وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

AWS Certified Developer Associate Training

سرفصل های دوره

In this AWS Developer training, Bart Castle covers the objectives in the DVA-C01 exam, which is the one required exam to earn the AWS Certified Developer - Associate certification.

This training is for developers who have experience with cloud services, but don’t have specific experience with AWS. While there are technically no prerequisites for this AWS developer training, you should know at least one high-level programming language like JavaScript, C, or Python. Since throughout this course you’ll be developing, deploying, and debugging AWS applications, knowing those languages will be necessary.


1. Getting Started with AWS Certified Developer
  • 1. Get Started with AWS Certified Developer
  • 2. Why Get AWS Certified
  • 3. Who Should Take the AWS Certified Developer Exam
  • 4. AWS Certified Developer DVA-C01 Exam Resources
  • 5. Resources to Help You Study

  • 2. Plan for AWS Account Management
  • 1. Global Infrastructure
  • 2. Multiple Accounts
  • 3. Organizations-1
  • 4. Shared Responsibilities
  • 5. Trusted Advisor
  • 6. Service Limits-1
  • 7. APIs and Endpoints
  • 8. CloudTrail API Logging-1
  • 9. Demonstrating CloudTrail
  • plan aws acct mgt.zip

  • 3. Manage Access to AWS Resources
  • 1. Authorization and Authentication at AWS
  • 2. Management Interfaces at AWS
  • 3. Permissions Delegation with Roles
  • 4. Evaluating Permissions at AWS
  • 5. Security Policy Types and Elements-1
  • 6. Amazon Resource Names-1
  • 7. Using Dynamic Security Policy Conditions and Variables
  • 8. Managing Permissions with the Management Console
  • 9. Managing Permissions on the Command Line-1
  • manage aws resource access.zip

  • 4. Work with IAM Security Policies
  • 1. Security Policy Types and Elements-3
  • 2. IAM Policies Managed vs. Inline Policies and Delegation
  • 3. IAM Policies Editing-1
  • 4. IAM Policies Creating-1
  • 5. IAM Policies Advanced Not Elements-1
  • work iam security policies.zip

  • 5. Plan for Advanced Auth Patterns at AWS
  • 1. Demonstrating Multi-Factor Authentication
  • 2. Identity Federation Basics
  • 3. Identity Federation SSO
  • 4. Identity Federation Active Directory

  • 6. Set Up an AWS Development Environment
  • 1. AWS Development Tools and Resources
  • 2. Planning to use the Cloud9 Web IDE
  • 3. Setting up Cloud9 Users and Groups
  • 4. Launching a new Cloud9 Environment
  • 5. Configuring Serverless Application Model Permissions
  • 6. Deploying a SAM Application with Cloud9
  • 7. Running & Updating a SAM Application in Cloud9
  • 8. Debugging and testing a SAM application in Cloud9
  • 9. Installing the AWS Command Line
  • 10. Configuring the AWS Command Line-1
  • 11. Setting up AWS Python Toolkit for PyCharm
  • 12. Configuring the AWS Python Toolkit
  • aws dev Env 01.zip

  • 7. Automate AWS with PowerShell on Linux, Mac, and Windows
  • 1. Skill Introduction
  • 2. Installing PowerShell and the AWS PowerShell Module
  • 3. Setting Up Your AWS IAM User Credentials
  • 4. Installing Non-Monolithic AWS PowerShell Modules
  • 5. Assuming an AWS IAM Role with PowerShell
  • 6. Setting up a Containerized Development Environment
  • 7. Managing Amazon S3 Storage with the AWS PowerShell SDK
  • 9. Call to Action-1

  • 8. Plan for VPC Network Traffic
  • 1. Elastic Network Interface Concepts
  • 2. Working with Elastic Network Interfaces
  • 3. VPCs, SGs, and NACLs
  • 4. Public and Private Subnets
  • 5. Internet Access Checklist
  • 6. Internal VPC Traffic Flow
  • 7. VPC External Traffic Flows
  • aws vpc network traffic.zip

  • 9. Plan for Protective Controls at AWS
  • 1. Protective Controls-1
  • 2. Three-Tier Web Application-1
  • 3. Security Group Rules Three-Tier Web Application
  • 4. Security Group Rules Admin JumpBox-1
  • 5. EC2-Based Network Security Tools
  • 6. Single VPC Network Traffic Filtering
  • 7. Multi-VPC and Multi-Account Traffic Filtering
  • aws plan protective controls.zip

