Introduction
Why Should I Learn and Get Certified with AWS
Cafe Business Case Introduction
Roles in Cloud Computingn
Introducing Cloud Architecting
The AWS Well Architected Framework
Best Practices for Building Solutions on AWS
AWS Global Infrastructure
Launch our First Ec2 Instance Part-1 Practical-Lab
Launch our First Ec2 Instance Part-2 Practical-Lab
Security Group – Practical-Lab
EBS (Introduction)
EBS Volume and Snapshots – Practical-Lab
AMI Types (EBS bs Instance Store)
ENI vs ENA vs EFA (New)
Encrypted Root Device Volume and snapshot Practical-Lab
Spot Instance and Spot Fleets (New)
Ec2 hibernate (New)
CloudWatch (Introduction)
CloudWatch- Practical-Lab
AWS Command Line (CLI)- Practical-Lab
Identity and Access Management Roles - Practical-Lab
Using bootstrap Scripts- Practical-Lab
Instance Metadata – Practical-Lab
EFS -Lab (New)
Amazon FSX for windows and Amazon FSX for Lustre (New)
Ec2 Placement Group
HPC on AWS (New)
S3 (Introduction)
Create an S3 Bucket - Practical-Lab
S3 Pricing Tiers (New)
S3 Security and Encryption
S3 Security and Encryption
S3 Security and Encryption
S3 Versioning - Practical-Lab
Lifecycle Management with S3 - Practical-Lab
S3 Object Lock and Glacier Vault Lock (New)
S3 Performance (New)
S3 Select and Glacier Select (New)
AWS Organizations and Consolidated Billing (New)
Sharing S3 Buckets Across Accounts - Lab (New)
Cross-Region Replication - Practical-Lab
S3 Transfer Acceleration
AWS DataSync (New)
Snowball
Snowball - Practical-Lab
Storage Gateway
Athena vs. Macie (New)
Creating a Static Website Using Amazon S3
Databases (Introduction)
Let's Create Our First RDS Instance - Practical-Lab
RDS: Backups, Multi-AZ, and Read Replicas
RDS: Backups, Multi-AZ, and Read Replicas - Practical-Lab
DynamoDB
Advanced DynamoDB Practical-Lab (New)
Redshift
Aurora (New)
Elasticache
Database Migration Service (DMS) (New)
Caching Strategies on AWS (New)
EMR Overview (New)
Databases Summary
Deploying an Amazon RDS Multi-AZ and Read Replica in AWS
Identity and Access Management (Introduction)
Identity and Access Management - Practical-Lab
Create a Billing Alarm - Practical-Lab
AWS Directory Service (New)
IAM Policies - Practical-Lab (New)
AWS Resource Access Manager (RAM) (New)
AWS Single Sign-on (New)
Advanced IAM Summary (New)
VPC (Introduction)
Create Your Own Custom VPC: Part 1 - Practical-Lab
Create Your Own Custom VPC: Part 2 - Practical-Lab
NAT Instances and NAT Gateways - Practical-Lab
Network Access Control Lists vs. Security Groups - Practical-Lab
Custom VPCs and ELBs - Practical-Lab
VPC Flow Logs - Practical-Lab
Bastions - Practical-Lab
Working with AWS VPC Flow Logs for Network Practical-Lab
Creating a Basic VPC and Associated Components in AWS Practical-Lab
Setting Up Direct Connect (New)
WC Endpoints (New)
Direct Connect
Point to site VPN Connection
Site to Site VPN Connection
AWS Private-Link (New)
AWS Transit Gateway (New)
AWS VPN Cloud-Hub (New)
Elastic Load Balancer (Introduction)
Load Balancers and Health Checks - Practical-Lab
Advanced Load Balancer Theory (New)
Auto-scaling (New)
Launch Configurations and Auto Scaling Groups - Practical-Lab
HA Architecture
Building a Fault-Tolerant WordPress Site: Getting Set Up - Practical-Lab
Building a Fault-Tolerant WordPress Site: Adding Resilience and Auto Scaling
Building a Fault-Tolerant WordPress Site: Cleaning Up - Practical-Lab
Building a Fault-Tolerant WordPress Site: Practical-Lab
Elastic Beanstalk
High Availability with Bastion Hosts (New)
On-Premises Strategies with AWS (New)
CloudFront (Introduction)
Create a CloudFront Distribution - Practical-Lab
CloudFront Signed URLs and Cookies (New)
Global Accelerator (New)
DNS (Introduction)
Register a Domain Name - Practical-Lab
Route 53 Routing Policies Available on AWS
Route 53: Simple Routing Policy - Practical-Lab
Route 53: Weighted Routing Policy - Practical-Lab
Route 53: Latency-Based Policy - Practical-Lab
Route 53: Failover Routing Policy - Practical-Lab
Route 53: Geolocation Routing Policy - Practical-Lab
