Course Introduction
Cloud Computing Essentials
Cloud First Steps
Computing Solutions
Cloud Economics
Networking Concepts
Connecting VPCs
Database in Practice
Core Security Concepts
File Systems in the Cloud
Auto-Healing and Scaling Applications
Highly Available Web Applications
First NoSQL Database (DynamoDB)
Resource Monitoring
Backing Up Data
Serverless Foundations
Deploying RESTful APIs
API with Database
Container Services
Analyzing Network Traffic
Data Ingestion Methods
Resource Governance
Automation with CloudFormation
DNS
Single-Page App
Design a NoSQL Database
Data Lakes
Querying the Data Lake
Federated Queries
Cloud Data Warehouse
Documents Indexing and Search
Daily Batch Extraction
Streaming Ingestion
Real-Time Data Processing
Populating the Data Catalog
Event-Driven Serverless ETL
Event-Driven ETL Automation
Securing the Data Lake
Business Intelligence Dashboards
Set Up a Cloud Development Environment
Build Apps Faster with Amazon CodeWhisp
Templating a Serverless Application
Triggers – Aggregating Data
Integrating Serverless Applications
Parallel Data Processing
Orchestrate Serverless Workflows
Deploying APIs Gradually
Continuous Delivery Pipeline
Identity and Access Management
Security Policies
Lambda Security
Playing with Encryption
Secrets Management
Protecting Data at Rest
Securing APIs
Serverless Authentication
S3 Security
Compliance Enforcement
Securing Your Servers
Securing a Three-Tiered Architecture
Edge Protection
Infrastructure as Code
Secure Self-Service Infrastructure
INCIDENT RESPONSE
APPLICATION LOGS
Scaling Network Connectivity
Intelligent Application Protection
DNS Query Filtering
VPC Flow Logs Analysis Dashboards
Egress Traffic Filtering
Inter-Region Peering
Automate Inter-Region Peering
Content Acceleration on the Edge
Connecting On-Premises Networks
Increase Security with VPC Endpoints
Securing Hybrid Access
Monitor and Analyze Network Traffic
Traffic Mirroring
Resolve VPC Routing Conflicts
Threat Hunting
Image and Video Analysis
Set Up an ML Environment
Introduction to Generative Al
Fine-Tuning an LLM on Amazon SageMaker
Spy Drones Detection
Bring Your Own Model
Anomaly Detection
Reinforcement Learning
Get Home Safe
TensorFlow and Computer Vision
Extract Text from Docs
Text-to-Speech
Speech-to-Text
Customer Sentiment
Text-to-image Creation Using Generative AI
Chatbots with a Large Language Model
Use Gen AI to Build an Image Recognition System
Intelligent EC2 Monitoring
Cloud Infrastructure with Generative AI
