Introduction |
|
xxi | |
Assessment Test |
|
xxvii | |
Chapter 1 The Cloud |
|
1 | (12) |
|
|
2 | (1) |
|
|
2 | (2) |
|
Highly Available and Scalable Resources |
|
|
2 | (1) |
|
Professionally Secured Infrastructure |
|
|
3 | (1) |
|
|
3 | (1) |
|
Server Virtualization: The Basics |
|
|
4 | (1) |
|
|
5 | (2) |
|
Infrastructure as a Service |
|
|
5 | (1) |
|
|
5 | (1) |
|
|
5 | (1) |
|
|
6 | (1) |
|
Scalability and Elasticity |
|
|
7 | (1) |
|
|
7 | (1) |
|
|
7 | (1) |
|
|
8 | (1) |
|
|
9 | (1) |
|
|
10 | (3) |
Chapter 2 Understanding Your AWS Account |
|
13 | (20) |
|
|
14 | (1) |
|
|
15 | (3) |
|
How Does the Free Tier Work? |
|
|
15 | (1) |
|
Tracking Your Free Tier Usage |
|
|
15 | (2) |
|
What's Available Under the Free Tier? |
|
|
17 | (1) |
|
|
18 | (5) |
|
Finding AWS Pricing Documentation |
|
|
18 | (1) |
|
Working with Online Calculators |
|
|
19 | (4) |
|
|
23 | (1) |
|
Billing and Cost Management |
|
|
23 | (3) |
|
The AWS Billing Dashboard |
|
|
24 | (1) |
|
|
24 | (1) |
|
|
25 | (1) |
|
|
26 | (1) |
|
|
26 | (1) |
|
|
27 | (1) |
|
|
28 | (5) |
Chapter 3 Getting Support on AWS |
|
33 | (16) |
|
|
34 | (1) |
|
|
34 | (4) |
|
|
34 | (2) |
|
|
36 | (1) |
|
The Developer Support Plan |
|
|
36 | (1) |
|
The Business Support Plan |
|
|
37 | (1) |
|
The Enterprise Support Plan |
|
|
37 | (1) |
|
AWS Professional Services |
|
|
37 | (1) |
|
Documentation and Online Help |
|
|
38 | (2) |
|
|
38 | (2) |
|
|
40 | (1) |
|
|
40 | (2) |
|
|
42 | (1) |
|
|
43 | (1) |
|
|
44 | (5) |
Chapter 4 Understanding the AWS Environment |
|
49 | (18) |
|
|
50 | (1) |
|
AWS Global Infrastructure: AWS Regions |
|
|
50 | (4) |
|
Regionally Based Services |
|
|
52 | (1) |
|
|
53 | (1) |
|
|
53 | (1) |
|
AWS Global Infrastructure: Availability Zones |
|
|
54 | (3) |
|
Availability Zone Designations |
|
|
54 | (1) |
|
Availability Zone Networking |
|
|
55 | (1) |
|
Availability Zones and High Availability |
|
|
56 | (1) |
|
AWS Global Infrastructure: Edge Locations |
|
|
57 | (2) |
|
Edge Locations and CloudFront |
|
|
58 | (1) |
|
Regional Edge Cache Locations |
|
|
59 | (1) |
|
The AWS Shared Responsibility Model |
|
|
59 | (2) |
|
|
60 | (1) |
|
|
61 | (1) |
|
|
61 | (1) |
|
AWS Acceptable Use Policy |
|
|
61 | (1) |
|
|
61 | (1) |
|
|
62 | (1) |
|
|
63 | (4) |
Chapter 5 Securing Your AWS Resources |
|
67 | (16) |
|
|
68 | (1) |
|
AWS Identity and Access Management |
|
|
68 | (7) |
|
|
69 | (1) |
|
|
69 | (3) |
|
|
72 | (2) |
|
Providing Federated Access |
|
|
74 | (1) |
|
|
75 | (1) |
|
|
75 | (1) |
|
Regulatory Compliance (AWS Artifact) |
|
|
76 | (1) |
|
|
77 | (1) |
|
|
77 | (1) |
|
|
78 | (5) |
Chapter 6 Working with Your AWS Resources |
