- Introduction
- What is Cloud Computing?
- The Benefits of Cloud
- Global Infrastructure
- Cloud Architecture
- Management and Development Tools
- Shared Responsibility Model
- Compute
- Storage
- Networking
- Databases
- EC2
- EC2 Pricing Models
- Identity
- 13-01 Zero Trust Model
- 13-02 Zero Trust on AWS
- 13-03 Zero Trust on AWS with Third Parties
- 13-04 Directory Service
- 13-05 Active Directory
- 13-06 Identity Providers - IdPs
- 13-07 Single-Sign-On
- 13-08 LDAP
- 13-09 Multi-Factor Authentication
- 13-10 Security Keys
- 13-11 AWS IAM
- 13-12 Anatomy of an IAM Policy
- 13-13 Principle of Least Privilege PoLP
- 13-14 AWS Account Root User
- 13-15 AWS Single-Sign On
- Application Integration
- Containers
- Governance
- Provisioning Services
- Serverless Services
- Windows on AWS
- Logging
- ML, AI and Big Data
- AWS Well-Architected Framework
- 22-01 AWS Well-Architected Framework
- 22-02 General Definitions
- 22-03 On Architecture
- 22-04 Amazon Leadership Principles
- 22-05 General Design Principles
- 22-06 Anatomy of a Pillar
- 22-07 Operational Excellence Design Principles
- 22-08 Security Design Principles
- 22-09 Reliability Design Principles
- 22-10 Performance Efficiency Design Principles
- 22-11 Cost Optimization Design Principles
- 22-12 AWS Well-Architected Tool
- 22-13 AWS Architecture Center
- TCO and Migration
- Billing, Pricing, and Support
- 24-01 AWS Free Services
- 24-02 AWS Support Plans
- 24-03 Technical Account Manager (TAM)
- 24-04 AWS Marketplace
- 24-05 Consolidated Billing
- 24-06 Consolidated Billing – Volume Discounts
- 24-07 AWS Trusted Advisor
- 24-08 Service Level Agreements
- 24-09 AWS Service Level Agreements
- 24-10 Service Heath Dashboard
- 24-11 AWS Personal Health Dashboard
- 24-12 AWS Abuse
- 24-13 AWS Free-Tier
- 24-14 AWS Credits
- 24-15 AWS Partner Network APN
- 24-16 AWS Budgets
- 24-17 AWS Budget Reports
- 24-18 AWS Cost and Usage Reports (CUR)
- 24-19 Billing Alerts and Alarms
- 24-20 AWS Cost Explorer
- 24-21 AWS Pricing API
- Security
- 25-01 Defense in Depth
- 25-02 Confidentiality, Integrity, Availability CIA
- 25-03 Vulnerability
- 25-04 Cryptography
- 25-05 Hashing and Salting
- 25-06 Digital Signatures and Signing
- 25-07 In-Transit vs At-Rest Encryption
- 25-08 Common Compliance Programs
- 25-09 Penetration Testing
- 25-10 AWS Artifact
- 25-11 AWS Inspector
- 25-12 Distributed Denial of Service DDoS
- 25-13 AWS Shield
- 25-14 Amazon GuardDuty
- 25-15 Amazon Macie
- 25-16 AWS Virtual Private Network VPN
- 25-17 AWS WAF
- 25-18 Hardware Security Module (HSM)
- 25-19 AWS Key Management Service
- 25-20 CloudHSM
Quizzes
- 26-01 What is Cloud Computing
- 26-02 Introduction to AWS and the Global Infrastructure
- 26-03 User Accounts
- 26-04 Identity and Access Management
- 26-05 Amazon Simple Storage S3
- 26-06 VPCs Route53 and CloudFront
- 26-07 AWS Compute Services
- 26-08 AWS Database Services
- 26-09 High Availability and Elasticity on AWS
- 26-10 Application Integration Services
- 26-11 Analytics on AWS
- 26-12 Automation and Deployment on AWS
- 26-13 Management and Governance on AWS
- 26-14 Implementing Security in AWS
- 26-15 Billing and Pricing
Disclaimer
These notes were not created by me. I have simply transcribed all the notes from Andrew Brown’s free videos on CodeCademy. And, the quizzes in Chapter 26 are from Rajesh Daswani’s book.