Skip to main content

Amazon Web Services

$495.00
Availability:
Downloadable Resources, Instant Access
Your guarantee:
30-day money-back guarantee — no questions asked
How you learn:
Self-paced • Lifetime updates
When you get access:
Course access is prepared after purchase and delivered via email
Toolkit Included:
Includes a practical, ready-to-use toolkit containing implementation templates, worksheets, checklists, and decision-support materials used to accelerate real-world application and reduce setup time.
Who trusts this:
Trusted by professionals in 160+ countries
Adding to cart… The item has been added

This curriculum reflects the scope typically addressed across a full consulting engagement or multi-phase internal transformation initiative.

Architecting for Resilience and Fault Tolerance

  • Design multi-AZ and multi-region architectures using Route 53 failover policies and AWS Global Accelerator to meet defined RTO and RPO targets.
  • Evaluate trade-offs between active-passive and active-active deployment models across regions, including data replication latency and cost implications.
  • Implement automated recovery workflows using AWS Lambda and CloudWatch Alarms to reduce mean time to recovery (MTTR) for critical services.
  • Configure Elastic Load Balancing with health checks and target group failover to isolate unhealthy instances without service disruption.
  • Assess the operational complexity of maintaining disaster recovery environments in secondary regions versus on-premises solutions.
  • Define and enforce recovery validation procedures using AWS Backup and automated restore testing in non-production environments.
  • Integrate fault injection experiments using AWS Fault Injection Simulator to validate system resilience under real-world failure conditions.
  • Map AWS Well-Architected Framework reliability pillars to organizational SLAs and audit readiness requirements.

Security, Identity, and Access Governance

  • Design least-privilege IAM policies using service control policies (SCPs) in AWS Organizations to enforce guardrails across accounts.
  • Implement multi-factor authentication (MFA) requirements and session policies for privileged roles, balancing security and usability.
  • Configure AWS Single Sign-On (SSO) with external identity providers to manage federated access across hybrid environments.
  • Monitor and respond to IAM policy changes using AWS CloudTrail and AWS Config rules to detect privilege escalation risks.
  • Enforce encryption of data at rest using AWS KMS with customer-managed keys and audit key usage across regions.
  • Design secure cross-account access patterns using IAM roles and resource policies, minimizing standing credentials.
  • Implement automated remediation for non-compliant S3 bucket policies using AWS Security Hub and AWS Lambda.
  • Assess trade-offs between centralized identity management and decentralized team autonomy in large-scale enterprises.

Cost Optimization and Financial Governance

  • Model total cost of ownership (TCO) for workloads comparing on-demand, reserved, and spot instances across usage profiles.
  • Implement tagging strategies aligned with business dimensions (department, project, environment) for accurate cost allocation.
  • Use AWS Cost Explorer and AWS Budgets to forecast spend and trigger alerts for anomalous usage patterns.
  • Evaluate the break-even point for Reserved Instance commitments versus Savings Plans based on workload stability.
  • Automate shutdown of non-production resources using Instance Scheduler and track savings via Cost and Usage Reports.
  • Optimize data transfer costs by analyzing inter-AZ, inter-region, and internet egress patterns in VPC Flow Logs.
  • Assess cost implications of data lifecycle policies using S3 Intelligent-Tiering and Glacier Vault strategies.
  • Enforce cost controls through Service Control Policies that restrict launch of high-cost instance types in non-approved accounts.

Networking and Connectivity at Scale

  • Design hybrid connectivity using AWS Direct Connect with BGP failover to public and private VIFs for carrier diversity.
  • Implement VPC peering versus Transit Gateway based on scalability requirements and routing complexity.
  • Configure DNS resolution across VPCs and on-premises networks using Route 53 Resolver endpoints and rules.
  • Enforce network segmentation using security groups, NACLs, and AWS Network Firewall in multi-tier applications.
  • Evaluate latency and throughput requirements for application workloads when selecting placement groups and enhanced networking.
  • Design egress filtering using NAT gateways, firewalls, and proxy architectures to meet compliance mandates.
  • Monitor network performance using VPC Flow Logs, CloudWatch Metrics, and AWS X-Ray for bottleneck identification.
  • Plan IP address allocation across multiple VPCs using IPv4 and IPv6 CIDR strategies to avoid future conflicts.

Data Management and Storage Strategy

  • Select appropriate storage classes (S3 Standard, IA, Glacier) based on access frequency, retrieval time, and cost sensitivity.
  • Design cross-region replication for S3 buckets with considerations for data sovereignty and compliance boundaries.
  • Implement point-in-time recovery for RDS and DynamoDB using automated backups and continuous backups (PITR).
  • Evaluate trade-offs between Amazon RDS, Aurora, and self-managed databases on EC2 for performance and operational overhead.
  • Configure lifecycle policies to transition data between storage tiers and enforce deletion based on retention policies.
  • Design high-throughput data ingestion pipelines using Kinesis Data Streams or MSK for real-time analytics workloads.
  • Assess durability and consistency models in DynamoDB versus relational databases for transactional integrity requirements.
  • Implement data encryption and access controls for EBS snapshots and AMIs in shared or multi-tenant environments.

DevOps and CI/CD Pipeline Engineering

  • Design multi-account CI/CD pipelines using AWS CodePipeline, CodeBuild, and CodeDeploy with stage promotion controls.
  • Implement immutable infrastructure patterns using AMI baking with Packer and versioned artifact management.
  • Enforce deployment safety with canary and blue/green strategies using CodeDeploy and Route 53 weighted routing.
  • Integrate security scanning into CI/CD pipelines using AWS Inspector, third-party tools, and policy-as-code checks.
  • Manage infrastructure as code using AWS CloudFormation or Terraform with change sets and drift detection.
  • Configure cross-region and cross-account artifact distribution using ECR replication and S3 cross-region replication.
  • Optimize build environments using managed CodeBuild compute types and caching strategies for dependency layers.
  • Define rollback triggers and automated remediation steps for failed deployments using CloudWatch and Lambda.

Monitoring, Observability, and Incident Response

  • Design centralized logging architecture using CloudWatch Logs, Kinesis Data Firehose, and S3 for long-term retention.
  • Configure custom CloudWatch Metrics and dashboards to track business KPIs alongside technical performance indicators.
  • Implement structured logging and tracing using X-Ray to diagnose latency and failure propagation in microservices.
  • Define alert thresholds using anomaly detection and dynamic scaling to reduce alert fatigue and false positives.
  • Integrate AWS Systems Manager Incident Manager for coordinated response during major incidents.
  • Use AWS Config rules to detect configuration drift and enforce compliance with security baselines.
  • Correlate events across CloudTrail, GuardDuty, and VPC Flow Logs for threat investigation and root cause analysis.
  • Design observability data retention policies balancing cost, compliance, and forensic investigation needs.

Migration Strategy and Application Modernization

  • Assess application portfolios using AWS Migration Hub and custom scoring models for rehost, refactor, or retire decisions.
  • Plan database migration cutover windows using AWS DMS with ongoing replication and validation scripts.
  • Design phased migration waves based on business risk, interdependencies, and team readiness.
  • Implement zero-downtime cutover strategies using DNS switching and dual-write patterns during transition.
  • Evaluate containerization of monolithic applications using ECS or EKS versus refactoring into serverless components.
  • Manage data migration consistency and validation across heterogeneous source systems and target formats.
  • Address licensing constraints for commercial software during lift-and-shift migrations to EC2.
  • Measure migration success using performance benchmarks, cost deltas, and operational support burden pre- and post-move.

Compliance, Risk, and Audit Management

  • Map AWS control objectives to regulatory frameworks (e.g., HIPAA, SOC 2, GDPR) using AWS Artifact reports.
  • Implement automated compliance checks using AWS Config rules and custom conformance packs for internal policies.
  • Design audit-ready logging pipelines with immutable storage and access controls for forensic integrity.
  • Manage evidence collection workflows using AWS Audit Manager for recurring compliance assessments.
  • Enforce encryption and access logging requirements across accounts using Service Control Policies.
  • Assess shared responsibility model implications for third-party SaaS and managed services in the architecture.
  • Define data residency and egress controls using AWS Organizations and resource tagging policies.
  • Conduct readiness reviews for external audits using AWS Well-Architected Tool and internal control matrices.

Strategic Cloud Operating Model and Governance

  • Design multi-account AWS Organization structures using OU hierarchies aligned with business units and security domains.
  • Define centralized platform team responsibilities versus decentralized development team autonomy.
  • Implement landing zone blueprints using AWS Control Tower or custom frameworks for consistent account provisioning.
  • Establish cloud center of excellence (CCoE) governance processes for change approval and architectural review.
  • Balance innovation velocity with risk mitigation through policy-as-code enforcement and exception workflows.
  • Measure cloud maturity using KPIs such as deployment frequency, MTTR, cost per transaction, and security incident rate.
  • Integrate cloud strategy with enterprise architecture roadmaps and capital planning cycles.
  • Manage vendor lock-in risks by designing portable workloads and evaluating multi-cloud fallback options.