|
83 | (36) |
|
|
84 | (1) |
|
The AWS Management Console |
|
|
85 | (13) |
|
Accessing the AWS Management Console |
|
|
85 | (2) |
|
Opening a Service Console |
|
|
87 | (1) |
|
|
88 | (1) |
|
|
88 | (2) |
|
|
90 | (1) |
|
|
90 | (1) |
|
|
91 | (1) |
|
|
92 | (2) |
|
The AWS Console Mobile Application |
|
|
94 | (4) |
|
The AWS Command Line Interface |
|
|
98 | (3) |
|
|
99 | (1) |
|
|
99 | (2) |
|
Software Development Kits |
|
|
101 | (2) |
|
Mobile Software Development Kits |
|
|
101 | (1) |
|
Internet of Things Device Software Development Kits |
|
|
102 | (1) |
|
|
103 | (4) |
|
|
103 | (1) |
|
|
104 | (1) |
|
|
104 | (1) |
|
|
105 | (1) |
|
|
106 | (1) |
|
|
107 | (2) |
|
|
107 | (1) |
|
Management and Data Events |
|
|
107 | (1) |
|
|
108 | (1) |
|
|
108 | (1) |
|
Log File Integrity Validation |
|
|
108 | (1) |
|
|
109 | (4) |
|
|
109 | (2) |
|
|
111 | (1) |
|
Reserved Instance Recommendations |
|
|
112 | (1) |
|
|
113 | (1) |
|
|
113 | (2) |
|
|
115 | (4) |
Chapter 7 The Core Compute Services |
|
119 | (18) |
|
|
120 | (1) |
|
Deploying Amazon Elastic Compute Cloud Servers |
|
|
120 | (7) |
|
|
120 | (3) |
|
Understanding EC2 Instance Types |
|
|
123 | (1) |
|
Server Storage: Elastic Block Store and Instance Store Volumes |
|
|
124 | (1) |
|
Understanding EC2 Pricing Models |
|
|
125 | (2) |
|
Simplified Deployments Through Managed Services |
|
|
127 | (2) |
|
|
128 | (1) |
|
|
128 | (1) |
|
Deploying Container and Serverless Workloads |
|
|
129 | (1) |
|
|
129 | (1) |
|
|
129 | (1) |
|
|
130 | (1) |
|
|
130 | (2) |
|
|
132 | (5) |
Chapter 8 The Core Storage Services |
|
137 | (20) |
|
|
138 | (1) |
|
|
138 | (7) |
|
|
139 | (1) |
|
|
139 | (3) |
|
|
142 | (1) |
|
|
143 | (1) |
|
|
143 | (1) |
|
Object Life Cycle Configurations |
|
|
144 | (1) |
|
|
145 | (1) |
|
|
145 | (1) |
|
|
145 | (1) |
|
|
146 | (1) |
|
|
146 | (1) |
|
|
146 | (1) |
|
|
147 | (1) |
|
|
147 | (3) |
|
|
148 | (1) |
|
|
148 | (1) |
|
|
149 | (1) |
|
|
150 | (1) |
|
|
150 | (2) |
|
|
152 | (5) |
Chapter 9 The Core Database Services |
|
157 | (18) |
|
|
158 | (1) |
|
|
158 | (3) |
|
|
159 | (1) |
|
Structured Query Language |
|
|
160 | (1) |
|
Nonrelational (No-SQL) Databases |
|
|
160 | (1) |
|
Amazon Relational Database Service |
|
|
161 | (5) |
|
|
161 | (1) |
|
|
162 | (1) |
|
|
162 | (1) |
|
|
163 | (1) |
|
|
163 | (1) |
|
Scaling Horizontally with Read Replicas |
|
|
164 | (1) |
|
High Availability with Multi-AZ |
|
|
164 | (1) |
|
|
165 | (1) |
|
Determining Your Recovery Point Objective |
|
|
165 | (1) |
|
|
166 | (2) |
|
|
166 | (1) |
|
|
167 | (1) |
|
|
167 | (1) |
|
|
168 | (1) |
|
|
169 | (1) |
|
|
170 | (1) |
|
|