  • 10. Plan for AWS Workload Compute Design
  • 1. Introduction to AWS Workload Compute Design
  • 2. Security Considerations for AWS Compute
  • 3. Pricing for AWS Compute Services-1
  • 4. Performance Considerations for AWS Compute Services
  • 5. Scalability for AWS Compute Services
  • 6. High Availability for AWS Compute Services

  • 11. Migrate Wordpress to EC2 and RDS
  • 1. AWS LAMP Solution using EC2 and RDS-1
  • 2. Planning for Migration-1
  • 3. Launching and Preparing LAMP EC2 Instances
  • 4. Launching the RDS Instance into a Subnet Group
  • 5. Configuring and Testing MySQL User and Database
  • 6. Installing and Testing a Basic Wordpress Site
  • 7. Generating Filesystem and Database Backups
  • 8. Migrating and Testing Wordpress-1
  • mig wp ec2 rds.zip

  • 12. Design for Web-Scale Application Patterns
  • 1. Designing for Web-Scale Architecture
  • 2. Managing DNS Domains with Route53
  • 3. Offload Static Assets to S3
  • 4. Managing Updates using BlueGreen Deployment
  • 5. Designing for Content Caching and Distribution
  • 6. Content Distribution with CloudFront
  • dsgn webscl app pttrn.zip

  • 13. Design for Dynamic EC2 Workloads
  • 1. Planning for Changes and Events
  • 2. Monitoring Instance Health and State
  • 3. EC2 Auto Recovery of Instances
  • 4. CPU Credit Bursting with T-Series Instances
  • 5. Load Balancing Options at AWS
  • 6. Application Load Balancer and TargetGroups
  • 7. EC2 Manual Scale-Out Behind Application Load Balancer
  • desgn dyn ec2 worklds.zip

  • 14. Design for EC2 Automated Scaling
  • 1. Evolution of Web Applications Leads to Scaling
  • 2. Auto Scaling Group Components-1
  • 3. EC2 Launch Configurations-1
  • 4. EC2 Scaling Group-1
  • 5. Manual Scaling with Desired Capacity-1
  • 6. Auto Scaling Policy-1
  • 7. Simplifying Administration with Elastic Beanstalk
  • design ec2 auto scale.zip

  • 15. Plan for Data Storage Security at AWS
  • 1. AWS Data Security
  • 2. AWS Storage Services
  • 3. DynamoDB Data Security Overview
  • 4. DynamoDB Server-Side Encryption
  • 5. DynamoDB Server-Side Encryption Using the Command Line
  • 6. RDS Basic Security Settings
  • 7. RDS Advanced Security Settings
  • 8. RDS Final Settings and Launch-1
  • aws data stor sec.zip

  • 16. Plan for EC2 Storage Security
  • 1. EC2 Storage Security Overview-1
  • 2. EBS Encryption Operations-1
  • 3. EBS Encryption New Instance and Volume-1
  • 4. EBS Encryption New Instance and Volume CLI Preparation
  • 5. EBS Encryption New Instance and Volume CLI Launch Test
  • 6. EBS Encryption Snapshots-1
  • aws-ec2 storage sec.zip

  • 17. Aggregate Log files in Amazon S3
  • 1. Centralizing Log Aggregation to S3-1
  • 2. Logging to S3 from Elastic Beanstalk-1
  • 3. Logging Directly to S3 and Configuring Permissions
  • 4. S3 Copy and Sync from an EC2 Instance-1
  • 5. S3 Sync from a Remote Azure Instance-1
  • 6. CloudWatch Logs Group and Permissions-1
  • 7. Installing the CloudWatch Agent-1
  • 8. Configuring the CloudWatch Agent-1
  • 9. Using Lambda to Ship Log Group Events to S3

  • 18. Plan for S3 Integrity and Availability Data Security
  • 1. S3 Integrity and Availability
  • 2. S3 Lifecycle Policies
  • 3. S3 Bucket Replication
  • 4. S3 Replication Destination Bucket
  • 5. S3 Replication Source Bucket
  • 6. Glacier Vaults and Vault Lock Policies
  • aws s3 intg avail.zip

  • 19. Plan for S3 Confidentiality Data Security
  • 1. S3 Confidentiality
  • 2. S3 Client-Side Encryption
  • 3. S3 Server-Side Encryption Client Key
  • 4. S3 Server-Side Encryption S3 Keys
  • 5. S3 Server-Side Encryption KMS Keys
  • 6. S3 Public Access Account Restrictions
  • aws s3 confidentiality.zip

