AWS Well-Architected

AWS Well-Architected Training This course is designed to provide a deep dive into the AWS Well-Architected Framework and its five pillars. It is divided into eight modules, which include overviews of the AWS Well-Architected Framework, as well as the Operational Excellence, Security, Reliability, Performance Efficiency, and Cost Optimization pillars. It also covers the Well-Architected review process, and using the AWS Well-Architected Tool to complete reviews.

Mastering the AWS Well-Architected Framework The Well-Architected Framework is a fantastic set of resources from AWS that can help you get the most out of the AWS Cloud. The challenge is understanding how the five pillars of the framework – Operational Excellence, Cost Optimization, Reliability, Performance Efficiency, and Security – work together. (by CloudGuru, 4.5 hrs video material)

Serverless Application Lens (AWS Well-Architected Framework) This documentdescribes the Serverless Applications Lensfor the AWS Well-Architected Framework. The document covers common serverless applicationsscenarios and identifieskey elements to ensure that your workloads are architected according to best practices.

Well-Architected Security Labs (Level 100-400) Repository of documentation and code in the format of hands-on labs to help you learn, measure, and build using architectural best practices - Security pillar of Well-Architected Framework (levels 100-400).

General

AWS CLI Introduction The AWS Command Line Interface (CLI) is a unified tool to manage your AWS services. In this session, we introduce the AWS CLI and how to use it to automate common administrative tasks in AWS. We cover several features and usage patterns including Amazon EBS snapshot management and Amazon S3 backups. We show how to combine AWS CLI features to create powerful tools for automation. See how to develop, debug, and deploy these examples in several live, end-to-end examples.

Amazon Web Services: Overview of Security Processes This document is intended to answer questions such as “How does AWS help me ensure that my data is secure?” Specifically, AWS physical and operational security processes are described for the network and server infrastructure under the management of AWS.

Authentication and Authorization with AWS Identity and Access Management This is an introductory course to authentication and authorization with AWS Identity and Access Management (IAM). In this course, we introduce you to IAM and discuss how the service helps you manage permissions to your AWS services. We also cover policy documents and IAM identities.

Differences Between Security Groups and NACLs This is an introductory course on the differences between security groups and NACLs, or Network Access Control Lists. In this course, we discuss how to secure the networking of your applications in AWS by using these two resources. We also review concepts like stateless and stateful to help you more effectively control traffic flow to and from your application.

Protecting Your Instance with Security Groups In this introductory video, we review how to secure access to your individual instances within AWS. We also explain how to use security groups to control permission and authorize traffic based on the source, defined as IP range, protocol and port.

Security Engineering on AWS This course demonstrates how to efficiently use AWS security services to stay secure in the AWS Cloud. The course focuses on the security practices that AWS recommends for enhancing the security of your data and systems in the cloud. The course highlights the security features of AWS key services including compute, storage, networking, and database services. You will also learn how to leverage AWS services and tools for automation, continuous monitoring and logging, and responding to security incidents.

A Deep Dive into AWS Encryption Services video from AWS re:Invent AWS Encryption Services provide an easy and cost-effective way to protect your data in AWS. In this session, you learn about leveraging the latest encryption management features to minimize risk for your data.

Best Practices for Choosing Identity Solutions for Applications video from AWS re:Inforce Identity requirements for consumer-facing applications differ significantly from those for workforce applications and cloud resources. Learn the best practices for choosing the right identity platform on AWS for your consumer-facing applications and for centrally managing access to all your business applications and AWS resources. Come learn about the proper use cases for implementing single sign-on (SSO) and Amazon Cognito, security best practices, and configuration guidance.

AWS Cloud Compliance webpage Security and Compliance is a shared responsibility between AWS and the customer. Explore the difference between AWS responsibility (Security of the Cloud) and customer responsibility (Security in the Cloud) when using AWS services.

Amazon Web Services: Risk and Compliance This document provides information to assist AWS customers with integrating AWS into their existing control framework supporting their IT environment.

AWS Key Management Best Practices This whitepaper outlines best practives of using and implementing AWS Key Management Service (AWS KMS), which is a managed service that allows you to concentrate on the cryptographic needs of your applications while Amazon Web Services (AWS) manages availability, physical security, logical access control, and maintenance of the underlying infrastructure.

AWS Security Best Practices This whitepaper provides security best practices that will help you define your Information Security Management System (ISMS) and build a set of security policies and processes for your organization so you can protect your data and assets in the AWS Cloud.

Best Practices

DevOps Engineering on AWS DevOps Engineering on AWS teaches you how to use the combination of tools, practices, and cultural philosophy of DevOps to improve an organization’s ability to develop, deliver, and maintain applications and services at high velocity on AWS. This course covers Continuous Integration (CI), Continuous Delivery (CD), microservices, infrastructure as code, monitoring and logging, and communication and collaboration.

2019 DevOps at Amazon Fireside Chat For this tech talk, we’ll have a conversation with Ken Exner, Amazon’s General Manager of Developer Tools, to hear Amazon’s DevOps transformation journey. He will talk about Amazon’s latest practices and tools that support its current DevOps model.

Introduction to DevOps on AWS This paper focuses on DevOps principles and practices supported on the AWS platform. A brief introduction to the origins of DevOps sets the scene and explains how and why DevOps has evolved.

Security

AWS Security Incident Response Guide This guidepresents an overview of the fundamentals of responding to security incidentswithin acustomer’s AWS Cloud environment. It focuses on an overview of cloud security and incident response concepts, and identifies cloud capabilities, services, and mechanisms that are available to customers who are responding to security issues.

AWS Security Workshops On the AWS security workshops portal you will find a collection of workshops and other hands-on content aimed at helping you gain an understanding of the AWS service ecosystem and introduce you to a variety of best practices that can be applied to securing your environments and workloads running in AWS.

Security at Scale: Logging in AWS The logging and monitoringof API callsarekey componentsin securityandoperational best practices, as well as requirements forindustry and regulatory compliance. AWS CloudTrail is a web service that records APIcallsto supported AWS services in your AWS account and delivers a log file to your Amazon Simple Storage Service (Amazon S3) bucket. This paper provides an overview of common compliance requirements related to logging anddetailshow AWS CloudTrail features can help satisfy these requirements.

Technology

Serverless for Beginners Serverless is a hot cloud topic. Some companies are opting to skip using cloud services like EC2, and moving straight to a completely serverless architecture. It pays to understand serverless design patterns. (by CloudGuru, 3 hrs video material)

The Serverless Framework The Serverless Framework gives you everything you need to develop, deploy, monitor and secure serverless applications on any cloud.

Introduction to Amazon Virtual Private Cloud (VPC) A basic overview of how Amazon Virtual Private Cloud (VPC) can be used to secure your AWS resources and provide full control over your network configuration. A sample Amazon VPC configuration will be covered in detail, along with its features and components.

Two quick, easy, and fun CloudWatch Tutorials The following scenarios illustrate uses of Amazon CloudWatch. In the first scenario, you use the CloudWatch console to create a billing alarm that tracks your AWS usage and lets you know when you have exceeded a certain spending threshold. In the second, more advanced scenario, you use the AWS Command Line Interface (AWS CLI) to publish a single metric for a hypothetical application named GetStarted.

Deep Dive on Container Security Security should be the first concern for any project – maintaining the confidentiality, integrity and availability of your architecture. Containers present a unique middle ground between full instance management and pure services.

Introduction to AWS Config An introduction to AWS Config and the process of recording and normalizing configuration changes within your AWS account. We also cover use cases and configuration, and we give a brief demonstration as well.

Architecting

Architecting on AWS This course covers the fundamentals of building IT infrastructure on the AWS platform. Students learn how to optimize the AWS Cloud by understanding how AWS services fit into cloud-based solutions. In addition, students explore AWS Cloud best practices and design patterns for architecting optimal IT solutions on AWS, and build a variety of infrastructures in guided, hands-on activities. The course also covers how to create fledgling architectures and build them into robust and adaptive solutions.

AWS Certification

Prepare for Your AWS Certification Exam See the resources to use when preparing for AWS Certification.

Optional Content

Best Practices

Practical Event-Driven Security with AWS Cloud applications are enabling businesses to move faster than ever, and with that comes a growing demand for security solutions that are able to keep up. This course will introduce you to AWS services that are used to monitor and report on application and infrastructure events, detect changes to infrastructure, and send required notifications. Through the learnings from this course, you can finally rest assured that your application is secure in the cloud. (by CloudGuru, 4 hrs video material)

Technology

Introduction to AWS Command Line Interface (CLI) AWS Command Line Interface (CLI) is one of several ways to access your AWS resources. In this course, we cover a brief overview and use cases regarding the AWS CLI. At the end of the course, a demonstration is performed to show how the AWS CLI can be used in day-to-day operations.

SaaS Architecture Overview

Deconstructing SaaS: A Deep Dive into Building Multi-tenant Solutions on AWS In this video, we look at the full lifecycle of registering new tenants, applying security policies to prevent cross-tenant access, and leveraging tenant profiles to effectively distribute and partition tenant data. We intend to connect many of the conceptual dots of SaaS implementation, highlighting the tradeoffs and considerations that can shape your approach to SaaS architecture.

Examples

Sample CloudFormation templates This collection of sample templates will help you get started with AWS CloudFormation and quickly build your own templates. AWS CloudFormation simplifies provisioning and management on AWS. You can create templates for the service or application architectures you want and have AWS CloudFormation use those templates for quick and reliable provisioning of the services or applications (called “stacks”).

AWS Solutions Library: Vetted Technology Solutions for the AWS Cloud AWS solutions help you solve common problems and develop solutions faster with the AWS platform. AWS solutions are tested by AWS architects and are designed for operational efficiency, reliability, security and cost effectiveness. Each AWS solution includes a detailed architecture, a deployment guide, and instructions for both manual and automatic deployment.

Reference Architectures by AWS and the AWS Community Erweitern Sie mit von AWS und der AWS-Community erstellten technischen Inhalten Ihr Wissen über die Cloud. Zu diesen Inhalten gehört u.a. eine ständig erweiterte Liste von Referenzarchitekturdiagrammen.

AWS Certification

Timed practice exam on aws.training Test your knowledge online in a timed environment.

AWS Architect Learning Path The Architect Path will help you understand the cloud ecosystem, how different services interact with one another, and how to make the best use of them, while also going deep on services considered foundational for day-to-day cloud architects. This path includes six certifications: AWS Certified Cloud Practitioner, AWS Certified Solution Architect Associate, AWS Certified Developer Associate, AWS Certified SysOps Associate, AWS Certified Solution Architect Professional, AWS Certified Big Data - Specialty (by CloudGuru, 174 hrs video material)

AWS Certified Solutions Architect - Associate certification exam This examination is intended for individuals who perform a solutions architect role and have one or more years of hands-on experience designing available, cost-efficient, fault-tolerant, and scalable distributed systems on AWS.

Exam Readiness: AWS Certified Solutions Architect – Associate The AWS Certified Solutions Architect – Associate exam validates technical expertise in designing and deploying scalable, highly available, and fault-tolerant systems on AWS.

Exam Readiness: AWS Certified Solutions Architect – Associate The AWS Certified Solutions Architect – Associate exam validates technical expertise in designing and deploying scalable, highly available, and fault-tolerant systems on AWS.