This comprehensive course on HashiCorp Vault will make you an expert in deploying, configuring, and managing all key Vault services. It covers all objectives for passing the HashiCorp Certified: Vault Associate certification exam. Learn the latest HashiCorp concepts and master the core components to become a HashiCorp Vault expert.
About this Training Course Managed Pressure Drilling (MPD) offers opportunities to improve safety and efficiency in drilling, and it is increasingly recognised by operators and regulators. MPD aims to cost effectively resolve chronic drilling problems that contribute to non-productive time. This 3 full-day course provides participants with an understanding of the MPD techniques and equipment. The course starts with the design requirements for an MPD operation. It covers all MPD methods, including constant bottom hole pressure and mud cap drilling operations. It also includes all of the rig types - both onshore and offshore - and MPD. MPD equipment is presented in detail and the design aspects of the well are also examined. Training Objectives This course aims to provide participants with a good understanding of the various aspects of managed pressure drilling. It also enables participants to gain knowledge of planning MPD operations, type of equipment and the equipment requirements for both onshore and offshore and MPD operations. At the end of the course, participants will be able to: Understand the variations in MPD Design MPD operations for various techniques Understand the engineering requirements of MPD Define MPD equipment requirements Understand operational and well control aspects of MPD Target Audience This course is designed for engineers, managers and service providers who are about to use MPD techniques and are trying to better understand the associated complexities and challenges surrounding MPD. Trainer Your expert course leader was born and raised in Nijmegen, Netherlands. He holds an MSc in Drilling Engineering from The Robert Gordon University in Aberdeen and has over 39 years of oilfield experience. He started in the industry back in 1977 as a Mud logger before becoming a wellsite drilling engineer in 1980 working mainly in the Middle East and West Africa. In 1988, he joined Shell in in the Southern North Sea. In 1995, he joined Smedvig in Norway and worked on a number of deepwater wells as well as on underbalanced drilling operations. In 1999, he started Leading Edge Advantage in Aberdeen and worked in coiled tubing, underbalanced and managed pressure drilling. In 2004, he joined Weatherford as Regional Engineering Manager in Singapore and developed the first ultra deepwater MPD systems. In 2010, he joined SPT Group specializing in well control and hydraulics modelling. SPT Group was later acquired by Schlumberger in 2012. At Schlumberger, he was Drilling Adviser, with a focus on well control, relief well planning and MPD. During that time, he was also an instructor for NExT teaching numerous well engineering courses. In 2015, he joined Wild Well as Engineering Manager in Asia and in February 2017, he became an independent consultant concentrating on provision of drilling engineering training. He has written and presented numerous papers and authored several chapters in the SPE Advanced Technology books. He is an active committee member and speaker on numerous SPE Workshops around the world. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
ITIL® 4 Specialist: Create, Deliver and Support: In-House Training The ITIL® 4 Specialist: Create, Deliver, and Support module is part of the Managing Professional stream for ITIL® 4. Candidates need to pass the related certification exam for working towards the Managing Professional (MP) designation. This course is based on the ITIL® 4 Specialist: Create, Deliver, and Support exam specifications from AXELOS. With the help of ITIL® 4 concepts and terminology, exercises, and examples included in the course, candidates acquire the relevant knowledge required to pass the certification exam. What You Will Learn The learning objectives of the course are based on the following learning outcomes of the ITIL® 4 Specialist: Create, Deliver, and Support exam specification: Understand how to plan and build a service value stream to create, deliver, and support services Know how relevant ITIL® practices contribute to the creation, delivery, and support across the SVS and value streams Know how to create, deliver, and support services Organization and Culture Organizational Structures Team Culture Continuous Improvement Collaborative Culture Customer-Oriented Mindset Positive Communication Effective Teams Capabilities, Roles, and Competencies Workforce Planning Employee Satisfaction Management Results-Based Measuring and Reporting Information Technology to Create, Deliver, and Support Service Integration and Data Sharing Reporting and Advanced Analytics Collaboration and Workflow Robotic Process Automation Artificial Intelligence and Machine Learning CI / CD Information Model Value Stream Anatomy of a Value Stream Designing a Value Stream Value Stream Mapping Value Stream to Create, Deliver, and Support Services Value Stream for Creation of a New Service Value Stream for User Support Value Stream Model for Restoration of a Live Service Prioritize and Manage Work Managing Queues and Backlogs Shift-Left Approach Prioritizing Work Commercial and Sourcing Considerations Build or Buy Sourcing Models Service Integration and Management
Data comms training course description A hands on training course introducing the concepts of data communications, moving on to covering both LAN and WAN technology. Quizzes are used extensively to ensure material has sunk in and to maximise learning time. Hands on sessions ensure that by the end of the course delegates have made cables, built LANS and WANS, configured TCP/IP, switches and routers. What will you learn Use the seven layer model to classify networking buzzwords. Build and troubleshoot Ethernet, LAN/WAN and WiFi networks Explain the difference between switches and routers. Connect networks with routers. Data comms training course details Who will benefit: Anyone who requires a technical introduction to networks. Prerequisites: None. Duration 3 days Data comms training course contents What are networks? What is data communications? What are networks? Types of network, LANs, LAN choices, WANs, WAN choices, PANs, SANs, MANs, connecting networks. Internetworks, the internet, clouds. Networks and standards Standards bodies, ISO, ITU, IEEE, IETF, OSI 7 layer reference model, TCP/IP and OSI, ping and the 7 layer model, encapsulation, fragmentation. The physical layer Transmission media: Copper, Fibre, RF, UTP, Cat 5/5e/6/7..., RJ45, straight and cross over cables. Coax, Fibre cable & connectors, SFP, MMF, SMF, radio spectrum, frequencies, ranges, noise and electrical distortion, repeaters. Hands on Cabling, ping. Bandwidth Definition, Bits, bytes, speeds, simplex, half/full duplex, a/symmetrical, aggregation, latency. Calculating bandwidth requirements. The Data Link layer Frames, classifications, standards, LAN/WAN layer 2 technologies (Point to point, virtual circuits). Ethernet What is Ethernet? 802.3, evolution from CSMA/CD, choosing cables, topologies, NICs, MAC addresses. Ethernet frame format. Hands on Analysing Ethernet frames. Ethernet switches Connecting multiple devices, switches work at layer 2, Switches vs. hubs, simultaneous conversations, full duplex, MAC address database, how switches work, switch benefits, loops, STP. Console ports. Hands on Switches and WireShark, configuring switches, broadcast storms, STP. VLANS What are VLANs, why have VLANs. Hands on The effect of VLANs on network traffic. Wireless LANs Type of wireless network. WiFi, 802.11b/g/n/ac, WiFi6, antennae, interference, 802.11 frame format, CSMA/CA, half duplex, Wireless Access Points, security. Hands on Building a WiFi network. WANS WAN architecture, WAN types, service providers, access equipment, DTE, DCE, core equipment, WANs and the 7 layer model, choosing a WAN. WAN access Point to point, multi access, Internet, phone lines, leased lines, xDSL, broadband architecture. DOCSIS, FTTH, PON, SD-WAN. Older technologies (if required): Modems, ISDN, 64k, E1, TDM. Packet switched networks Packet switching, virtual circuits, Hub & spoke, partial & full mesh, MPLS, MPLS and routers, Why MPLS? MPLS -TE, MPLS VPN, Internet VPN. Older technologies (if required). Service provider technologies Transport plane, SDH, SONET, WDM, CWDM, DWDM, DWDM architectures, OTN. TCP/IP Definition, protocols, services, internetworking, the Internet, intranets, IAB, RFCs, IP header, IP addressing, subnet masks, IPv6, TCP, UDP. Hands on IP address and subnet mask configuration. Routers What are routers? Routers vs switches, when to route and when to switch, default gateways, routing tables, static routes, routing protocols. Firewalls, how firewalls work. Hands on Router configuration, tracert. Applications Clients, servers, web, HTTP, Email, resource sharing, IM, VoIP, Video over IP, terminal emulation, ftp, ssh. Hands on telnet
Duration 3 Days 18 CPD hours This course is intended for This course is ideal for Professionals preparing to become CRISC certified. Risk practitioners Students or recent graduates Overview At course completions, students will understand the essential concepts in the 4 ISACA CRISC domains: Governance IT Risk Assessment Risk Response and Reporting Information Technology and Security This 3 Day CRISC course is geared towards preparing students to pass the ISACA Certified in Risk and Information Systems Control examination. The course covers all four of the CRISC domains, and each section corresponds directly to the CRISC job practice. CRISC validates your experience in building a well-defined, agile risk-management program, based on best practices to identify, analyze, evaluate, assess, prioritize and respond to risks. This enhances benefits realization and delivers optimal value to stakeholders. GOVERNANCE - a. Organizational Governance Organizational Strategy, Goals, and Objectives Organizational Structure, Roles, and Responsibilities Organizational Culture Policies and Standards Business Processes Organizational Assets GOVERNANCE - b. Risk Governance Enterprise Risk Management and Risk Management Framework Three Lines of Defense Risk Profile Risk Appetite and Risk Tolerance Legal, Regulatory, and Contractual Requirements Professional Ethics of Risk Management IT RISK ASSESSMENT - a. IT Risk Identification Risk Events (e.g., contributing conditions, loss result) Threat Modelling and Threat Landscape Vulnerability and Control Deficiency Analysis (e.g., root cause analysis) Risk Scenario Development IT RISK ASSESSMENT - b. IT Risk Analysis and Evaluation Risk Assessment Concepts, Standards, and Frameworks Risk Register Risk Analysis Methodologies Business Impact Analysis Inherent and Residual Risk RISK RESPONSE AND REPORTING - a. Risk Response Risk Treatment / Risk Response Options Risk and Control Ownership Third-Party Risk Management Issue, Finding, and Exception Management Management of Emerging Risk RISK RESPONSE AND REPORTING - b. Control Design and Implementation Control Types, Standards, and Frameworks Control Design, Selection, and Analysis Control Implementation Control Testing and Effectiveness Evaluation RISK RESPONSE AND REPORTING - c. Risk Monitoring and Reporting Risk Treatment Plans Data Collection, Aggregation, Analysis, and Validation Risk and Control Monitoring Techniques Risk and Control Reporting Techniques (heatmap, scorecards, dashboards) Key Performance Indicators Key Risk Indicators (KRIs) Key Control Indicators (KCIs) INFORMATION TECHNOLOGY AND SECURITY - a. Information Technology Principles Enterprise Architecture IT Operations Management (e.g., change management, IT assets, problems, incidents) Project Management Disaster Recovery Management (DRM) Data Lifecycle Management System Development Life Cycle (SDLC) Emerging Technologies INFORMATION TECHNOLOGY AND SECURITY - b. Information Security Principles Information Security Concepts, Frameworks, and Standards Information Security Awareness Training Business Continuity Management Data Privacy and Data Protection Principles
SS7 training course description An Introduction to Signalling System No 7. Covering the terminology, technology and topology of the Core Signalling System. What will you learn Describe the evolution of SS7. Identify the component parts of SS7. Describe the basic method of operation of SS7. Describe a basic call set-up and clear within SS7. SS7 training course details Who will benefit: Network/Systems engineers Operators/Planners. Prerequisites: Telecommunications Introduction Duration 2 days SS7 training course contents Introduction Digital Signalling, CAS, CAS Applications, CCS, Layer 1, Layer 2 (HDLC), Layer 3, Evolution of SS7, Common SS7 functions. Physical Functionality SS7 Topology, Service Switching Point (SSP), Signalling Transfer Point (STP), Service Control Point (SCP), Database Types, CMSDB, NP, LIDB, HLR, VLR, Signalling Modes, Link Types, Further Redundancy, Linksets, Signalling Routes. Addressing Addressing in SS7, E.164, ANSI PCs, ITU-T (CCITT) PCs, Connecting Networks (ISPs/NSPs). Message Transfer Part SS7 Protocol Stack, MTP Level 1, MTP Level 2, Signalling Units, Flow Control, Fill In Signalling Unit (FISU), Link Status Signalling Unit (LSSU), Message Signalling Unit (MSU), MTP Level 3. Application and User Parts Signalling Connection Control Part (SCCP), Transaction Capabilities Application Part (TCAP), Telephone User Part, BTUP, ISDN User Part (ISUP), ISUP - Supplementary Services, ISUP - Call, Call Set-up over SS7. The Intelligent Network Function of IN, Evolution of IN, Conceptual Model, Target Services and Service Features, Independent Building Blocks.
Duration 3 Days 18 CPD hours This course is intended for This course is intended for security engineers, security architects, and information security professionals. Overview Identify security benefits and responsibilities of using the AWS Cloud Build secure application infrastructures Protect applications and data from common security threats Perform and automate security checks Configure authentication and permissions for applications and resources Monitor AWS resources and respond to incidents Capture and process logs Create and configure automated and repeatable deployments with tools such as AMIs and AWS CloudFormation This course demonstrates how to efficiently use AWS security services to stay secure in the AWS Cloud. The course focuses on the security practices that AWS recommends for enhancing the security of your data and systems in the cloud. The course highlights the security features of AWS key services including compute, storage, networking, and database services. You will also learn how to leverage AWS services and tools for automation, continuous monitoring and logging, and responding to security incidents. Prerequisites We recommend that attendees of this course have: Working knowledge of IT security practices and infrastructure concepts Familiarity with cloud computing concepts Completed AWS Security Essentials and Architecting on AWS courses 1 - Security on AWS Security in the AWS cloud AWS Shared Responsibility Model Incident response overview DevOps with Security Engineering 2 - Identifying Entry Points on AWS Identify the different ways to access the AWS platform Understanding IAM policies IAM Permissions Boundary IAM Access Analyzer Multi-factor authentication AWS CloudTrail 3 - Security Considerations: Web Application Environments Threats in a three-tier architecture Common threats: user access Common threats: data access AWS Trusted Advisor 4 - Application Security Amazon Machine Images Amazon Inspector AWS Systems Manager 5 - Data Security Data protection strategies Encryption on AWS Protecting data at rest with Amazon S3, Amazon RDS, Amazon DynamoDB Protecting archived data with Amazon S3 Glacier Amazon S3 Access Analyzer Amazon S3 Access Points 6 - Securing Network Communications Amazon VPC security considerations Amazon VPC Traffic Mirroring Responding to compromised instances Elastic Load Balancing AWS Certificate Manager 7 - Monitoring and Collecting Logs on AWS Amazon CloudWatch and CloudWatch Logs AWS Config Amazon Macie Amazon VPC Flow Logs Amazon S3 Server Access Logs ELB Access Logs 8 - Processing Logs on AWS Amazon Kinesis Amazon Athena 9 - Security Considerations: Hybrid Environments AWS Site-to-Site and Client VPN connections AWS Direct Connect AWS Transit Gateway 10 - Out-Of-Region Protection Amazon Route 53 AWS WAF Amazon CloudFront AWS Shield AWS Firewall Manager DDoS mitigation on AWS 11 - Security Considerations: Serverless Environments Amazon Cognito Amazon API Gateway AWS Lambda 12 - Threat Detection and Investigation Amazon GuardDuty AWS Security Hub Amazon Detective 13 - Secrets Management on AWS AWS KMS AWS CloudHSM AWS Secrets Manager 14 - Automation and Security by Design AWS CloudFormation AWS Service Catalog 15 - Account Management and Provisioning on AWS AWS Organizations AWS Control Tower AWS SSO AWS Directory Service
Signalling training course description An intensive course that defines and explores the signalling methods that are to be found in today's telecommunications services. What will you learn Describe the Functionality and Features of Signalling. Describe the Functionality of Analogue & Digital Subscriber Signalling. Describe the various types of signalling used on different network types. Describe the Functionality of Private Network Signalling. Describe the Functionality of Public Network Signalling. Signalling training course details Who will benefit: Personnel involved with systems design, implementation and support. Prerequisites: Telecommunications Introduction Duration 2 days Signalling training course contents Introduction What is Signalling?, Standards, ITU-T Recommendations, Signalling Categories - Supervisory Addressing, E.164, Call Information, Network Management, Network Components, Inband/Outband Switch Signalling, Analogue Vs Digital Signalling. Analogue Subscriber Signalling Analogue Local Loops/Switches/Trunks, Digital Switches/Local Loops, Telephone Handset, Accessing the Local Exchange, Pulse/Tone Dialling. Digital Subscriber Signalling Integrated Digital Access, DASS2 & DPNSS, DASS2 - Call, IMUX, Euro ISDN, Q.931 Call Control, Message Identification, Message Types, Call Establishment Messages, Call Clearing. Network Types Service Types, Circuit Switched, Packet Switched, Signalling Terminology, In-Channel Signalling, G.704, Performance and Quality, Digital Signalling, CAS, CAS Applications, Foreign Exchange, CCS, Break-In/Out Private Network Signalling Types Networking PABXs, Inter PABX Analogue Signalling Methods, E & M, Tone-On-Idle, Inter PABX Digital Signalling Methods, DPNSS, DPNSS Deployment, PABX Support for DPNSS, DPNSS Call, Q.Sig, Q.Sig support/functionality/protocol, Message Overview, Call Establishment. Public Network Signalling SS7, SS7 Operations, SS7 Topology, SSP, STP, SCP, Database Types - CMSDB NP LIDB HLR VLR, Signalling Modes, Link Types, Further Redundancy, Linksets, SS7 addressing, Point Codes, Sub-System, Global Title Addressing and Translation, ANSI PCs, ITU-T PCs, SS7 Protocol Stack, MTP Level 1, MTP Level 2, Flow Control, FISU, LSSU, MSU, MSU SIF, MTP Level 3, SCCP, TCAP, TUP, Facility Format, Main Facilities, Flow Control Negotiation, Closed User Groups, Reverse Charging, Fast Select Facility, Throughput Class Negotiation, Call Barring, On-Line Facility Registration. BTUP, ISDN ISUP, Supplementary Services, ISUP Call - IAM, Progress/Answer/Suspend/ Resume/Release Messages, Intelligent Network (IN) Introduction, IN Evolution, IN Conceptual Model, IN Target Services & Service Features, Service Independent Building Blocks
Duration 3 Days 18 CPD hours This course is intended for System administrators and operators who are operating in the AWS Cloud Informational technology workers who want to increase the system operations knowledge. Overview Identify the AWS services that support the different phases of Operational Excellence, an AWS Well-Architected Framework pillar Manage access to AWS resources using AWS accounts and organizations and AWS Identity and Access Management (IAM) Maintain an inventory of in-use AWS resources by using AWS services, such as AWS Systems Manager, AWS CloudTrail, and AWS Config Develop a resource deployment strategy using metadata tags, Amazon Machine Images (AMIs), and AWS Control Tower to deploy and maintain an AWS cloud environment Automate resource deployment by using AWS services, such as AWS CloudFormation and AWS Service Catalog Use AWS services to manage AWS resources through CloudOps lifecycle processes, such as deployments and patches Configure a highly available cloud environment that uses AWS services, such as Amazon Route 53 and Elastic Load Balancing, to route traffic for optimal latency and performance Configure AWS Auto Scaling and Amazon EC2 Auto Scaling to scale out your cloud environment based on demand Use Amazon CloudWatch and associated features, such as alarms, dashboards, and widgets, to monitor your cloud environment Manage permissions and track activity in your cloud environment by using AWS services, such as AWS CloudTrail and AWS Config Deploy your resources to an Amazon Virtual Private Cloud (Amazon VPC), establish necessary connectivity to your Amazon VPC, and protect your resources from disruptions of service State the purpose, benefits, and appropriate use cases for mountable storage in your AWS Cloud environment Explain the operational characteristics of object storage in the AWS Cloud, including Amazon Simple Storage Service (Amazon S3) and Amazon S3 Glacier Build a comprehensive cost model to help gather, optimize, and predict your cloud costs by using services such as AWS Cost Explorer and the AWS Cost & Usage Report This course teaches systems operators and anyone performing cloud operations functions how to manage and operate automatable and repeatable deployments of networks and systems on AWS. You will learn about cloud operations functions, such as installing, configuring, automating, monitoring, securing, maintaining, and troubleshooting these services, networks, and systems. The course also covers specific AWS features, tools, and best practices related to these functions. Prerequisites Successfully completed the AWS Technical Essentials course Background in either software development or systems administration Proficiency in maintaining operating systems at the command line, such as shell scripting in Linux environments or cmd/PowerShell in Windows Basic knowledge of networking protocols (TCP/IP, HTTP) 1 - Introduction to Cloud Operations on AWS What is Cloud Operations AWS Well-Architected Framework AWS Well-Architected Tool 2 - Access Management AWS Identity and Access Management (IAM) Resources, accounts, and AWS Organizations 3 - System Discovery Methods to interact with AWS services Tools for automating resource discovery Inventory with AWS Systems Manager and AWS Config Hands-On Lab: Auditing AWS Resources with AWS Systems Manager and AWS Config 4 - Deploy and Update Resources Cloud Operations in deployments Tagging strategies Deployment using Amazon Machine Images (AMIs) Deployment using AWS Control Tower 5 - Automate Resource Deployment Deployment using AWS CloudFormation Deployment using AWS Service Catalog Hands-On Lab: Infrastructure as Code 6 - Manage Resources AWS Systems Manager Hands-On Lab: Operations as Code 7 - Configure Highly Available Systems Distributing traffic with Elastic Load Balancing Amazon Route 53 8 - Automate Scaling Scaling with AWS Auto Scaling Scaling with Spot Instances Managing licenses with AWS License Manager 9 - Monitor and Maintain System Health Monitoring and maintaining healthy workloads Monitoring AWS infrastructure Monitoring applications Hands-On Lab: Monitor Applications and Infrastructure 10 - Data Security and System Auditing Maintaining a strong identity and access foundation Implementing detection mechanisms Automating incident remediation 11 - Operate Secure and Resilient Networks Building a secure Amazon Virtual Private Cloud (Amazon VPC) Networking beyond the VPC 12 - Mountable Storage Configuring Amazon Elastic Block Store (Amazon EBS) Sizing Amazon EBS volumes for performance Using Amazon EBS snapshots Using Amazon Data Lifecycle Manager to manage your AWS resources Creating backup and data recovery plans Configuring shared file system storage Hands-On Lab: Automating with AWS Backup for Archiving and Recovery 13 - Object Storage Deploying Amazon Simple Storage Service (Amazon S3) Managing storage lifecycles on Amazon S3 14 - Cost Reporting, Alerts, and Optimization Gaining AWS cost awareness Using control mechanisms for cost management Optimizing your AWS spend and usage Hands-On Lab: Capstone lab for CloudOps Additional course details: Nexus Humans Cloud Operations on AWS training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cloud Operations on AWS course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is intended for solutions architects, solution-design engineers, developers seeking an understanding of AWS architecting and individuals seeking the AWS Solutions Architect-Associate certification. Overview Identify AWS architecting basic practices. Explore using the AWS management tools: The AWS Console, Command Line Interface (CLI), and CloudFormation in a lab environment. Examine the enforcement of accounts security using policies. Identify the elements that build an elastic, secure, virtual network that includes private and public subnets. Practice building an AWS core networking infrastructure. Determine strategies for a layered security approach to Virtual Private Cloud (VPC) subnets. Identify strategies to select the appropriate compute resources based on business use-cases. Practice building a VPC and adding an Elastic Cloud Compute (EC2) instance in a lab environment. Practice installing an Amazon Relational Database Service (RDS) instance and an Application Load Balancer (ALB) in the VPC you created. Compare and contrast AWS storage products and services, based on business scenarios. Compare and contrast the different types of AWS database services based on business needs. Practice building a highly available, auto-scaling database layer in a lab. Explore the business value of AWS monitoring solutions. Identify the role of monitoring, event driven load balancing, and auto scaling responses, based on usage and needs. Identify and discuss AWS automation tools that will help you build, maintain and evolve your infrastructure. Discuss network peering, VPC endpoints, gateway and routing solutions based on use-cases. Discuss hybrid networking configurations to extend and secure your infrastructure. Discuss the benefits of microservices as an effective decoupling strategy to power highly available applications at scale. Explore AWS container services for the rapid implementation of an infrastructure-agnostic, portable application environment. Identify the business and security benefits of AWS serverless services based on business examples. Practice building a serverless infrastructure in a lab environment. Discuss the ways in which AWS edge services address latency and security. Practice building a CloudFront deployment with an S3 backend in a lab environment. Explore AWS backup, recovery solutions, and best practices to ensure resiliency and business continuity. Build a highly available and secure cloud architecture based on a business problem, in a project-based facilitator-guided lab. Architecting on AWS is for solutions architects, solution-design engineers, and developers seeking an understanding of AWS architecting. In this course, you will learn to identify services and features to build resilient, secure and highly available IT solutions on the AWS Cloud. Architectural solutions differ depending on industry, types of applications, and business size. AWS Authorized Instructors emphasize best practices using the AWS Well-Architected Framework, and guide you through the process of designing optimal IT solutions, based on real-life scenarios. The modules focus on account security, networking, compute, storage, databases, monitoring, automation, containers, serverless architecture, edge services, and backup and recovery. At the end of the course, you will practice building a solution and apply what you have learned with confidence. Prerequisites AWS Cloud Practitioner Essentials classroom or digital training, or Working knowledge of distributed systems Familiarity with general networking concepts Familiarity with IP addressing Working knowledge of multi-tier architectures Familiarity with cloud computing concepts 0 - Introductions & Course Map review Welcome and course outcomes 1 - Architecting Fundamentals Review AWS Services and Infrastructure Infrastructure Models AWS API Tools Securing your infrastructure The Well-Architected Framework Hands-on lab: Explore Using the AWS API Tools to Deploy an EC2 Instance 2 - Account Security Security Principals Identity and Resource-Based Policies Account Federation Introduction to Managing Multiple Accounts 3 - Networking, Part 1 IP Addressing Amazon Virtual Private Cloud (VPC), Patterns and Quotas Routing Internet Access Network Access Control Lists (NACLs) Security Groups 4 - Compute Amazon Elastic Cloud Compute (EC2) EC2 Instances and Instance Selection High Performance Computing on AWS Lambda and EC2, When to Use Which Hands-On Lab: Build Your Amazon VPC Infrastructure 5 - Storage Amazon S3, Security, Versioning and Storage Classes Shared File Systems Data Migration Tools 6 - Database Services AWS Database Solutions Amazon Relational Database Services (RDS) DynamoDB, Features and Use Cases Redshift, Features, Use Cases and Comparison with RDS Caching and Migrating Data Hands-on Lab: Create a Database Layer in Your Amazon VPC Infrastructure 7 - Monitoring and Scaling Monitoring: CloudWatch, CloudTrail, and VPC Flow Logs Invoking Events 8 - Automation CloudFormation AWS Systems Manager 9 - Containers Microservices Monitoring Microservices with X-Ray Containers 10 - Networking Part 2 VPC Peering & Endpoints Transit Gateway Hybrid Networking Route 53 11 - Serverless Architecture Amazon API Gateway Amazon SQS, Amazon SNS Amazon Kinesis Data Streams & Kinesis Firehose Step Functions Hands-on Lab: Build a Serverless Architecture 12 - Edge Services Edge Fundamentals Amazon CloudFront AWS Global Accelerator AWS Web Application Firewall (WAF), DDoS and Firewall Manager AWS Outposts Hands-On Lab: Configure an Amazon CloudFront Distribution with an Amazon S3 Origin 13 - Backup and Recovery Planning for Disaster Recovery AWS Backup Recovery Strategie Additional course details: Nexus Humans Architecting on AWS training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Architecting on AWS course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.