  • 20. Choose a Datastore at AWS
  • 1. Choosing a Datastore at AWS
  • 2. Designing for Data and Workload Characteristics
  • 3. Planning for Relational Normalized Data
  • 4. Designing for Key-Value & NoSQL Datastores
  • 5. Searching and Documenting Databases
  • 6. Low Latency with In-Memory Data-1
  • 7. Relationships and the Graphing Datastore
  • 8. Time-Series and Ledger Datastores
  • datastore aws.zip

  • 21. Design for Amazon DynamoDB
  • 1. Knowing When to Choose NoSQL-1
  • 2. Understanding DynamoDB-1
  • 3. Securing DynamoDB Administration
  • 4. Planning for Fine-Grained Access Control
  • 5. Planning for Durability and Availability-1
  • 6. Calculating Read Capacity Units-1
  • 7. Calculating Write Capacity Units-1
  • design aws dynamo db.zip

  • 22. Data Storage with Amazon DynamoDB
  • 1. Creating Tables with the Management Console
  • 2. Creating Tables with the Command Line
  • 3. Putting and Updating Items-1
  • 4. Retrieving an Item with get-item-1
  • 5. Working with Read Consistency-1
  • 6. Scanning and Querying a DynamoDB table
  • 7. Querying and Scanning with the Command Line
  • data storage aws dynamoDB.zip

  • 23. Performance Design for DynamoDB
  • 1. Planning for Partitioning and Performance
  • 2. Planning for Secondary Indexes-1
  • 3. Planning for Batch-Write Operations-1
  • 4. Using batch-get-item on the Command Line
  • 5. Planning for Batch-Retrieve Operations-1
  • 6. Using batch-write-item on the Command Line
  • 7. Planning for Large Items-1
  • 8. Managing Time-Series Items-1
  • 9. Planning for Streaming Table Events-1
  • 10. Retrieving Stream Records on the Command Line
  • 11. Automating Record Processing with Lambda
  • 12. Designing for Throughput Modes-1
  • performance design DDB 02.zip

  • 24. Plan for Data Encryption at AWS
  • 1. Data Encryption Basics-1
  • 2. Data Encryption Resources-1
  • 3. KMS Keys Types-1
  • 4. KMS Keys Rotation-1
  • 5. Hardware Security Modules-1
  • 6. HSM Options-1
  • 7. KMS Disable and Delete Unlabeled Keys-1
  • 8. KMS Disable and Delete CloudTrail Logs-1
  • aws data encryption.zip

  • 25. Plan for Messaging at AWS
  • 1. Messaging for Distributed Applications-1
  • 2. Synchronous Messaging Problems-1
  • 3. Asynchronous Messaging Solutions
  • 4. Planning for Queuing SQS Producers-1
  • 5. Planning for Queuing SQS Queues
  • 6. Planning for Queuing SQS Consumers-1
  • 7. Planning for Push Messaging SNS Topics
  • 8. Planning for Push Messaging SNS Subscriptions
  • 9. Open Source and Streaming Messaging Options
  • aws messaging.zip

  • 26. Service-To-Service Messaging with SNS and SQS
  • 1. Serverless Messaging with SNS and SQS
  • 2. Plan for SNS to SQS Message Relay
  • 3. Creating the SNS Topic
  • 4. Creating SQS Queue
  • 5. Configuring Queue as an SNS Subscriber
  • 6. Subscriber Message Filtering
  • 7. Testing Relay Messages and Configuring an Alarm

  • 27. API Gateway Service Proxy to SNS Messaging
  • 1. API Gateway as an AWS Service Proxy
  • 2. Planning for API Gateway Service Proxy
  • 3. Creating API Gateway Resources
  • 4. Creating API Resource Methods
  • 5. Configuring Method Request Integration
  • 6. Configuring Method Response Integration
  • 7. REST API Testing with Postman and Friends

  • 28. Plan for Deployment Management
  • 1. Deployment Management Overview
  • 2. Deployment Management EC2-1
  • 3. Deployment Management CloudFormation
  • 4. Deployment Management OpsWorks-1
  • 5. Deployment Management Elastic Beanstalk-1
  • aws deployment mgt.zip

  • 29. Manage Resources with AWS CloudFormation
  • 1. Managing Resources with CloudFormation
  • 2. How Does Infrastructure as Code Help
  • 3. CloudFormation Template Anatomy
  • 4. Creating a Basic S3 Bucket Resource
  • 5. Making Updates and Detecting Change Drift
  • 6. Using Parameters to Provide Input
  • 7. Looking Up Values in a Mappings Table
  • 8. Controlling Resource-Creation Ordering
  • 9. Creating Template Outputs-1
  • mng res cldform.zip

