Documentation Index
Fetch the complete documentation index at: https://resources.devweekends.com/llms.txt
Use this file to discover all available pages before exploring further.
Welcome to AWS Cloud Mastery
This is a comprehensive, production-ready course designed to take you from AWS fundamentals to architecting enterprise-grade cloud solutions. Whether youβre preparing for AWS certifications, transitioning to cloud engineering, or building scalable systems at workβthis course has you covered.40+ Hours of Content
Hands-On Labs
Interview Ready
Architecture Patterns
Who Is This Course For?
Software Engineers
Solutions Architects
DevOps Engineers
What Youβll Learn
By the end of this course, you will be able to:Implement Security Best Practices
Course Curriculum
Module 1: AWS Foundations
Core Concepts
- AWS Global Infrastructure deep-dive
- Regions, Availability Zones, and Edge Locations
- AWS Pricing Models (On-Demand, Reserved, Spot, Savings Plans)
- The Shared Responsibility Model
- AWS Well-Architected Framework introduction
- Hands-on: Setting up your AWS account securely
Module 2: Compute Services
Compute Services
- EC2 instance types, AMIs, and launch configurations
- Lambda functions, triggers, and best practices
- Container orchestration with ECS and EKS
- Auto Scaling groups and policies
- Compute cost optimization strategies
- Hands-on: Deploy a scalable web application
Module 3: Storage & Databases
Storage & Databases
- S3 storage classes, lifecycle policies, and security
- EBS volume types and optimization
- RDS Multi-AZ and Read Replicas
- Aurora architecture and global databases
- DynamoDB design patterns and capacity planning
- Caching strategies with ElastiCache
- Hands-on: Design a multi-tier data architecture
Module 4: Networking & Content Delivery
Networking
- VPC design and subnet strategies
- Security groups vs NACLs
- Application and Network Load Balancers
- Route 53 routing policies and health checks
- CloudFront distributions and caching
- VPC Peering and Transit Gateway
- Hands-on: Build a secure multi-tier VPC
Module 5: Security & Identity
Security & IAM
- IAM users, groups, roles, and policies
- Policy evaluation logic and best practices
- KMS encryption and key management
- Secrets Manager and Parameter Store
- AWS Organizations and Service Control Policies
- Security monitoring with CloudTrail, Config, and GuardDuty
- Hands-on: Implement zero-trust security architecture
Module 6: Well-Architected Framework
Well-Architected Framework
- Operational Excellence pillar
- Security pillar
- Reliability pillar
- Performance Efficiency pillar
- Cost Optimization pillar
- Sustainability pillar
- Hands-on: Conduct a Well-Architected Review
Module 7: Case Studies & Projects
Serverless Web App
3-Tier Web App
π Why This Course Stands Out
| Feature | This Course | Other Courses |
|---|---|---|
| Real Architecture Diagrams | β Production-grade diagrams | β Basic flowcharts |
| Interview Questions | β 200+ with answers | β Few or none |
| Code Examples | β Python, TypeScript, Terraform | β Console clicks only |
| Cost Analysis | β Detailed pricing breakdowns | β Not covered |
| Case Studies | β Multiple real-world projects | β Toy examples |
| Updated for 2025 | β Latest services & features | β Outdated content |
π AWS Certifications Roadmap
This course prepares you for the following certifications:| Certification | Level | This Course Covers |
|---|---|---|
| Cloud Practitioner | π’ Foundational | β 100% |
| Solutions Architect Associate | π‘ Associate | β 100% |
| Developer Associate | π‘ Associate | β 85% |
| SysOps Administrator | π‘ Associate | β 80% |
| Solutions Architect Professional | π΄ Professional | β 70% |
| DevOps Engineer Professional | π΄ Professional | β 60% |
π οΈ Prerequisites
Before starting this course, you should have:- Basic understanding of networking (IP addresses, ports, HTTP)
- Familiarity with at least one programming language (Python recommended)
- An AWS account (free tier is sufficient for most labs)
- Command line experience (bash/PowerShell)
π― Learning Path
Follow this structured path for the best learning experience:π° AWS Free Tier
Most labs in this course can be completed using the AWS Free Tier:| Service | Free Tier Allocation |
|---|---|
| EC2 | 750 hours/month (t2.micro) |
| S3 | 5 GB storage |
| RDS | 750 hours/month (db.t2.micro) |
| Lambda | 1M requests/month |
| DynamoDB | 25 GB storage |
| CloudFront | 1 TB data transfer |
Start Your Journey
Begin with Core Concepts
Download Resources
Interview Deep-Dive
You inherit an AWS environment with 200+ EC2 instances, no tagging strategy, and a $45,000/month bill that leadership wants cut by 40%. Walk me through your first 30 days.
You inherit an AWS environment with 200+ EC2 instances, no tagging strategy, and a $45,000/month bill that leadership wants cut by 40%. Walk me through your first 30 days.
