AWS-ADV: Advanced Architecting on AWS Training (5)

Advanced Architecting on AWS Training is a comprehensive guide that teaches you Advance Architecture on AWS and helps you prepare for the AWS Certified Solution Architect exam.

Category : SharePoint

Course Price : $1805 Per Participant

Course Details

500+

Courses

95K+

Years of Experience

85K+

Global Learners

Training Exclusives

  • Live instructor-led interactive sessions with Microsoft Certified Trainers (MCT).
  • Access to Microsoft Official Courseware (MOC).
  • Real-time Virtual Lab Environment.
  • Experience 24*7 Learner Support.
  • Self-paced learning and flexible schedules.

Course Description

Advanced Architecting on AWS Training is a comprehensive guide that teaches you Advance Architecture on AWS and helps you prepare for the AWS Certified Solution Architect exam.

You will get to learn how to manage multiple AWS accounts and link on-premises to the AWS cloud.

This technical course elaborates billing implications of linking multi-region VPCs and migrating extensive massive data from an on-premises data center to AWS.

This training will elevate your understanding and knowledge of different AWS services and how they function together in resilient architectures. Your perspective will change, which will help sharpen your architectural capabilities.

This course is suitable for people who want to take their career to the next level and boost their credibility.

It enables you to develop a better understanding of various architectural designs for scaling a bigger website.

Throughout this course, you will learn the best practices to keep your infrastructure protected from DDoS attacks and secure your information on AWS with encryption. 

What you will learn

Prerequisites

  • Knowledge and experience with core AWS services from the Compute, Storage, Networking, and AWS Identity and Access Management (IAM) categories
  • Attended the Architecting on AWS classroom training OR
  • Achieved the AWS Certified Solutions Architect – Associate certification OR
  • Have at least 1 year of experience operating AWS workloads

Who should attend this course?

Ideal Participants for This Course

The program is aimed at IT professionals seeking to broaden their expertise by learning to load, configure, deploy, and manage SharePoint 2016 on the cloud or data center.

Individuals with at least one year of working experience in planning and maintenance of SharePoint and nearly two years of hands-on experience in core tech such as Windows Server 2012 R2 or later, Microsoft SQL Server 2014 or later, networking infrastructure services, Internet Information Services (IIS), Active Directory Services (AD DS).

What You Receive at Probot Learning:

Global IT Certification

Customized Training Solutions

Expert Industry Trainers

Practical Learning Approach

Flexible Training Modes

Authorized Course Materials

Career-Enhancing Skills

PPP-Based Pricing Model

Workshops for Skill Gaps

Recognition and Growth

Curriculum

Day 1: Module 1: Reviewing Architecting Concepts
  • Group Exercise: Review Architecting on AWS core best practices

Lab 1: Securing Amazon S3 VPC Endpoint Communications

  • AWS Organizations for multi-account access and permissions
  • AWS SSO to simplify access and authentication across AWS accounts and third-party services
  • AWS Control Tower
  • Permissions, access, and authentication
  • AWS Client VPN authentication and control
  • AWS Site-to-Site VPN
  • AWS Direct Connect for hybrid public and private connections
  • Increasing bandwidth and reducing cost
  • Basic, high, and maximum resiliency
  • Amazon Route 53 Resolver DNS resolution
 
  • AWS Storage Gateway solutions
  • On-demand VMware Cloud on AWS
  • Extending cloud infrastructure services with AWS Outposts
  • AWS Local Zones for latency-sensitive workloads
  • Your 5G network with and without AWS Wavelength
  • Simplifying private subnet connections
  • VPC isolation with a shared services VPC
  • Transit Gateway Network Manager and VPC Reachability Analyzer
  • AWS Resource Access Manager
  • AWS PrivateLink and endpoint services

Lab 2: Configuring Transit Gateways

  • Container solutions compared to virtual machines
  • Docker benefits, components, solutions architecture, and versioning
  • Container hosting on AWS to reduce cost
  • Managed container services: Amazon Elastic Container Service (Amazon ECS) and Amazon Elastic Kubernetes Service (Amazon EKS)
  • AWS Fargate

Lab 3: Deploying an Application with Amazon EKS on Fargate

  • CI/CD solutions and impact
  • CI/CD automation with AWS CodePipeline
  • Deployment models
  • AWS CloudFormation StackSets to improve deployment management
  • Common DDoS attacks layers
  • AWS WAF
  • AWS WAF web access control lists (ACLs), real-time metrics, logs, and security automation
  • AWS Shield Advanced services and AWS DDoS Response Team (DRT) services
  • AWS Network Firewall and AWS Firewall Manager to protect accounts at scale
  • Module 10: Large-Scale Data Stores
  • Amazon S3 data storage management including storage class, inventory, metrics, and policies
  • Data lake vs. data warehouse: Differences, benefits, and examples
  • AWS Lake Formation solutions, security, and control

Lab 4: Setting Up a Data Lake with Lake Formation

This module explains how to create and manage content types and content-type propagation. Additionally, it explains how to implement managed metadata in SharePoint web applications and site collections. It also explains how to configure the managed metadata service application in SharePoint 2016.

  • Managing content types
  • Understanding managed metadata
  • Configuring the managed metadata service

Lab: Configuring content-type propagation

  • Creating content types for propagation
  • Publishing content types across site collections

Lab: Configuring and using the managed metadata service

  • Configuring the managed metadata service
  • Creating term sets and terms
  • Consuming term sets

After completing this module, students will be able to:

  • Create and manage content types and content-type propagation.
  • Explain how to implement managed metadata in SharePoint web applications and site collections.
  • Configure the managed metadata service application in SharePoint 2016.
  • On-premises and cloud acquisition/deprecation cycles
  • Cloud cost management tools including reporting, control, and tagging
  • Examples and analysis of the five pillars of cost optimization
  • Business drivers and the process for migration
  • Successful customer practices
  • The 7 Rs to migrate and modernize
  • Migration tools and services from AWS
  • Migrating databases and large data stores
  • AWS Schema Conversion Tool (AWS SCT)

Use the Online Course Supplement (OCS) to review use cases, investigate data, and answer architecting design questions about Transit Gateway, hybrid connectivity, migration, and cost optimization

What Exam Do I Need To Get Certified?

  • 312-50 CEH : EC-Council Certified Ethical Hacker
 

About the Certifications

CEH – Certified Ethical Hacker Certification empowers a person in a certain network security area of Ethical Hacking through a vendor-neutral perspective. This certification will strengthen the application knowledge of security officers, auditors, security professionals, site administrators and anybody who is apprehensive about the virtue of the network infrastructure. A CEH is an individual who is trained to understand and know how to locate for shortcomings and susceptibilities in target systems and utilizes the knowledge and tools for the same as a malicious hacker.

Certification Details

Step 1: Review the skills and knowledge required to certify.

Step 2: Recommended training for EC-Council Certified Ethical Hacker (CEH) Certification:

  • CEH – Certified Ethical Hacker v12

Step 3: Take this exam and get certified.

  • Exam 312-50 CEH

Who Should Attend?

Individual who wants to strengthen the application knowledge of security officers, auditors, security professionals, site administrators and anybody who is concerned about the uprightness of the network infrastructure.

Skills Measured

This CEH – Certified Ethical Hacker Certification is an entry level training certification course where professionals having basic idea about networking and familiarity with Linux OS can join this course.

Certification Latest Updates

This Certified Ethical Hacker Certification is valid for three years staring from the certification date. You must renew your certification before expiry date.

FAQs

What qualifications are needed to obtain this certification in ethical hacking?

Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.

Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.

Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.

Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.

Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.

Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.

Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.

Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.

Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.

Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.

Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.

Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.

Talk to Learning Advisor