AWS Certified Cloud Practitioner Training 2020 - Full Course

doe moe

Rising Star
Platinum Member
Free 4 hour long course, no ads!



01 - Introduction

0:00:00 Meet your Instructor

0:00:42 Why Get the Solutions Architect Associate

0:06:40 Exam Guide Overview





02 - Cloud Concepts

0:09:56 What is Cloud Computing?

0:12:08 Six Advantages and Benefits of Cloud Computing

0:14:40 Types of Cloud Computing

0:16:51 Cloud Computing Deployment Models





03 - AWS Global Infrastructure

0:19:27 Introduction and Map Overview

0:20:29 Regions

0:24:30 Availability Zones

0:25:41 Edge Locations

0:27:27 GovCloud Regions





04 - Getting Started

0:29:21 Follow Along - Creating an AWS account

0:32:46 Follow Along - Billing Preferences, Budgets and Alarms

0:40:08 Follow Along - Change IAM Users Sign-in Link

0:41:12 Follow Along - Activate MFA on Root Account

0:43:42 Follow Along - Create individual IAM User

0:48:45 Follow Along - Set a Password Policy





05 - Hands On

0:49:48 Follow Along - Intro and Regions

0:51:03 Follow Along - Elastic Cloud Compute (EC2)

0:55:35 Follow Along - Sessions Manager

0:58:35 Follow Along - Amazon Machine Image (AMI)

1:00:31 Follow Along - Auto Scaling Groups

1:07:30 Follow Along - Elastic Load Balancer

1:12:47 Follow Along - Simple Storage Service (S3)

1:14:27 Follow Along - CloudFront

1:16:50 Follow Along - Relational Database Service (RDS)

1:21:58 Follow Along - Lambda





06 - EC2 (Elastic Compute Cloud) Pricing Models

1:25:27 Introduction

1:25:46 On-Demand Instances

1:26:20 Reserved Instances (RI)

1:28:51 Spot Instances

1:30:38 Dedicated Host Instances

1:32:12 EC2 Pricing CheatSheet





07 - Billing and Pricing

1:35:04 Free Services

1:36:08 AWS Support Plans

1:40:03 Follow Along - Let's create a support case

1:44:04 AWS Marketplace

1:45:04 Follow Along - Marketplace Subscrption

1:50:44 AWS Trusted Advisor

1:54:13 Follow Along - AWS Trusted Advisor

1:55:42 Consolidated Billing

1:56:53 Consolidated Billing - Volume Discounts

1:58:36 AWS Cost Explorer

2:00:16 Follow Along - AWS Cost Explorer

2:04:09 AWS Budgets

2:06:31 Follow Along - AWS Budgets

2:10:22 TCO Calculator

2:11:19 Follow Along - TCO Calculator

2:14:42 AWS Landing Zone

2:17:27 Resource Groups and Tagging

2:18:26 Follow Along - Resource Groups

2:23:29 AWS QuickStart

2:26:48 AWS Cost and Usage Report

2:27:31 Follow Along - AWS Cost and Usage Report





08 - Technology Overview

2:30:19 AWS Organizations and Accounts

2:31:42 Follow Along - AWS Organizations and Accounts

2:44:13 AWS Networking

2:47:26 Database Services

2:51:32 Provisioning Services

2:56:00 Computing Services

3:00:04 Storage Services

3:03:50 Business Centric Services

3:07:25 Enterprise Integration

3:09:11 Logging Services

3:12:31 Know your Initialisms





09 - Security

3:13:49 Shared Responsibility Model

3:15:35 AWS Compliance Programs

3:17:58 AWS Artifact

3:19:03 Follow Along - AWS Artifact

3:21:33 Amazon Inspector

3:23:03 AWS WAF

3:24:16 AWS Shield

3:27:41 Penetration Testing

3:29:27 GuardDuty

3:31:12 Key Management Service (KMS)

3:32:50 Amazon Macie

3:35:06 Security Groups vs NACLs

3:37:00 AWS VPN





10 - Variation Study

3:38:10 Cloud* Service

3:40:13 *Connect Service

3:41:28 Elastic Transcoder vs. Media Convert

3:42:50 SNS vs SQS

3:45:17 Inspector vs Trusted Advisor

3:46:41 ALB vs NLB vs CLB

3:49:05 SNS vs SES

3:50:56 Artifact vs Inspector





11 - Summary

3:51:50 Follow Along - Booking your exam
 
Last edited:
Bump for the evening Family!

tenor.gif
 
AWS Certified Solutions Architect - Associate 2020

Free 10 hour long course, no ads!



☁️ Introduction
(0:00:00) Meet your Instructor
(0:01:12) Why Get the Solutions Architect Associate
(0:07:31) Exam Guide Overview


☁️ S3
(0:14:42) Introduction
(0:16:59) Storage Classes
(0:19:17) Storage Class Comparison
(0:21:12) Security
(0:23:17) Encryption
(0:24:41) Data Consistency
(0:25:45) Cross-Region Replication
(0:26:23) Versioning
(0:27:51) Lifecycle Management
(0:28:40) Transfer Acceleration
(0:29:26) Presigned URLs
(0:30:53) MFA Delete
⌨️ (0:31:50) Follow Along - Create & Delete a Bucket
⌨️ (0:33:48) Follow Along - Upload Files & Make Public
⌨️ (0:36:42) Follow Along - Versioning
⌨️ (0:42:45) Follow Along - Encryption
⌨️ (0:44:55) Follow Along - CLI
⌨️ (0:50:09) Follow Along - Lifecycle Policies
⌨️ (0:52:42) Follow Along - Cross Region Replication
⌨️ (0:55:24) Follow Along - Bucket Policies
(0:58:39) S3 CheatSheet


☁️ Snowball
(1:05:26) Snowballl
(1:07:19) Snowball Edge
(1:08:41) Snowmobile
(1:09:27) CheatSheet


☁️ VPC
(1:11:08) Introduction
(1:11:30) Core Components
(1:13:09) Key Features
(1:15:15) Default VPC
(1:16:38) Default Everywhere IP
(1:17:22) VPC Peering
(1:18:57) Route Tables
(1:19:56) Internet Gateway
(1:20:57) Bastions / Jumpbox
(1:22:30) Direct Connect


☁️ VPC Endpoints
(1:23:24) Introduction
(1:24:35) Interface Endpoints
(1:25:42) Gateway Endpoints
(1:26:19) Cheatsheet


☁️ VPC Flow Logs
(1:27:04) Introduction
(1:28:13) Log Breakdown
(1:29:09) Cheatsheet


☁️ NACL
(1:30:14) Introduction
(1:31:52) Use Case
(1:32:30) Cheat Sheet


☁️ Security Groups
(1:33:43) Introduction
(1:35:26) Use Cases
(1:37:45) Limits
(1:38:39) Cheat Sheet


☁️ NAT
(1:39:56) Introduction
(1:40:42) NAT Instances vs NAT Gateways
(1:42:45) Cheatsheet


☁️ VPC Follow Along
⌨️ (1:44:30) Create VPC, IGW, Route Tables and Subnets
⌨️ (1:56:58) Launch an EC2 Instance
⌨️ (2:02:03) Groups, NACL and Bastion
⌨️ (2:14:59) NAT
⌨️ (2:18:24) VPC Endpoints
⌨️ (2:22:33) Flow Logs
⌨️ (2:25:24) Cleanup


☁️ IAM
(2:27:38) Introduction
(2:27:51) Core Components
(2:30:22) Types of Policies
(2:31:22) Policy Structure
(2:33:48) Password Policy
(2:34:14) Access Keys
(2:34:59) Multi-Factor Authentication
⌨️ (2:35:47) Follow Along
(2:50:37) Cheat Sheet


☁️ Cognito
(2:52:30) Introduction
(2:53:12) Web Identity Federation
(2:54:17) User Pools
(2:56:19) Identity Pools
(2:57:32) Sync
(2:58:12) Cheat Sheet


☁️ AWS CLI & SDK
(2:59:30) Command Line Interface (CLI)
(3:00:59) Software Development Kit (SDK)
(3:02:08) Programmatic Access
⌨️ (3:03:17) Follow Along - Cloud 9 and CLI Setup
⌨️ (3:07:57) Follow Along - CLI
⌨️ (3:12:31) Follow Along - SDK
(3:20:41) CLI & SDK Cheat Sheet


