Editing AWS Cloud Practitioner

Jump to navigation Jump to search

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.

Latest revision Your text
Line 1: Line 1:
* https://d1.awsstatic.com/training-and-certification/Docs%20-%20Cloud%20Practitioner/AWS%20Certified%20Cloud%20Practitioner_Exam_Guide_v1.4_FINAL.PDF
+
: https://d1.awsstatic.com/training-and-certification/Docs%20-%20Cloud%20Practitioner/AWS%20Certified%20Cloud%20Practitioner_Exam_Guide_v1.4_FINAL.PDF
 
 
* https://d1.awsstatic.com/training-and-certification/docs-cloud-practitioner/AWS-Certified-Cloud-Practitioner_Sample-Questions.pdf
 
  
 
==Domain 1: Cloud Concepts==
 
==Domain 1: Cloud Concepts==
Line 32: Line 30:
 
* Benefits of automation
 
* Benefits of automation
 
* Reduce compliance scope (for example, reporting)
 
* Reduce compliance scope (for example, reporting)
* Managed services (for example, [[RDS]], [[ECS]], [[EKS]], [[DynamoDB]])
+
* Managed services (for example, RDS, ECS, EKS, DynamoDB)
  
 
===1.3 Explain the different cloud architecture design principles===
 
===1.3 Explain the different cloud architecture design principles===
Line 39: Line 37:
 
* Design for failure
 
* Design for failure
 
* Decouple components versus monolithic architecture
 
* Decouple components versus monolithic architecture
* Implement elasticity in the cloud versus [[on-premises]]
+
* Implement elasticity in the cloud versus on-premises
 
* Think parallel
 
* Think parallel
 +
Version 2.1 CLF-C01 4 | PAGE
  
 
==Domain 2: Security and Compliance==
 
==Domain 2: Security and Compliance==
 
===2.1 Define the AWS shared responsibility model===
 
===2.1 Define the AWS shared responsibility model===
 
Recognize the elements of the Shared Responsibility Model
 
Recognize the elements of the Shared Responsibility Model
Describe the customer’s responsibility on [[AWS]]
+
Describe the customer’s responsibility on AWS
  
 
* Describe how the customer’s responsibilities may shift depending on the service used
 
* Describe how the customer’s responsibilities may shift depending on the service used
(for example with [[RDS]], [[Lambda]], or [[EC2]])
+
(for example with RDS, Lambda, or EC2)
  
 
* Describe AWS responsibilities
 
* Describe AWS responsibilities
Line 54: Line 53:
 
===2.2 Define AWS Cloud security and compliance concepts===
 
===2.2 Define AWS Cloud security and compliance concepts===
 
Identify where to find AWS compliance information:
 
Identify where to find AWS compliance information:
*Locations of lists of recognized available compliance controls (for example, [[HIPPA]],
+
*Locations of lists of recognized available compliance controls (for example, HIPPA,
[[SOCs]])
+
SOCs)
 
* Recognize that compliance requirements vary among AWS services
 
* Recognize that compliance requirements vary among AWS services
  
 
At a high level, describe how customers achieve compliance on AWS
 
At a high level, describe how customers achieve compliance on AWS
* Identify different [[encryption]] options on AWS (for example, [[In transit]], [[At rest]])
+
* Identify different encryption options on AWS (for example, In transit, At rest)
  
 
Describe who enables encryption on AWS for a given service
 
Describe who enables encryption on AWS for a given service
Line 66: Line 65:
 
* Recognize that logs exist for auditing and monitoring (do not have to understand the
 
* Recognize that logs exist for auditing and monitoring (do not have to understand the
 
logs)
 
logs)
* Define [[Amazon CloudWatch]], [[AWS Config]], and [[AWS CloudTrail]]
+
* Define Amazon CloudWatch, AWS Config, and AWS CloudTrail
 
Explain the concept of least privileged access
 
Explain the concept of least privileged access
  
Line 72: Line 71:
 
Understand the purpose of User and Identity Management:
 
Understand the purpose of User and Identity Management:
 
* Access keys and password policies (rotation, complexity)
 
* Access keys and password policies (rotation, complexity)
* [[Multi-Factor Authentication]] (MFA)
+
* Multi-Factor Authentication (MFA)
* [[AWS Identity and Access Management]] (IAM)
+
* AWS Identity and Access Management (IAM)
** [[Groups]]/[[users]]
+
** Groups/users
** [[Roles]]
+
** Roles
** [[Policies]], managed policies compared to custom policies
+
** Policies, managed policies compared to custom policies
 
* Tasks that require use of root accounts
 
* Tasks that require use of root accounts
  
Line 83: Line 82:
 
===2.4 Identify resources for security support===
 
===2.4 Identify resources for security support===
 
Recognize there are different network security capabilities:
 
Recognize there are different network security capabilities:
*Native [[AWS services]] (for example, [[security groups]], [[Network ACLs]], [[AWS WAF]])
+
*Native AWS services (for example, security groups, Network ACLs, AWS WAF)
 
* 3
 
* 3
rd party security products from the [[AWS Marketplace]]
+
rd party security products from the AWS Marketplace
 
* Recognize there is documentation and where to find it (for example, best practices,
 