171 | (4) |
Chapter 10 The Core Networking Services |
|
175 | (14) |
|
|
176 | (1) |
|
|
176 | (4) |
|
|
176 | (1) |
|
|
177 | (1) |
|
|
178 | (1) |
|
|
178 | (1) |
|
Network Access Control Lists |
|
|
178 | (1) |
|
|
179 | (1) |
|
|
179 | (1) |
|
|
179 | (1) |
|
|
180 | (3) |
|
|
180 | (1) |
|
|
180 | (1) |
|
|
181 | (1) |
|
|
181 | (1) |
|
|
182 | (1) |
|
Traffic Flow and Traffic Policies |
|
|
182 | (1) |
|
|
183 | (1) |
|
|
183 | (1) |
|
|
184 | (1) |
|
|
185 | (4) |
Chapter 11 Automating Your AWS Workloads |
|
189 | (20) |
|
|
190 | (1) |
|
|
190 | (1) |
|
|
191 | (1) |
|
|
191 | (1) |
|
|
191 | (3) |
|
|
192 | (1) |
|
|
192 | (1) |
|
CloudFormation vs. the AWS CLI |
|
|
193 | (1) |
|
|
194 | (5) |
|
|
194 | (1) |
|
|
195 | (1) |
|
|
196 | (1) |
|
|
197 | (2) |
|
|
199 | (1) |
|
Launch Configurations and Launch Templates |
|
|
199 | (1) |
|
|
199 | (1) |
|
|
200 | (1) |
|
|
200 | (3) |
|
|
200 | (1) |
|
|
201 | (2) |
|
|
203 | (1) |
|
|
204 | (1) |
|
|
205 | (4) |
Chapter 12 Common Use-Case Scenarios |
|
209 | (22) |
|
|
210 | (1) |
|
The Well-Architected Framework |
|
|
210 | (3) |
|
|
211 | (1) |
|
|
211 | (1) |
|
|
211 | (1) |
|
|
212 | (1) |
|
|
213 | (1) |
|
A Highly Available Web Application Using Auto Scaling and Elastic Load Balancing |
|
|
213 | (9) |
|
Creating an Inbound Security Group Rule |
|
|
214 | (2) |
|
Creating an Application Load Balancer |
|
|
216 | (2) |
|
Creating a Launch Template |
|
|
218 | (1) |
|
Creating an Auto Scaling Group |
|
|
219 | (3) |
|
Static Website Hosting Using S3 |
|
|
222 | (2) |
|
|
224 | (1) |
|
|
224 | (2) |
|
|
226 | (5) |
Appendix A Answers to Review Questions |
|
231 | (20) |
|
|
232 | (1) |
|
Chapter 2: Understanding Your AWS Account |
|
|
232 | (2) |
|
Chapter 3: Getting Support on AWS |
|
|
234 | (1) |
|
Chapter 4: Understanding the AWS Environment |
|
|
235 | (2) |
|
Chapter 5: Securing Your AWS Resources |
|
|
237 | (1) |
|
Chapter 6: Working with Your AWS Resources |
|
|
238 | (2) |
|
Chapter 7: The Core Compute Services |
|
|
240 | (2) |
|
Chapter 8: The Core Storage Services |
|
|
242 | (2) |
|
Chapter 9: The Core Database Services |
|
|
244 | (1) |
|
Chapter 10: The Core Networking Services |
|
|
245 | (2) |
|
Chapter 11: Automating Your AWS Workloads |
|
|
247 | (1) |
|
Chapter 12: Common Use-Case Scenarios |
|
|
248 | (3) |
Appendix B Additional Services |
|
251 | (6) |
|
|
252 | (1) |
|
|
252 | (1) |
|
|
252 | (1) |
|
|
252 | (1) |
|
|
253 | (1) |
|
Database Migration Service |
|
|
253 | (1) |
|
|
253 | (1) |
|
|
253 | (1) |
|
|
254 | (1) |
|
|
254 | (1) |
|
|
254 | (1) |
|
|
254 | (1) |
|
|
254 | (1) |
|
|
254 | (1) |
|
|
255 | (2) |
Index |
|
257 | |