazon MQ","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[227,228]},"content":"Integration - Summary","children":[]}]},{"type":"list_item","depth":1,"payload":{"lines":[228,229]},"content":"Cloud Monitoring","children":[{"type":"list_item","depth":2,"payload":{"lines":[229,230]},"content":"Amazon CloudWatch","children":[{"type":"list_item","depth":3,"payload":{"lines":[230,231]},"content":"Important Metrics","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[231,232]},"content":"Amazon CloudWatch Alarms","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[232,233]},"content":"Amazon CloudWatch Logs","children":[{"type":"list_item","depth":4,"payload":{"lines":[233,234]},"content":"CloudWatch Logs for EC2","children":[]}]},{"type":"list_item","depth":3,"payload":{"lines":[234,235]},"content":"Amazon CloudWatch Events","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[235,236]},"content":"Amazon EventBridge","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[236,237]},"content":"AWS CloudTrail","children":[{"type":"list_item","depth":3,"payload":{"lines":[237,238]},"content":"CloudTrail Events","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[238,239]},"content":"CloudTrail Insights Events","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[239,240]},"content":"CloudTrail Events Retention","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[240,241]},"content":"AWS X-Ray","children":[{"type":"list_item","depth":3,"payload":{"lines":[241,242]},"content":"AWS X-Ray advantages","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[242,243]},"content":"Amazon CodeGuru","children":[{"type":"list_item","depth":3,"payload":{"lines":[243,244]},"content":"Amazon CodeGuru Reviewer","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[244,245]},"content":"Amazon CodeGuru Profiler","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[245,246]},"content":"AWS Status - Service Health Dashboard","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[246,247]},"content":"AWS Personal Health Dashboard","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[247,248]},"content":"Cloud Monitoring Summary","children":[]}]},{"type":"list_item","depth":1,"payload":{"lines":[248,249]},"content":"VPC","children":[{"type":"list_item","depth":2,"payload":{"lines":[249,250]},"content":"VPC & Subnets Primer","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[250,251]},"content":"Internet Gateway & NAT Gateways","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[251,252]},"content":"Network ACL & Security Groups","children":[{"type":"list_item","depth":3,"payload":{"lines":[252,253]},"content":"Network ACLs vs Security Groups","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[253,254]},"content":"VPC Flow Logs","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[254,255]},"content":"VPC Peering","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[255,256]},"content":"VPC Endpoints","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[256,257]},"content":"Site to Site VPN & Direct Connect","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[257,258]},"content":"Transit Gateway","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[258,259]},"content":"VPC Summary","children":[]}]},{"type":"list_item","depth":1,"payload":{"lines":[259,260]},"content":"Security & Compliance","children":[{"type":"list_item","depth":2,"payload":{"lines":[260,261]},"content":"AWS Shared Responsibility Model","children":[{"type":"list_item","depth":3,"payload":{"lines":[261,262]},"content":"Example, for RDS","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[262,263]},"content":"Example, for S3","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[263,264]},"content":"DDOS Protection on AWS","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[264,265]},"content":"AWS Shield","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[265,266]},"content":"AWS WAF - Web Application Firewall","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[266,267]},"content":"Penetration Testing on AWS Cloud","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[267,268]},"content":"Data at rest vs. Data in transit","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[268,269]},"content":"AWS KMS (Key Management Service)","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[269,270]},"content":"CloudHSM","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[270,271]},"content":"Types of Customer Master Keys: CMK","children":[{"type":"list_item","depth":3,"payload":{"lines":[271,272]},"content":"Customer Managed CMK","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[272,273]},"content":"AWS managed CMK","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[273,274]},"content":"AWS owned CMK","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[274,275]},"content":"CloudHSM Keys (custom keystore)","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[275,276]},"content":"AWS Certificate Manager (ACM)","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[276,277]},"content":"AWS Secrets Manager","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[277,278]},"content":"AWS Artifact (not really a service)","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[278,279]},"content":"Amazon GuardDuty","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[279,280]},"content":"Amazon Inspector","children":[{"type":"list_item","depth":3,"payload":{"lines":[280,281]},"content":"What does AWS Inspector evaluate?","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[281,282]},"content":"AWS Config","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[282,283]},"content":"Amazon Macie","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[283,284]},"content":"AWS Security Hub","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[284,285]},"content":"Amazon Detective","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[285,286]},"content":"AWS Abuse","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[286,287]},"content":"Root user privileges","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[287,288]},"content":"Summary","children":[]}]},{"type":"list_item","depth":1,"payload":{"lines":[288,289]},"content":"Machine Learning","children":[{"type":"list_item","depth":2,"payload":{"lines":[289,290]},"content":"Amazon Rekognition","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[290,291]},"content":"Amazon Transcribe","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[291,292]},"content":"Amazon Polly","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[292,293]},"content":"Amazon Translate","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[293,294]},"content":"Amazon Lex & Connect","children":[{"type":"list_item","depth":3,"payload":{"lines":[294,295]},"content":"Amazon Lex: (same technology that powers Alexa)","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[295,296]},"content":"Amazon Connect","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[296,297]},"content":"Amazon Comprehend","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[297,298]},"content":"Amazon SageMaker","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[298,299]},"content":"Amazon Forecast","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[299,300]},"content":"Amazon Kendra","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[300,301]},"content":"Amazon Personalize","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[301,302]},"content":"Amazon Textract","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[302,303]},"content":"Summary","children":[]}]},{"type":"list_item","depth":1,"payload":{"lines":[303,304]},"content":"Account Management, Billing & Support","children":[{"type":"list_item","depth":2,"payload":{"lines":[304,305]},"content":"AWS Organizations","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[305,306]},"content":"Multi Account Strategies","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[306,307]},"content":"Service Control Policies (SCP)","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[307,308]},"content":"AWS Organization - Consolidated Billing","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[308,309]},"content":"AWS Control Tower","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[309,310]},"content":"Pricing Models in AWS","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[310,311]},"content":"Compute Pricing","children":[{"type":"list_item","depth":3,"payload":{"lines":[311,312]},"content":"EC2","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[312,313]},"content":"Lambda & ECS","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[313,314]},"content":"Storage Pricing","children":[{"type":"list_item","depth":3,"payload":{"lines":[314,315]},"content":"S3","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[315,316]},"content":"EBS","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[316,317]},"content":"Database Pricing - RDS","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[317,318]},"content":"Content Delivery - CloudFront","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[318,319]},"content":"Networking Costs in AWS per GB - Simplified","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[319,320]},"content":"Savings Plan","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[320,321]},"content":"AWS Compute Optimizer","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[321,322]},"content":"Billing and Costing Tools","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[322,323]},"content":"AWS Pricing Calculator","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[323,324]},"content":"Cost Allocation Tags","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[324,325]},"content":"Tagging and Resource Groups","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[325,326]},"content":"Cost and Usage Reports","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[326,327]},"content":"Cost Explorer","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[327,328]},"content":"Billing Alarms in CloudWatch","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[328,329]},"content":"AWS Budgets","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[329,330]},"content":"Trusted Advisor","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[330,331]},"content":"Trusted Advisor - Support Plans","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[331,332]},"content":"AWS Basic Support Plan","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[332,333]},"content":"AWS Developer Support Plan","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[333,334]},"content":"AWS Business Support Plan (24/7)","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[334,335]},"content":"AWS Enterprise On-Ramp Support Plan (24/7)","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[335,336]},"content":"AWS Enterprise Support Plan (24/7)","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[336,337]},"content":"Account Best Practices - Summary","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[337,338]},"content":"Billing and Costing Tools - Summary","children":[]}]},{"type":"list_item","depth":1,"payload":{"lines":[338,339]},"content":"Advanced Identity","children":[{"type":"list_item","depth":2,"payload":{"lines":[339,340]},"content":"AWS STS (SecurityToken Service)","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[340,341]},"content":"Amazon Cognito (simplified)","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[341,342]},"content":"What is Microsoft Active Directory (AD)?","children":[{"type":"list_item","depth":3,"payload":{"lines":[342,343]},"content":"AWS Directory Services","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[343,344]},"content":"AWS Single Sign-On (SSO)","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[344,345]},"content":"Summary","children":[]}]},{"type":"list_item","depth":1,"payload":{"lines":[345,346]},"content":"Other AWS Services","children":[{"type":"list_item","depth":2,"payload":{"lines":[346,347]},"content":"Amazon WorkSpaces","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[347,348]},"content":"Amazon AppStream 2.0","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[348,349]},"content":"Amazon Sumerian","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[349,350]},"content":"AWS IoT Core","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[350,351]},"content":"Amazon Elastic Transcoder","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[351,352]},"content":"AWS Device Farm","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[352,353]},"content":"AWS Backup","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[353,354]},"content":"AWS Elastic Disaster Recovery (DRS)","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[354,355]},"content":"AWS DataSync","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[355,356]},"content":"AWS Fault Injection Simulator (FIS)","children":[]}]},{"type":"list_item","depth":1,"payload":{"lines":[356,357]},"content":"AWS Architecting & Ecosystem","children":[{"type":"list_item","depth":2,"payload":{"lines":[357,358]},"content":"Well Architected Framework General Guiding Principles","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[358,359]},"content":"AWS Cloud Best Practices - Design Principles","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[359,360]},"content":"Well Architected Framework 6 Pillars","children":[{"type":"list_item","depth":3,"payload":{"lines":[360,361]},"content":"1. Operational Excellence","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[361,362]},"content":"2. Security","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[362,363]},"content":"3. Reliability","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[363,364]},"content":"4. Performance Efficiency","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[364,365]},"content":"5. Cost Optimization","children":[]},{"type":"list_item","depth":3,"payload":{"lines":[365,366]},"content":"6. Sustainability","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[366,367]},"content":"AWS Well-Architected Tool","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[367,368]},"content":"AWS Right Sizing","children":[]},{"type":"list_item","depth":2,"payload":{"lines":[368,369]},"content":"AWS Ecosystem - Free resources","children":[{"type":"list_item","depth":3,"payload":{"lines":[369,370]},"content":"AWS Ecosystem - AWS Support","children":[]}]},{"type":"list_item","depth":2,"payload":{"lines":[370,371]},"content":"AWS Marketplace","children":[]}]}]},{"colorFreezeLevel":2})</script>