  • 30. Nesting CloudFormation Templates
  • 1. Nesting CloudFormation Templates-1
  • 2. Designing for Nested Templates-1
  • 3. CloudFormation Stack Resource-1
  • 4. Passing Values with Parameters and Outputs
  • 5. Using the Join & Substitute Instrinsic Functions
  • 6. Validating CloudFormation Templates-1
  • 7. Checking your Work with cfn-lint-1
  • nest cldform templ.zip

  • 31. Perform Simple BlueGreen Updates on EC2 Web Apps
  • 1. Getting Excited about Blue Green Update Patterns
  • 2. EC2 Elastic IP Lab Setup
  • 3. Deploying an Update with EC2 User Data
  • 4. Re-Associating Elastic IP Transition
  • 5. Route53 DNS Re-Target Lab Setup
  • 6. DNS Record Set UPSERT Transition
  • prfm smpl blgr updt wbapp.zip

  • 32. Perform BlueGreen Updates on Load Balanced EC2 Web Apps
  • 1. Load Balancer Lab Setup
  • 2. Registering and Deregistering Instance Updates
  • 3. Auto Scaling Target Group Setup
  • 4. Using ASG Scale Out and Scale In for Updates
  • 5. ALB Listener Rule Target Group Setup
  • 6. Updating ALB Listener Rule
  • prfm blgr updts ld bl wbapps.zip

  • 33. Plan for DevOps CICD Pipelines at AWS
  • 1. Continuous Integration and Delivery at AWS
  • 2. Coding and Developing at AWS-1
  • 3. CodeCommit Provides Source Control
  • 4. Building and Testing Code with CodeBuild
  • 5. CICD Orchestration with CodePipeline
  • 6. CodeDeploy for Hybrid Delivery-1
  • 7. X-Ray Tracing Provides Operations Visibility
  • desgn devops cicd aws.zip

  • 34. Understand the AWS Lambda Service
  • 1. Introduction to AWS Lambda
  • 2. Understanding AWS Lambda Pricing-1
  • 3. Security for AWS Lambda-1
  • 4. Exploring the AWS Lambda Console-1
  • 5. Integrating AWS Lambda with Other AWS Services
  • 6. Call to Action-1

  • 35. Getting Started with AWS Fargate
  • 1. Introduction to AWS Fargate-1
  • 2. Creating an AWS Fargate Cluster-1
  • 3. Creating an ECS Task Definition and Deploy a Task
  • 4. Developing and Deploying a Custom Container Image from ECR
  • 5. Deploying a Service Behind a Network Load Balancer

  • 36. Deploying Services on Amazon Elastic Container Service (ECS)
  • 1. Introduction to Amazon Elastic Container Service (ECS)
  • 2. Fundamental Components of Amazon ECS
  • 3. Building a Linux Cluster on Amazon ECS
  • 4. Creating an ECS Task Definition and Deploying an NGINX Task
  • 5. Attaching Persistent EFS Storage to a Task
  • 6. Deploying an Amazon ECS Task on Microsoft Windows Server
  • 7. Deploying an ECS Cluster with Microsoft Windows Server

  • 37. Orchestrate Your Cloud Applications with AWS Step Functions
  • 1. Introduction to AWS Step Functions
  • 2. Creating Your First Step Functions State Machine
  • 3. Integrating AWS Step Functions with Fargate Tasks
  • 4. Calling AWS Lambda from Step Functions
  • 5. Invoking Step Functions Workflows from Other Workflows
  • 6. Scheduling Step Functions Workflows from Amazon CloudWatch
  • 7. Implementing Step Functions Activities with the AWS SDK for PowerShell

  • 38. Getting Started with AWS Serverless Application Model
  • 1. Getting Started with Serverless Application Model
  • 2. Why use the AWS Serverless Application Model
  • 3. Installing and Validating SAM Command Line
  • 4. Initializing a Node.js SAM Project Template
  • 5. Building and Deploying SAM Applications
  • 6. Testing SAM Applications

  • 39. Working with Lambda Functions Using SAM
  • 1. Working with Lambda Functions using SAM
  • 2. Initialize the Lambda Calculator Function
  • 3. Local Function Testing using SAM
  • 4. Deploying and Working with Lambda Logs
  • 5. S3 Bucket Resource with SAM Template
  • 6. Writing Lambda function output to S3
  • 7. S3 Calculator Function Results Testing

