Introduction Course Introduction Cloud Computing Essentials Cloud Computing Essentials Cloud First Steps Cloud First Steps Computing Solutions Computing Solutions Cloud Economics Cloud Economics Networking Concepts Networking Concepts Connecting VPCs Connecting VPCs Database in Practice Database in Practice Core Security Concepts Core Security Concepts File Systems in the Cloud File Systems in the Cloud Auto-Healing and Scaling Applications Auto-Healing and Scaling Applications Highly Available Web Applications Highly Available Web Applications First NoSQL Database (DynamoDB) First NoSQL Database (DynamoDB) Resource Monitoring Resource Monitoring Backing Up Data Backing Up Data Serverless Foundations Serverless Foundations Deploying RESTful APIs Deploying RESTful APIs API with Database API with Database Container Services Container Services Analyzing Network Traffic Analyzing Network Traffic Data Ingestion Methods Data Ingestion Methods Resource Governance Resource Governance Automation with CloudFormation Automation with CloudFormation DNS DNS Single-Page App Single-Page App Design a NoSQL Database Design a NoSQL Database Data Lakes Data Lakes Querying the Data Lake Querying the Data Lake Federated Queries Federated Queries Cloud Data Warehouse Cloud Data Warehouse Documents Indexing and Search Documents Indexing and Search Daily Batch Extraction Daily Batch Extraction Streaming Ingestion Streaming Ingestion Real-Time Data Processing Real-Time Data Processing Populating the Data Catalog Populating the Data Catalog Event-Driven Serverless ETL Event-Driven Serverless ETL Event-Driven ETL Automation Event-Driven ETL Automation Securing the Data Lake Securing the Data Lake Business Intelligence Dashboards Business Intelligence Dashboards Set Up a Cloud Development Environment Set Up a Cloud Development Environment Build Apps Faster with Amazon CodeWhisp Build Apps Faster with Amazon CodeWhisp Templating a Serverless Application Templating a Serverless Application Triggers - Aggregating Data Triggers – Aggregating Data Integrating Serverless Applications Integrating Serverless Applications Parallel Data Processing Parallel Data Processing Orchestrate Serverless Workflows Orchestrate Serverless Workflows Deploying APIs Gradually Deploying APIs Gradually Continuous Delivery Pipeline Continuous Delivery Pipeline Identity and Access Management Identity and Access Management Security Policies Security Policies Lambda Security Lambda Security Playing with Encryption Playing with Encryption Secrets Management Secrets Management Protecting Data at Rest Protecting Data at Rest Securing APIs Securing APIs Serverless Authentication Serverless Authentication S3 Security S3 Security Compliance Enforcement Compliance Enforcement Securing Your Servers Securing Your Servers Securing a Three-Tiered Architecture Securing a Three-Tiered Architecture Edge Protection Edge Protection Infrastructure as Code Infrastructure as Code Secure Self-Service Infrastructure Secure Self-Service Infrastructure INCIDENT RESPONSE INCIDENT RESPONSE APPLICATION LOGS APPLICATION LOGS Scaling Network Connectivity Scaling Network Connectivity Intelligent Application Protection Intelligent Application Protection DNS Query Filtering DNS Query Filtering VPC Flow Logs Analysis Dashboards VPC Flow Logs Analysis Dashboards Egress Traffic Filtering Egress Traffic Filtering Inter-Region Peering Inter-Region Peering Automate Inter-Region Peering Automate Inter-Region Peering Content Acceleration on the Edge Content Acceleration on the Edge Connecting On-Premises Networks Connecting On-Premises Networks Increase Security with VPC Endpoints Increase Security with VPC Endpoints Securing Hybrid Access Securing Hybrid Access Monitor and Analyze Network Traffic Monitor and Analyze Network Traffic Traffic Mirroring Traffic Mirroring Resolve VPC Routing Conflicts Resolve VPC Routing Conflicts Threat Hunting Threat Hunting Image and Video Analysis Image and Video Analysis Set Up an ML Environment Set Up an ML Environment Introduction to Generative Al Introduction to Generative Al Fine-Tuning an LLM on Amazon SageMaker Fine-Tuning an LLM on Amazon SageMaker Spy Drones Detection Spy Drones Detection Bring Your Own Model Bring Your Own Model Anomaly Detection Anomaly Detection Reinforcement Learning Reinforcement Learning Get Home Safe Get Home Safe TensorFlow and Computer Vision TensorFlow and Computer Vision Extract Text from Docs Extract Text from Docs Text-to-Speech Text-to-Speech Speech-to-Text Speech-to-Text Customer Sentiment Customer Sentiment Text-to-image Creation Using Generative AI Text-to-image Creation Using Generative AI Chatbots with a Large Language Model Chatbots with a Large Language Model Use Gen AI to Build an Image Recognition System Use Gen AI to Build an Image Recognition System Intelligent EC2 Monitoring Intelligent EC2 Monitoring Cloud Infrastructure with Generative AI Cloud Infrastructure with Generative AI