Route 53: Geo-proximity Routing Policy (Traffic Flow Only)
Route 53. Multi-value Answer Policy - Practical-Lab
SOS (New)
Simple Workflow Service
Simple Notification Service - Practical-Lab
Elastic Transcoder
Kinesis (Introduction) (New)
Web Identity Federation and Cognito
Event Processing Patterns (New)
Applications Summary
Scaling EC2 Using SOS
Reducing Security Threats (New)
Key Management Service (KMS) (New)
Cloud-HSM (New)
Systems Manager Parameter Store (New)
Secrets Manager (New)
AWS Shield (New)
Web Application Firewall (WAF) (New)
Introducing Microservices
Lambda - Practical-Lab
API Gateway - Practical-Lab
Build a Serverless Web Page with API Gateway and Lambda - Practical-Lab
Let's Build a Thumbnail image Generator. - Practical-Lab
Serverless Application Model (SAM) (New)
Building Microservice Applications with AWS Container Services (New)
Elastic Container Service (ECS) Practical-Lab (New)
Planning for Disaster
Planning for Disaster
Part 2: Disaster Planning Strategies
Part 3: Disaster Planning Strategies
Part 1: Disaster Recovery Patterns
Part 2: Disaster Recovery Patterns
Lab - Hybrid Storage and Data Migration with AWS Storage Gateway File Gateway
Identity and Access Management (Introduction)
Identity and Access Management - Practical-Lab
Create a Billing Alarm - Practical-Lab
AWS Directory Service (New)
IAM Policies - Practical-Lab (New)
AWS Resource Access Manager (RAM) (New)
AWS Single Sign-on (New)
Advanced IAM Summary (New)
Identity and Access Management (Introduction)
Identity and Access Management - Practical-Lab
Create a Billing Alarm - Practical-Lab
AWS Directory Service (New)
IAM Policies - Practical-Lab (New)
AWS Resource Access Manager (RAM) (New)
AWS Single Sign-on (New)
Advanced IAM Summary (New)
Identity and Access Management (Introduction)
Identity and Access Management - Practical-Lab
Create a Billing Alarm - Practical-Lab
AWS Directory Service (New)
IAM Policies - Practical-Lab (New)
AWS Resource Access Manager (RAM) (New)
AWS Single Sign-on (New)
Advanced IAM Summary (New)
Introduction to Open Source
Understanding of Operating System
History and the future of Linux
Why Linux is best in compare to Windows
Uses of Linux in latest technologies
RedHat Certifications
Requirement and Introduction of RedHat Certifications
Installation and Understanding of Operating Systeme
Installation By CD, Network or on Virtual Machine
Working with CLI & GUI
Managing Login & Logout in System
Working with Shell in Linux
Working with basic commands ( cd, ls, pwd, history, mkdir, touch, man, pinfo, rm, cp , mv, date, cal, cat, ping )
Creating and managing files using vim editor and gedit editor
Working with Linux File system
Understanding of inode number, inode table and structure
Creating and using Symbolic link ( Soft Link & Hard Link )
User Administration part-1
Understanding of user account and accessing
Creating and managing users ( useradd, usermod, userdel)
User account management by using files (passwd, shadow, group, gshadow)
Creating and managing group ( groupadd, gpasswd, chage, chfn )
User Administration part-2
Understanding of configuration files ( /etc/default/useradd, /etc/login.defs )
Accessing user account using ( su , su – commands )
Managing user account sessions
Monitoring system login ( w, last, lastb, /var/log/secure )
Understanding of Basic Permissions &umask
Numerical & Symbolic Method
Special Permission ( Sticky Bit, SUID, SGID )
Managing user accessibility to the system
Access Control List ( ACL Permissions )
SUDO Permissions
Managing searching using Find , grep, head & tail Commands
Working with I/O Redirection Operator
Archiving and copying files between system using Tar
Understanding and uses of partitions
Advanced file system Management ( ext2, ext3, ext4, xfs )
Creating disk partition using ( fdisk & gdisk )
Working with mkfs, blkid, mount & mount options df and du
Permanent Mounting of partitions ( /etc/fstab )
Creating and using swap & vfat file system
Creating and using Logical Volume Manager (LVM)
Working with pvcreate, vgcreate, lvcreate, pvremove , vgremove, lvremove commands
Managing LVM using lvextend , lvremove, vgremove , pvremove commands
Creating and using lvm snapshot
LVM recovery
Boot Loader & Booting Process of Linux
Understanding of Process
Process management and monitoring
Process life cycle and states
Killing and scheduling process, vmstat, uptime, top, sar
Managing process priority ( nice & renice command )
Understanding and managing of Services
What is Service
System Services, System Target services
Password Crack Mechanism
Cron Job Scheduling using crontab
Analyze Log Messages
Understanding of syslog and rsyslog
Understanding of rsyslog files
/var/log/messages, /var/log/dmesg, /var/log/secure, /var/log/maillog
Journalctl
Understanding and installing of Software
Understanding of RPM packages
Installing software through RPM command
Installing software through YUM command
Installing software through DNF command
Install software from Internet
Managing Networking
Configuring networking via command line(nmcli,nmtui)
Configuring networking with files
Configuring hostname and name resolution
Implementing advanced storage feature
Managing layered storage with stratis
Compressing and deduplicating storage with VDO
Understanding of Server-Client environment
Configuring and using SSH Server
Key based authentication, TCP Wrapper Security
SSH tools like Putty,MobaXterm
Scp & rsync and winSCP tool
Understanding of File System
What is NFS Server
Processes in NFS
Configuring NFS server
Sharing of directory with Multiple Options
Auto mounting network attached storage with autofs
Understanding of Cockpit and Tuned
Tuning System Performance
Adjusting tuning profiles
Influencing process scheduling
Understanding of Virtualization
Creating and using of Virtual Machines
Creating virtual machine on Vmware
Basic understanding of KVM and libvirt
Creating and using Shell Scripting
Output Generation Scripts
Input Generation Scripts
Positional Parameter Scripts
If Else in Scripts
For Loop In Scripts
Creating user environment
Scenario based Examples of Shell Scripting
Comprehensive review and Interview Questions
Introduction to Configuration Management tools
Difference between Ansible, Puppet, Chef and Saltstack
Difference between Configuration Management and Orchestration
Introduction to Ansible and Ansible use cases
Installation and configuration of Ansible
Deployment of Ansible
Introduction and building Ansible Inventory
Managing Ansible configuration files
Running Ad hoc commands
Introduction To:-
File modules: copy,file,lineinfile,blockinfile,synchronize
Software package modules: package,yum,apt,dnf,gem,pip,yum
System modules: firewalld,reboot,service,user,group
Net tools modules: get_url,nmcli,uri
Partition modules: parted,lvol,filesystem,mount,etc
Introduction to YAML
Implementing Playbooks in YAML
Running playbooks in dry and wet run
Implementing multiple plays
Introduction and Ansible variables
Managing Ansible variables
Introduction to Ansible facts
Managing Ansible facts and Ansible custom facts
Introduction to task control
Writing loops and conditional tasks
Implementing handlers
Handling task failure
Troubleshooting of task failure
Introduction to Jinja2 Template
Modifying and Copying files to managed hosts
Deploying custom files with Jinja2 Templates
Managing large projects
Managing dynamic inventories
Introduction to parallelism
Configuration of parallelism
Including and importing files
Introduction to Ansible roles
Importance of roles in production
Creating custom roles
Introduction to Ansible-galaxy
Deploying roles with Ansible-galaxy
Reusing content with system roles
Troubleshooting playbooks
Troubleshooting Ansible managed hosts
Automating Linux administration tasks
Managing software and subscription
Managing users and authentication
Managing the boot process and scheduled process
Managing storage
Scenario based practical assessment
Project based on Industry requirement
Comprehensive review and Interview questions