* Recognize there is documentation and where to find it (for example, best practices,
 
whitepapers, official documents)
 
whitepapers, official documents)
 
* AWS Knowledge Center, Security Center, security forum, and security blogs
 
* AWS Knowledge Center, Security Center, security forum, and security blogs
* [[Partner Systems Integrators]]
+
* Partner Systems Integrators
  
Know that security checks are a component of [[AWS Trusted Advisor]]
+
Know that security checks are a component of AWS Trusted Advisor
 +
 +
Version 2.1 CLF-C01 5 | PAGE
  
 
==Domain 3: Technology==
 
==Domain 3: Technology==
===3.1 Define methods of deploying and operating in the AWS Cloud===
+
3.1 Define methods of deploying and operating in the AWS Cloud
Identify at a high level different ways of provisioning and operating in the AWS cloud:
+
Identify at a high level different ways of provisioning and operating in the AWS cloud
* Programmatic access, [[APIs]], [[SDKs]], [[AWS Management Console]], [[CLI]], [[Infrastructure as Code]]
+
o Programmatic access, APIs, SDKs, AWS Management Console, CLI, Infrastructure as
 
+
Code
Identify different types of cloud deployment models:
+
Identify different types of cloud deployment models
* All in with cloud/cloud native
+
o All in with cloud/cloud native
* [[Hybrid]]
+
o Hybrid
* [[On-premises]]
+
o On-premises
 
+
Identify connectivity options
Identify connectivity options:
+
o VPN
* [[VPN]]
+
o AWS Direct Connect
* [[AWS Direct Connect]]
+
o Public internet
* Public internet
+
3.2 Define the AWS global infrastructure
 
+
Describe the relationships among Regions, Availability Zones, and Edge Locations
===3.2 Define the AWS global infrastructure===
+
Describe how to achieve high availability through the use of multiple Availability Zones
Describe the relationships among [[Regions]], [[Availability Zones]], and [[Edge Locations]].
+
o Recall that high availability is achieved by using multiple Availability Zones
 
+
o Recognize that Availability Zones do not share single points of failure
Describe how to achieve high availability through the use of multiple Availability Zones:
+
Describe when to consider the use of multiple AWS Regions
* Recall that high availability is achieved by using multiple [[Availability Zones]]
+
o Disaster recovery/business continuity
* Recognize that Availability Zones do not share single points of failure
+
o Low latency for end-users
 
+
o Data sovereignty
Describe when to consider the use of multiple AWS Regions:
+
Describe at a high level the benefits of Edge Locations
* [[Disaster recovery]]/business continuity
+
o Amazon CloudFront
* [[Low latency]] for end-users
+
o AWS Global Accelerator
* [[Data sovereignty]]
+
3.3 Identify the core AWS services
 
+
Describe the categories of services on AWS (compute, storage, network, database)
Describe at a high level the benefits of Edge Locations:
+
Identify AWS compute services
* [[Amazon CloudFront]]
+
o Recognize there are different compute families
* [[AWS Global Accelerator]]
+
o Recognize the different services that provide compute (for example, AWS Lambda
 
+
compared to Amazon Elastic Container Service (Amazon ECS), or Amazon EC2, etc.)
===3.3 Identify the core AWS services===
+
o Recognize that elasticity is achieved through Auto Scaling
Describe the categories of services on AWS (compute, storage, network, database).
+
o Identify the purpose of load balancers
 
+
Identify different AWS storage services
Identify AWS compute services:
+
o Describe Amazon S3
* Recognize there are different compute families
+
o Describe Amazon Elastic Block Store (Amazon EBS)
* Recognize the different services that provide compute (for example, [[AWS Lambda ]]
+
o Describe Amazon S3 Glacier
compared to Amazon Elastic Container Service (Amazon [[ECS]]), or Amazon [[EC2]], etc.)
+
o Describe AWS Snowball
* Recognize that elasticity is achieved through [[Auto Scaling]]
+
o Describe Amazon Elastic File System (Amazon EFS)
* Identify the purpose of load balancers
+
o Describe AWS Storage Gateway
 
+
Identify AWS networking services
Identify different AWS storage services:
+
o Identify VPC
* Describe [[Amazon S3]]
+
o Identify security groups
* Describe [[Amazon Elastic Block Store]] (Amazon EBS)
+
o Identify the purpose of Amazon Route 53
* Describe [[Amazon S3 Glacier]]
+
o Identify VPN, AWS Direct Connect
* Describe [[AWS Snowball]]
+
Identify different AWS database services
* Describe [[Amazon Elastic File System]] (Amazon EFS)
+
o Install databases on Amazon EC2 compared to AWS managed database
* Describe [[AWS Storage Gateway]]
 
 
 
Identify AWS networking services:
 
* Identify [[VPC]]
 
* Identify [[security groups]]
 
* Identify the purpose of [[Amazon Route 53]]
 
* Identify [[VPN]], [[AWS Direct Connect]]
 
 
 
Identify different AWS database services:
 
* Install databases on Amazon EC2 compared to AWS managed database
 
  
 
== See also ==
 
== See also ==

Please note that all contributions to wikieduonline may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see Wikieduonline:Copyrights for details). Do not submit copyrighted work without permission!

Cancel Editing help (opens in new window)

Templates used on this page:

Advertising: