Course Overview
In this certification & training course, you will learn how to create automatable and repeatable deployments of networks and systems on the AWS platform. We will explore the AWS features and tools related to configuration and deployment and best practices for configuring and deploying systems.
Course Objectives
In this course, you will learn how to:
· Understand the AWS infrastructures as it related to system operations such as the global infrastructure, core services and account security
· Use the AWS Command Line Interface, and understand additional administration and development tools
· Manage, secure, and scale compute instances on AWS
· Identify container services and services available for serverless computing
· Build virtual private networks with Amazon VPC
· Configure and manage storage options utilizing the storage services offered with AWS
· Monitor the health of your infrastructure with services such as Amazon CloudWatch, AWS CloudTrail and AWS Config
· Manage resource consumption in an AWS account using tags, Amazon CloudWatch, and AWS Trusted Advisor
· Create and configure automated and repeatable deployments with tools such as AMIs and AWS CloudFormation
Pre-Requisite
We recommend that attendees of this course have the following prerequisites:
· Successfully completed the AWS Technical Essentials
· Background in software development or systems administration
· Proficiency maintaining operating systems at the command line, such as shell scripting in Linux environments or cmd/PowerShell in Windows
· Basic knowledge of networking protocols, such as TCP/IP and HTTP
Who Should Attend
This course is intended for:
· Systems administrators
· Software developers, especially those in a DevOps role
Related Certification Exam
Course Modules
Day 1
· Understanding Systems Operations on AWS
· Tooling and Automation
· Computing (Servers)
· Computing (Scaling and Name Resolution)
Day 2
· Computing (Serverless and Containers)
· Computing (Database Services)
· Networking
· Storing and Archiving
Day 3
· Monitoring and Security
· Managing Resource Consumption
· Creating Automated and Repeatable Deployments