  • 40. Working with API Gateway using SAM
  • 1. Working with API Gateway using SAM-1
  • 2. Creating the API Gateway Resource-1
  • 3. Understanding the Calculator API project
  • 4. Defining the API using OpenAPI-1
  • 5. Building and Deploying Calculator API
  • 6. Configuring Lambda Event Permissions
  • 7. Remote API Endpoint Testing with Postman

  • 41. Gradually Deploying Applications using SAM
  • 1. Gradual Deployments using SAM
  • 2. Planning for SAM Gradual and Canary Deployments
  • 3. Configuring SAM Lambda Alias Auto-Publish
  • 4. Updating API Gateway Target ARN
  • 5. Configuring Postman for Automated Testing
  • 6. Configuring SAM Lambda Deployment Preferences
  • 7. Deploying and Validating Lambda Canary Update
  • 8. API Gateway Update Deployment Options
  • 9. Deploying and Validating API Gateway Canary Update

  • 42. Plan for Monitoring at AWS
  • 1. Handling Monitoring
  • 2. Choosing the Best Metrics for Monitoring-1
  • 3. Metric Timing, Thresholds, and Storage
  • 4. Working with Service Status Notifications-1
  • 5. Privilege Escalation Gateway Model
  • 6. Monitoring Root Account Use
  • 7. Global Login Activity Notification-1
  • 8. Monitoring Service Level Limits
  • 9. Landing Zone and AWS Control Tower
  • aws monitor planning.zip

  • 43. Monitor with AWS CloudWatch
  • 1. Monitoring with AWS CloudWatch-1
  • 2. Working with CloudWatch Dashboards-1
  • 3. Anatomy of a CloudWatch Metric-1
  • 4. Working with CloudWatch Integrated Metrics-1
  • 5. Choosing the Right Metric-1
  • 6. Preparing to use a Custom Metric-1
  • 7. Deploying a Custom Metrics Script-1
  • 8. Working with CloudWatch Alarms-1
  • aws monitor cloudwatch.zip

  • 44. Plan for Logging at AWS
  • 1. Key Areas of Logging Design-1
  • 2. Planning the Scope of a Logging Solution-1
  • 3. Key AWS Operational Log Files-1
  • 4. Key AWS Networking, Application, and Datastore Logs
  • 5. Installing CloudWatch Agent-1
  • 6. Configuring the CloudWatch Agent-1
  • 7. Working with Log Groups, Log Streams, and Events
  • 8. Analyzing Log Group Data in the Management Console
  • 9. AWS Centralized Logging Solution-1
  • 10. Log Storage and Lifecycle-1
  • 11. Processing and Visualizing Log Data-1
  • aws security plan logging.zip

  • 45. Plan for Denial-Of-Service (DoS) Security
  • 1. Denial of Service Attacks and OSI Layers
  • 2. DDoS Infrastructure Attacks-1
  • 3. DDoS Application Attacks-1
  • 4. AWS Shield Standard-1
  • 5. AWS Shield Advanced-1
  • 6. Reducing your Attack Vector-1
  • 7. Scaling to Absorb-1
  • 8. Understanding Normal Behavior and Anomalies
  • aws ddos.zip

  • 46. Filter Traffic with AWS Web Application Firewall
  • 1. AWS WAF Understanding the Benefits
  • 2. AWS WAF Basics and Access Control Lists
  • 3. AWS WAF Rule Conditions
  • 4. Firewall Manager Service Initial Setup
  • 5. Firewall Manager Service Security Policies

  • 47. Apply the AWS Well-Architected Framework
  • 1. Answering Tough Design Questions
  • 2. Operational Excellence Best Practices
  • 3. Applying Operational Excellence Design
  • 4. Security Best Practices-1
  • 5. Applying Security Design
  • 6. Identifying Reliability Limits
  • 7. Reliability Best Practices
  • 8. Asking the Right Reliability Questions
  • 9. Performance Efficiency Best Practices
  • 10. Applying Performance Efficiency Design
  • 11. Cost Optimization Best Practices
  • 12. Applying Cost Optimization Design
  • aws well arch framework.zip

  • 48. Prepare for the AWS Certified Developer Exam
  • 1. Are You Ready to Take the Exam
  • 2. Deployment Domain Review-1
  • 3. Security Domain Review-1
  • 4. Developing on AWS Domain Review
  • 5. Refactoring Domain Review-1
  • 6. Monitoring and Troubleshooting Domain Review
  • 7. Suggested Final Exam Prep Timeline
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 12183
    حجم: 13545 مگابایت
    مدت زمان: 2424 دقیقه
    تاریخ انتشار: 28 اردیبهشت 1402
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید