Architecting for AWS: Best Practices, Patterns and Troubleshooting
Course
Online
Description
-
Type
Course
-
Methodology
Online
-
Start date
Different dates available
Gain a detailed understanding of best practices for architectural and securing your applications while running on AWS.Do you face problems in implementing AWS framework in your applications? Then this course is for you.This course is full of examples and will give you a detailed understanding of the best practices to follow when architectural and securing your applications for running on AWS. You see some secret hints and tips on common problem areas you may encounter. Amazon provides a range of tools for analyzing the cost impact and security footprint of cloud applications, all of which we will explore with practical, real-life examples.By the end of this comprehensive, yet easy to follow tutorial, you will have gained a detailed understanding of how to architect and build fault-tolerant, cost-optimized applications for the connected web.About the AuthorColibri is a technology consultancy company founded in 2015 by James Cross and Ingrid Funie. The company works to help its clients navigate the rapidly changing and complex world of emerging technologies, with deep expertise in areas such as big data, data science, machine learning, and cloud computing. Over the past few years they have worked with some of the world's largest and most prestigious companies, including a tier-1 investment bank, a leading management consultancy group, and one of the world's most popular soft drinks companies, helping each of them to make better sense of its data, and process it in more intelligent ways. The company lives by its motto: Data -> Intelligence -> Action.
James Cross is a Big Data Engineer and certified AWS Solutions Architect with a passion for data-driven applications. He's spent the last 3-5 years helping his clients to design and implement huge scale streaming Big Data platforms, Cloud-based analytics stacks, and serverless architectures.
Facilities
Location
Start date
Start date
About this course
Analyze the cost impact and security footprint of cloud applications
Build fault-tolerant, cost-optimized applications for the connected web
Secure your applications for running on AWS
Considerations when comparing Cloud applications with traditional on-premise applications
Effective use of cloud resources for performance optimization
Budget allocation and resource sizing for building cost optimized applications
Reviews
This centre's achievements
All courses are up to date
The average rating is higher than 3.7
More than 50 reviews in the last 12 months
This centre has featured on Emagister for 6 years
Subjects
- Monitoring
- Architectural
- Access
- Options
- Benefits
- Approach
- Design
- Architect
- Architectural
Course programme
- Learn what is the cloud
- Understand how do we maximize moving to the cloud
- See typical approaches
- Learn what does a typical on premise application look like
- Understand how to approach a migration
- Look at technologies to consider
- Learn how to approach a from scratch design
- See benefits of using native services
- Explore technologies to consider
- Learn what is the cloud
- Understand how do we maximize moving to the cloud
- See typical approaches
- Learn what does a typical on premise application look like
- Understand how to approach a migration
- Look at technologies to consider
- Learn how to approach a from scratch design
- See benefits of using native services
- Explore technologies to consider
- Learn what is the cloud
- Understand how do we maximize moving to the cloud
- See typical approaches
- Learn what is the cloud
- Understand how do we maximize moving to the cloud
- See typical approaches
- Learn what is the cloud
- Understand how do we maximize moving to the cloud
- See typical approaches
- Learn what is the cloud
- Understand how do we maximize moving to the cloud
- See typical approaches
- Learn what is the cloud
- Understand how do we maximize moving to the cloud
- See typical approaches
- Learn what is the cloud
- Understand how do we maximize moving to the cloud
- See typical approaches
- Learn what does a typical on premise application look like
- Understand how to approach a migration
- Look at technologies to consider
- Learn what does a typical on premise application look like
- Understand how to approach a migration
- Look at technologies to consider
- Learn what does a typical on premise application look like
- Understand how to approach a migration
- Look at technologies to consider
- Learn what does a typical on premise application look like
- Understand how to approach a migration
- Look at technologies to consider
- Learn what does a typical on premise application look like
- Understand how to approach a migration
- Look at technologies to consider
- Learn what does a typical on premise application look like
- Understand how to approach a migration
- Look at technologies to consider
- Learn how to approach a from scratch design
- See benefits of using native services
- Explore technologies to consider
- Learn how to approach a from scratch design
- See benefits of using native services
- Explore technologies to consider
- Learn how to approach a from scratch design
- See benefits of using native services
- Explore technologies to consider
- Learn how to approach a from scratch design
- See benefits of using native services
- Explore technologies to consider
- Learn how to approach a from scratch design
- See benefits of using native services
- Explore technologies to consider
- Learn how to approach a from scratch design
- See benefits of using native services
- Explore technologies to consider
- Understand what do we need to protect
- See the encryption overview
- Learn technologies to use
- What is Amazons attitude to confidentiality
- Check controlling access
- Explore monitoring and responding
- Understand Amazon’s approach to privacy
- An overview of tools and options
- An introduction to IAM
- Learn how to control access and permissions
- Explore monitoring access
- Understand what do we need to protect
- See the encryption overview
- Learn technologies to use
- What is Amazons attitude to confidentiality
- Check controlling access
- Explore monitoring and responding
- Understand Amazon’s approach to privacy
- An overview of tools and options
- An introduction to IAM
- Learn how to control access and permissions
- Explore monitoring access
- Understand what do we need to protect
- See the encryption overview
- Learn technologies to use
- Understand what do we need to protect
- See the encryption overview
- Learn technologies to use
- Understand what do we need to protect
- See the encryption overview
- Learn technologies to use
- Understand what do we need to protect
- See the encryption overview
- Learn technologies to use
- Understand what do we need to protect
- See the encryption overview
- Learn technologies to use
- Understand what do we need to protect
- See the encryption overview
- Learn technologies to use
- What is Amazons attitude to confidentiality
- Check controlling access
- Explore monitoring and responding
- What is Amazons attitude to confidentiality
- Check controlling access
- Explore monitoring and responding
- What is Amazons attitude to confidentiality
- Check controlling access
- Explore monitoring and responding
- What is Amazons attitude to confidentiality
- Check controlling access
- Explore monitoring and responding
- What is Amazons attitude to confidentiality
- Check controlling access
- Explore monitoring and responding
- What is Amazons attitude to confidentiality
- Check controlling access
- Explore monitoring and responding
- Understand Amazon’s approach to privacy
- An overview of tools and options
- Understand Amazon’s approach to privacy
- An overview of tools and options
- Understand Amazon’s approach to privacy
- An overview of tools and options
- Understand Amazon’s approach to privacy
- An overview of tools and options
- Understand Amazon’s approach to privacy
- An overview of tools and options
- Understand Amazon’s approach to privacy
- An overview of tools and options
- An introduction to IAM
- Learn how to control access and permissions
- Explore monitoring access
- An introduction to IAM
- Learn how to control access and permissions
- Explore monitoring access
- An introduction to IAM
- Learn how to control access and permissions
- Explore monitoring access
- An introduction to IAM
- Learn how to control access and permissions
- Explore monitoring access
- An introduction to IAM
- Learn how to control access and permissions
- Explore monitoring access
- An introduction to IAM
- Learn how to control access and permissions
- Explore monitoring access
Additional information
Architecting for AWS: Best Practices, Patterns and Troubleshooting