☁️ DNS
(3:21:46) Introduction
(3:22:35) Internet Protocol (IP)
(3:24:03) Domain Registrars
(3:25:06) Top-Level Domains
(3:26:06) Start of Authority (SOA)
(3:27:11) A Records
(3:27:52) CNAME Records
(3:28:36) NS Records
(3:29:29) Time To Live (TTL)
(3:30:00) Cheat Sheet


☁️ Route 53
(3:31:36) Introduction
(3:32:24) Use Case
(3:33:32) Record Sets
(3:25:05) Routing Policies
(3:36:19) Simple Routing Policies
(3:37:13) Weighted Routing Policies
(3:38:15) Latency Based Routing
(3:39:23) Failover Routing Policies
(3:40:32) Geolocation Routing Policies
(3:41:05) Geoproximity Routing Policies
(3:42:57) Multi-Value Answer Policies
(3:43:25) Health Checks
(3:44:30) Resolver
(3:45:07) Cheat Sheet


☁️ EC2
3:47:14) Introduction
3:48:48) Instance Types
3:50:52) Instance Sizes
3:51:42) Instance Profiles
3:53:01) Placement Groups
3:54:31) Userdata
3:55:26) Metadata
3:56:12) EC2 Cheat Sheet


☁️ EC2 - Pricing
(3:48:05) Introduction
(3:58:23) On-Demand Instances
(3:58:59) Reserved Instances
(4:01:32) Spot Instances
(4:03:17) Dedicated Host Instances
(4:04:49) EC2 Pricing Cheat Sheet


☁️ AMI
(4:07:40) Introduction
(4:08:51) Use Cases
(4:10:08) Marketplace
(4:11:00) Create an AMI
(4:11:19) Choosing an AMI
(4:13:21) Coping an AMI
(4:13:46) AMI Cheat Sheet


☁️ Auto Scaling Groups
(4:15:13) Introduction
(4:15:51) Capacity Settings
(4:17:02) Health Check Replacements
(4:18:23) Scaling Policies
(4:20:12) ELB Integration
(4:21:03) Use Case
(4:22:05) Launch Configuration
(4:23:36) Autoscaling Groups Cheat Sheet


☁️ ELB
(4:25:04) Introduction
(4:25:52) Rules of Traffic
(4:28:03) Application Load Balancer (ALB)
(4:28:54) Network Load Balancer (NLB)
(4:29:25) Classic Load Balancer (CLB)
(4:30:27) Sticky Sessions
(4:21:24) X-Forwarded-For Header
(4:32:21) Health Checks
(4:33:23) Cross-Zone Load Balancing
(4:34:17) Request Routing
(4:35:28) ELB Cheat Sheet


☁️ EC2 Follow Along
⌨️ (4:37:17) Launching an Instance
⌨️ (4:47:25) SSH Into Instance
⌨️ (4:53:47) Encrypted Snapshots
⌨️ (4:57:44) Creating an AMI
⌨️ (5:02:19) Working with ASGs
⌨️ (5:26:05) Register a Domain


☁️ (Elastic) File System (EFS)
(5:29:44) Introduction
⌨️ (5:41:01) Mounting EFS
(5:49:50) EFS Cheat Sheet


☁️ (Elastic) Block Store (EBS)
(5:50:37) Introduction
(5:52:23) Volume Types
(5:55:15) Medium HDD
(5:56:27) Medium SSD
(5:57:08) Magnetic Tapes
(5:57:50) Moving Volumes
(5:58:44) Encrypted Root Volumes
(6:00:05) EBS vs Instance Store Volumes
(6:02:27) EBS Cheat Sheet


☁️ CloudFront
(6:04:05) Introduction
(6:05:20) Core Components
(6:06:24) Distributions
(6:08:52) Lambda@Edge
(6:10:25) Protection
⌨️ (6:12:31) Create a Distribution
⌨️ (6:16:18) Serve S3 Files From Distribution
⌨️ (6:19:26) Create an Invalidation
(6:21:02) CloudFront Cheat Sheet

==================================================

Just the Cheat Sheets for those doing last day review (Like me). Thank you for this Course!!

