Advanced Architecting on AWS - CLS Learn

Advanced Architecting on AWS

Learn how to solve architectural design problems from an expert AWS instructor.

Course Overivew

In this course, you will build on concepts introduced in Architecting on AWS. You will learn how to build complex solutions that incorporate data services, governance, and security on the AWS platform. You will also learn about specialized AWS services, including AWS Direct Connect and AWS Storage Gateway, that support hybrid architecture, and you will learn about best practices for building scalable, elastic, secure, and highly available applications on AWS.
In this course, each module presents a scenario with an architectural challenge to be solved.
You will examine available AWS services and features as solutions to the problem.
You will gain insights by participating in problem-based discussions and learning about the AWS services that you could apply to meet the challenges.
Over 3 days, the course goes beyond the basics of a cloud infrastructure and covers topics to meet a variety of needs for AWS customers.
Course modules focus on managing multiple AWS accounts, hybrid connectivity and devices, networking with a focus on AWS Transit Gateway connectivity, container services, automation tools for continuous integration/continuous delivery (CI/CD), security and distributed denial of service (DDoS) protection, data lakes and data stores, edge services, migration options, and managing costs.
The course concludes by presenting you with scenarios and challenging you to identify the best solutions.
This course includes presentations, group discussions, use cases, videos, assessments, and hands-on labs.

Read More
Read Less
Course Benefits:

Module 1: Reviewing Architecting Concepts

  • Group Exercise: Review Architecting on AWS core best practices
  • Lab 1: Securing Amazon S3 VPC Endpoint Communications

Module 2: Single to Multiple Accounts

  • AWS Organizations for multi-account access and permissions
  • AWS SSO to simplify access and authentication across AWS accounts and third-party services
  • AWS Control Tower
  • Permissions, access, and authentication

Module 3: Hybrid Connectivity

  • AWS Client VPN authentication and control
  • AWS Site-to-Site VPN
  • AWS Direct Connect for hybrid public and private connections
  • Increasing bandwidth and reducing cost
  • Basic, high, and maximum resiliency
  • Amazon Route 53 Resolver DNS resolution

Module 4: Specialized Infrastructure

  • AWS Storage Gateway solutions
  • On-demand VMware Cloud on AWS
  • Extending cloud infrastructure services with AWS Outposts
  • AWS Local Zones for latency-sensitive workloads
  • Your 5G network with and without AWS Wavelength

Module 5: Connecting Networks

  • Simplifying private subnet connections
  • VPC isolation with a shared services VPC
  • Transit Gateway Network Manager and VPC Reachability Analyzer
  • AWS Resource Access Manager
  • AWS PrivateLink and endpoint services
  • Lab 2: Configuring Transit Gateways

Module 6: Containers

  • Container solutions compared to virtual machines
  • Docker benefits, components, solutions architecture, and versioning
  • Container hosting on AWS to reduce cost
  • Managed container services: Amazon Elastic Container Service (Amazon ECS) and Amazon Elastic Kubernetes Service (Amazon EKS)
  • AWS Fargate
  • Lab 3: Deploying an Application with Amazon EKS on Fargate

Module 7: Continuous Integration/Continuous Delivery (CI/CD)

  • CI/CD solutions and impact
  • CI/CD automation with AWS CodePipeline
  • Deployment models
  • AWS CloudFormation StackSets to improve deployment management

Module 8: High Availability and DDoS Protection

  • Common DDoS attacks layers
  • AWS WAF
  • AWS WAF web access control lists (ACLs), real-time metrics, logs, and security automation
  • AWS Shield Advanced services and AWS DDoS Response Team (DRT) services
  • AWS Network Firewall and AWS Firewall Manager to protect accounts at scale

Module 9: Securing Data

  • What cryptography is, why you would use it, and how to use it
  • AWS KMS
  • AWS CloudHSM architecture
  • FIPS 140-2 Level 2 and Level 3 encryption
  • Secrets Manager

Module 10: Large-Scale Data Stores

  • Amazon S3 data storage management including storage class, inventory, metrics, and policies
  • Data lake vs. data warehouse: Differences, benefits, and examples
  • AWS Lake Formation solutions, security, and control
  • Lab 4: Setting Up a Data Lake with Lake Formation

Module 11: Large-Scale Applications

  • What edge services are and why you would use them
  • Improve performance and mitigate risk with Amazon CloudFront
  • Lambda@Edge
  • AWS Global Accelerator: IP addresses, intelligent traffic distribution, and health checks
  • Lab 5: Migrating an On-Premises NFS Share Using AWS DataSync and Storage Gateway

Module 12: Optimizing Cost

  • On-premises and cloud acquisition/deprecation cycles
  • Cloud cost management tools including reporting, control, and tagging
  • Examples and analysis of the five pillars of cost optimization

Module 13: Migrating Workloads

  • Business drivers and the process for migration
  • Successful customer practices
  • The 7 Rs to migrate and modernize
  • Migration tools and services from AWS
  • Migrating databases and large data stores
  • AWS Schema Conversion Tool (AWS SCT)

Module 14: Capstone Project

  • Review the AWS Well-Architected Framework to ensure understanding of best cloud design practices by responding to poll questions while following a graphic presentation
  • Demonstrate the ability to secure Amazon Simple Storage Service (Amazon S3) virtual private cloud (VPC) endpoint connections in a lab environment
  • Identify how to implement centralized permissions management and reduce risk using AWS Organizations organizational units (OUs) and service control policies (SCPs) with AWS Single SignOn
  • Compare the permissions management capabilities of OUs, SCPs, and AWS SSO with and without AWS Control Tower to determine best practices based on use cases
  • Discuss AWS hybrid network designs to address traffic increases and streamline remote work while ensuring FIPS 140-2 Level 2, or Level 3 security compliance
  • Explore the solutions and products available to design a hybrid infrastructure, including access to
  • 5G networks, to optimize service and reduce latency while maintaining high security for critical on premises applications
  • Explore ways to simplify the connection configurations between applications and high performance workloads across global networks
  • Demonstrate the ability to configure a transit gateway in a lab environment
  • Identify and discuss container solutions and define container management options
  • Build and test a container in a lab environment
  • Examine how the AWS developer tools optimize the CI/CD pipeline with updates based on nearreal-time data
  • Identify the anomaly detection and protection services that AWS offers to defend against DDoS attacks
  • Identify ways to secure data in transit, at rest, and in use with AWS Key Management Service (AWS KMS) and AWS Secrets Manager
  • Determine the best data management solution based on frequency of access, and data query and analysis needs
  • Set up a data lake and examine the advantages of this type of storage configuration to crawl and query data in a lab environment
  • Identify solutions to optimize edge services to eliminate latency, reduce inefficiencies, and mitigate risks
  • Identify the components used to automate the scaling of global applications using geolocation and traffic control
  • Deploy and activate an AWS Storage Gateway file gateway and AWS DataSync in a lab environment
  • Review AWS cost management tools to optimize costs while ensuring speed and performance
  • Review migration tools, services, and processes that AWS provides to implement effective cloud operation models based on use cases and business needs
  • Provide evidence of your ability to apply the technical knowledge and experience gained in the course to improve business practices by completing a Capstone Project

This course is intended for cloud architects, solutions architects, and anyone who designs solutions for cloud infrastructures.

Download
Course
Brochure

Prerequisites

This course is available at :

Classroom Training

Cairo
Giza
Onsite

Online Training

Virtual Interactive Instructor LED
Self-Paced Training

WHY CHOOSE CLS

Experience

We have been in the market since 1995, and we kept accumulating experience in the training business, and providing training for more than 100,000 trainees ever since, in Egypt, and the MENA region.

Premium Facilities

CLS facilities are well-equipped with strong hardware and software technologies that aid both students and trainers lead very effective smooth training programs.

Customer Support

We provide our clients with the best solutions, customized to their specific needs and goals. Our team is highly qualified to answer whatever questions you have.

Global Accredited

CLS is an authorized and accredited partner by technology leaders. This means that our training programs are of the highest quality source materials.

Up To Date

We keep tabs on every change in the market and the technology field, so our training programs will always be updated up to the World-class latest standards, and adapted to the global shape-shifting job market.

Certified Instructors

We select the best instructors, who are certified from trustworthy international vendors. They share their professional experience with the Trainees, so they can have a clear hands-on experience.

Over 200,000 Gradutes From CLS

Play Video
Amr Mostafa
An employee of the Security Department at the Ministry of Electricity

I`m attending now CEH Training with Eng Mohamed Hamdy ,CISSP Training with Eng Mohamed Gohar, I really learned a lot from him , everything here in CLS  is very satisfying including facilities .

Play Video
Lamiaa Medhat
CIO

We took a series of courses as the digital Transformation Unit of the ministry . we just finished CRISC Certification Training with DR Adel Abdel Meneim . Thank you CLS for all your efforts, we really appreciate it

Play Video
Ahmed Salah
Senior Cyber Security Engineer

Me and my colleagues are working in a government Organization, We took a no. of cyber security trainings with CLS starting with CEH and CISSP. we liked every thing the instructors, the stuff and whole environment

Play Video
Ferras Hassan
Head of the Programming Department at Bashayer Energy Company

I`m attending ASP.NET Core with MVC Training with Eng Mohamed Hesham , I really learned a lot from him , everything here in CLS  is very satisfying including facilities .Thanks you all team.

Play Video
Mohamed Ahmed Ali
Systems management specialist

Qualifying the cadres of digital transformation units in government agencies moving to the administrative capital .Thanks CLS

Play Video
Zeinab Salah
Software Developer at Bashayer Energy Company

I`m attending ASP.NET Core with MVC Training with Eng Mohamed Hesham , I really learned a lot from him , everything here in CLS  is very satisfying including facilities .Thanks you all team.

Play Video
Ibrahim Khalaf
IT Infrastructure and Security Manger

I`m attending now CRISC Training with DR Adel Abdel Meneim , I really learned a lot from him , everything here in CLS  is very satisfying including facilities , locations and the team.

Play Video
Samar Shams ElDin
Programmer at Bashayer Energy Company

I`m attending ASP.NET Core with MVC Training with Eng Mohamed Hesham , I really learned a lot from him , everything here in CLS  is very satisfying including facilities .Thanks you all team.

Student Application For

Advanced Architecting on AWS
Full Name *
Email *
Phone *
Full Phone
Training Location *
Additional Request

Business Application For

Advanced Architecting on AWS
Full Name *
Company Name *
Job Title *
Number of Employees
Email *
Phone *
Full Phone
Training Location *
Additional Request