- Week 1 β Discovery and quick wins. I would enable AWS Cost Explorer and pull the last 90 days of billing data. Then I would use Trusted Advisor and Compute Optimizer to identify idle and underutilized instances. In most environments, 15-25% of instances are running at under 5% CPU β those are candidates for immediate downsizing or termination. I would also check for unattached EBS volumes, unused Elastic IPs, and idle load balancers. At a previous company we found $3,200/month in orphaned resources in the first three days.
- Week 2 β Tagging and accountability. I would implement a mandatory tagging strategy using AWS Config rules (required tags: Environment, Owner, CostCenter, Application). Without tags, you cannot attribute costs, and without attribution, nobody owns the waste. I would use Tag Editor for bulk tagging and set up SCP guardrails so new resources without tags get denied.
- Week 3 β Reserved Instances and Savings Plans. For the baseline workload (the instances that run 24/7 and are not going away), I would purchase Compute Savings Plans covering roughly 60-70% of steady-state usage. That alone saves 30-40%. For batch workloads, I would move to Spot Instances with diversified instance pools.
- Week 4 β Architecture optimization. Evaluate which workloads could move to Lambda or Fargate to eliminate idle capacity entirely. Set up automated start/stop schedules for dev/staging environments (most only need to run 10 hours/day, 5 days/week β that is a 70% reduction). Implement S3 lifecycle policies to move old data to Glacier.
- The 40% target is aggressive but realistic. I have seen 45-55% reductions in environments with no prior optimization. The key is combining pricing optimization (RIs/Savings Plans) with architectural optimization (right-sizing, serverless, scheduling).
A startup asks you to design their AWS architecture from scratch. They expect to go from 1,000 users to 1 million in 12 months. How do you build for that growth without over-provisioning on day one?
A startup asks you to design their AWS architecture from scratch. They expect to go from 1,000 users to 1 million in 12 months. How do you build for that growth without over-provisioning on day one?
- Start serverless, graduate to containers. For the first phase (1K-50K users), I would build on API Gateway, Lambda, and DynamoDB. Zero idle cost, scales automatically, and the team ships features instead of managing infrastructure. At our scale, this costs under $100/month.
- Design for the migration you know is coming. Structure the application as microservices from day one, even if they all run as Lambda functions initially. When a specific service hits Lambdaβs limits (15-minute timeout, cold start sensitivity, or the cost crossover point around 1M+ invocations/day per function), you move that one service to Fargate without touching anything else.
- Database strategy matters most. DynamoDB for the primary data store with single-table design. If they need relational queries, Aurora Serverless v2 (scales to zero, handles spikes). The database is the hardest thing to migrate later, so getting this right early is critical.
- Networking and security foundations. Set up a proper VPC with public/private subnets across 3 AZs from day one. Use AWS Organizations with separate accounts for dev/staging/prod. Enable CloudTrail, GuardDuty, and Config immediately β security debt compounds faster than technical debt.
- Cost guardrails from the start. AWS Budgets with alerts, SCP to restrict instance types in dev, and mandatory cost allocation tags. I have seen startups hit $20K/month bills within 6 months because nobody was watching.
Your company runs a multi-region active-active architecture and a junior engineer accidentally deletes the DynamoDB Global Table in us-east-1 during a deployment. Walk me through the incident response.
Your company runs a multi-region active-active architecture and a junior engineer accidentally deletes the DynamoDB Global Table in us-east-1 during a deployment. Walk me through the incident response.
- First 5 minutes β confirm the blast radius. Check if the deletion propagated to other regions. With DynamoDB Global Tables, deleting a replica table in one region does NOT delete other replicas. If the engineer deleted the entire global table (all replicas), that is catastrophic. Check CloudTrail immediately: filter for
DeleteTableAPI calls to understand exactly what happened. - Immediate mitigation. If only the us-east-1 replica was removed, traffic is already failing over to other regions via Route 53 health checks (assuming they are configured). If not, manually update DNS to point to eu-west-1. Meanwhile, check if Point-in-Time Recovery (PITR) was enabled β if so, restore the table to the most recent recovery point (within the last 35 days, typically within 5 minutes of the deletion).
- Restore process. PITR restore creates a new table, not the original. You need to recreate it with the same name, key schema, GSIs, and then re-add it as a replica to the global table. This process takes time depending on table size. For a 100GB table, expect 1-2 hours.
- If PITR was not enabled. You are relying on backups. Check the last on-demand backup. If neither PITR nor backups existed, the data in that region is gone β you rebuild from the surviving replicas. This is a painful lesson that reinforces why PITR should be enabled on every production DynamoDB table, no exceptions.
- Post-incident. Implement SCP to deny
dynamodb:DeleteTableexcept from a specific CI/CD role. Add DeletionProtection (available since 2023) on all production tables. Require MFA for destructive operations. Conduct a blameless post-mortem.
dynamodb:DeleteTable and dynamodb:DeleteBackup for all roles except a dedicated break-glass role that requires MFA. Third, a pre-deployment validation step in the CI/CD pipeline that checks CloudFormation changesets for any resource deletions and requires manual approval if a DynamoDB table removal is detected. The goal is defense in depth: make it hard to do accidentally, easy to do intentionally with proper authorization.