(0:58:39) S3

(1:09:27) Snowball

(1:26:19) VPC Endpoints

(1:29:09) VPC Flow Logs

(1:32:30) NACL

(1:38:39) Security Groups

(1:42:45) NAT

(2:50:37) IAM

(2:58:12) Cognito

(3:20:41) CLI & SDK

(3:30:00) DNS

(3:45:07) Route 53

3:56:12) EC2

(4:04:49) EC2 Pricing

(4:13:46) AMI

(4:23:36) Autoscaling Groups

(4:35:28) ELB

(5:49:50) EFS

(6:02:27) EBS

(6:21:02) CloudFront

(7:00:11) RDS

(7:06:56) Aurora

(7:23:54) DynamoDB

(7:31:40) CloudFormation

(7:51:56) CloudWatch

(8:06:30) CloudTrail

(8:18:16) Lambda

(8:28:30) SQS

(8:37:01) SNS

(8:42:21) ElastiCache

(9:02:49) Elastic Beanstalk

(9:12:41) API Gateway

(9:20:26) Kinesis

(9:28:52) Storage Gateway
 
AWS AppSync Tutorial - GraphQL APIs with AppSync, Amplify and Angular

1 hour 34 minutes



AWS AppSync Tutorial - ** Prerequisites **
1. AWS Account
2. Configure AWS Amplify CLI
Follow the below link to create an AWS account and configure Amplify CLI

** Here are the timestamps **
(00:00) Introduction to GraphQL APIs with AppSync, Amplify and Angular
(26:19) Modeling Relationships (1:1 | 1:N | M:N)
(57:01) How to send real-time updates with GraphQL subscriptions
(1:06:20) Let's Build an Offline Web AppGraphQL APIs with AppSync, Amplify and Angular
 
CompTIA Security+ Full Course



Introduction to Network Devices (part 1) (0:00)

Introduction to Network Devices (part 2) (8:06)

Introduction to Network Devices (part 3) (15"50)

Secure Network Administration Concepts (34:00)

Cloud Concepts (41:00)

Secure Network Design Elements and Components (48:00)

Common Network Protocols (part 1) (55:20)

Common Network Protocols (part 2) (1:01:00)

Common Network Protocols (part 3) (1:08:00)

Wireless Security Considerations (1:13:54)

Risk Related Concepts (part 1) (1:23:12)

Risk Related Concepts (part 2) (1:29:43)

Risk Related Concepts (part 3) (1:36:08)

Integrating Data and Systems w Third Parties(21:50)

Risk Mitigation Strategies (1:41:27)

Basic Forensic Procedures (1:46:17)

Incident Response Concepts (1:54:15)

Security Related Awareness and Training (1:59:38)

Physical Security and Enviornmental Controls (2:08:03)

Disaster Recovery Concepts (2:15:46)

Risk Management Best Practices (2:23:30)

Goals of Security Controls (2:30:54)

Types of Malware (2:37:02)

A Summary of Types of Attacks (part 1) (2:43:23)

A Summary of Types of Attacks (part 2) (2:52:43)

A Summary of Social Engineering Attacks (2:59:15)

A Summary of Wireless Attacks (3:07:27)

Types of Application Attacks part 1

Types of Application Attacks part 2 (3:10:51)

Security Enhancement Techniques (3:15:33)

Overview of Security Assessment Tools (3:22:21)

Vulnerability Scanning vs Pen Testing (3:30:28)

Application Security Controls and Techniques (3:37:10)

Mobile Security Concepts and Technologies (part 1) (3:45:00)

Mobile Security Concepts and Technologies (part 2)(3:52:00)

Solutions Used to Establish Host Security (3:56:20)

Controls to Ensure Data Security (4:04:00)

Mitigating Risks In Alternative Environments (4:12:00)

Summary of Authentication Services (4:21:20)

Authentication and Authorization Basics (part 1) (4:28:00)

Authentication and Authorization Basics (part 2) (4:35:00)

Security Controls for Account Management

Introduction to Cryptography (part 1) (4:44:00)

Introduction to Cryptography (part 2) (4:52:00)

Cryptographic Methods (part 1) (5:00:00)

Cryptographic Methods (part 2)(5:05:44)

Introduction to Public Key Infrastructure (part 1) (5:13:00)

Introduction to Public Key Infrastructure (part 2) (5:19:00)
 
Azure, Microsoft Azure? Say any idea what the job market is like for Azure?

Not sure. Do some searches on Indeed.com and that will give you an idea of how much companies need folks. I'm in the D.C. area so we get exposed to all of that through government contract work. Azure administrators and architects are probably the most in demand.
 
Back
Top