0% found this document useful (0 votes)
5 views

Report-ENROLLMENT - Aaryan Yadav

Uploaded by

en21cs303001
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

Report-ENROLLMENT - Aaryan Yadav

Uploaded by

en21cs303001
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 35

INDUSTRIAL TRAINING REPORT

AWS: CLOUD BASED SERVICES

Submitted in partial fulfillment of requirement of the Degree of


BACHELOR OF TECHNOLOGY
in
COMPUTER SCIENCE & ENGINEERING

SUBMITTED BY SUBMITTED TO
Name – Aaryan Yadav Dr. S.N Rao
Enroll. No. – EN21CS303001
Section – Data Science (A)

Department of Computer Science & Engineering


Faculty of Engineering
MEDI-CAPS UNIVERSITY, INDORE-453331

Aug-Dec 24
Report Approval

The Industrial Training Report entitled “AWS: Cloud Based Services” is here by
approved as a creditable study of an engineering subject carried out and presented
in a manner satisfactory to warrant its acceptance as prerequisite for the Degree for
which it has been submitted.
It is to be understood that by this approval the undersigned do not endorse or
approved any statement made, opinion expressed, or conclusion drawn therein ;but
approve the “Industrial Training Report” only for the purpose for which it has been
submitted.

Internal Examiner Name:


Designation:
Affiliation:

External Examiner Name:


Designation:
Affiliation:

ii
Declaration

I hereby declare that the Offline Internship entitled “AWS Cloud


Practitioner” submitted in partial fulfillment of the requirements for the
award of the degree of Bachelor of Technology in ‘Computer Science
& Engineering’ has been completed under the supervision of Prof.
Ashok Kumar, at Medicaps University , from June 17 to August 17.
Further, I declare that the content of this Industrial Training, in full or in
parts, have neither been taken from any other source nor have been
submitted to any other Institute or University for the award of any degree
or diploma.

Aaryan Yadav
12 /11/2024

iii
Certificates

iv
v
Acknowledgements

I would like to express my deepest gratitude to Honorable Chancellor, Shri R C


Mittal, who has provided me with every facility to successfully carry out this
Industrial Training ,and my profound indebtedness to Prof.(Dr.) Dilip Kumar
Patnaik,ViceChancellor,Medi-CapsUniversity,whoseunfailingsupportand
enthusiasm has always boosted up my morale. I also thank Prof. (Dr.) Pramod S.
Nair, Dean, Faculty of Engineering, Medi-Caps University, for giving me a chance
to work on this Industrial Training. I would also like to thank my Head of the
Department Prof.(Dr.) Ratnesh Litoriya for his continuous encouragement for
betterment of the Industrial Training.

I express my heartfelt gratitude to my Instructor and Guide Dr. S.N Rao, Department
of Computer Science and Engineering, Medicaps University, without whose
continuous help and support, this Industrial Training would ever have reached to the
completion.

It is their help and support, due to which we became able to complete the design and
technical report.

Without their support this report would not have been possible.

Name – Aaryan Yadav


Enroll. No. – EN21CS303001
Section – Data Science (A)
B.Tech ( IV Year)
Department of Computer Science & Engineering Faculty of Engineering
Medi-Caps University, Indore

vi
Table of Content
S.No. Content Page No.
1. Report Approval ii
2. Declaration iii
3. Certificate iv,v
4. Acknowledgment vi
5. Table of Contents vii
6. List of Figures 8
Chapter1 Introduction 9
About Cloud Computing 9
Cloud Deployment Models 10
What is AWS? 12
AWS Pricing Model 14
AWS Cloud Security 17

Chapter2 Specific Assignment / Project Handled: Tools 21


Technology Used; Training Schedule: Work Done /
Observations
Tools and Technologies Used 22
Training Schedule 23
Work Done 24
Observations 25
Chapter3 Learning after Training 27
Introduction 27
Importance of Learning After Training 28
Chapter4 Discussion 29
Relevance of the Project in the Recruitment Industry 29
Project Scope and Innovation 30
Challenges Faced During Development 31
Chapter5 Conclusion 32
7. Reference 34

vii
List of Figures

1. Fig 1.1- IAAS,PAAS,SAAS

2. Fig 1.2- Cloud deployment types

3. Fig 1.3- AWS & types of services

4. Fig 1.4- AWS Billing Dashboard.

5. Fig 1.5- AWS Cloud Security.

6. Fig 2.1- AWS Courses.

8
Chapter I
Introduction about the Industry:

1. About Cloud Computing


• Cloud computing is the delivery of various computing services over the internet ("the
cloud"), allowing users to access resources such as storage, processing power, and
applications remotely instead of using local servers or personal computers. This
approach enables flexibility, scalability, and often cost savings, as users can pay only
for the resources they use rather than maintaining their own hardware and
infrastructure.

• Key Components of Cloud Computing


• Infrastructure as a Service (IaaS): Provides virtualized computing resources over the
internet. Examples include Amazon Web Services (AWS) and Microsoft Azure, which
offer storage, virtual servers, and networking capabilities.
• Platform as a Service (PaaS): Supplies a platform for developers to build and deploy
applications without managing underlying infrastructure. Examples include Google App
Engine and Microsoft Azure App Services.
• Software as a Service (SaaS): Delivers software applications over the internet on a
subscription basis, allowing users to access software on any device with an internet
connection. Examples include Google Workspace and Salesforce.

Fig 1.1- IAAS,PAAS,SAAS

9
2. Cloud Deployment Models

• Cloud deployment models describe the ways in which cloud services are deployed and
accessed by users. These models vary based on factors like infrastructure ownership,
access levels, and the specific needs of organizations. Here are the primary cloud
deployment models:
• Public Cloud

Overview: In a public cloud model, a third-party provider owns and operates the
infrastructure and resources. These resources are made available to multiple users
(tenants) over the internet.

Advantages:

o Cost-effective, as users only pay for what they consume.


o High scalability, allowing organizations to scale resources up or down easily.
o Minimal maintenance, since the cloud provider handles the infrastructure.

Examples: Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform
(GCP).

• Private Cloud

Overview: A private cloud is dedicated to a single organization, with infrastructure


typically managed either by the organization itself or a third party but not shared with
other tenants.

Advantages:

o Greater control over security, compliance, and data privacy.


o Customizable to fit specific organizational needs and regulatory requirements.
o Ideal for sensitive data and critical applications.

Examples: VMware Cloud on AWS, IBM Cloud Private.

• Hybrid Cloud

Overview: Hybrid cloud combines both public and private clouds, allowing data and
applications to be shared between them. Organizations can keep sensitive workloads in
the private cloud while using the public cloud for less critical resources.

Advantages:

o Flexibility to manage different workloads in the most suitable environment.


o Enhanced security for sensitive data and applications.
o Allows for more efficient resource use and cost optimization.
10
Examples: Azure Stack, Google Anthos, AWS Outposts.

• Community Cloud

Overview: A community cloud is shared by multiple organizations with similar needs


or regulatory requirements, such as government agencies or healthcare institutions.
The infrastructure is jointly used and managed by the participating organizations.

Advantages:

o Cost-effective for organizations with similar needs, as they can share


infrastructure costs.
o Improved collaboration and shared security measures.
o Customizable to meet the specific standards and policies of the community.

Examples: Government or university community clouds, some healthcare-specific


clouds.

Fig 1.2- Cloud deployment types

11
3. What is AWS?

• Amazon Web Services (AWS) is a comprehensive and widely used cloud computing
platform developed by Amazon. AWS provides a broad range of cloud services that
enable organizations to store data, run applications, and manage computing resources
remotely, without the need for on-premises hardware. AWS offers scalable, flexible, and
cost-effective solutions that help businesses of all sizes—from startups to large
enterprises—manage their IT resources efficiently.

Key Components of AWS

• Compute Services
o Amazon EC2 (Elastic Compute Cloud): Offers virtual servers (or instances) to
run applications and workloads. EC2 allows users to scale up or down as needed,
providing on-demand computing power.
o AWS Lambda: A server-less computing service that runs code in response to
events without requiring server management.
o Elastic Beanstalk: Simplifies application deployment by automatically managing
capacity provisioning, load balancing, and scaling.
• Storage Services
o Amazon S3 (Simple Storage Service): An object storage service that provides
scalable storage for data backup, archiving, and application data.
o Amazon EBS (Elastic Block Store): Provides persistent block storage for use
with Amazon EC2.
o Amazon Glacier: Offers low-cost storage designed for data archiving and long-
term backup.
• Database Services
o Amazon RDS (Relational Database Service): Manages and scales relational
databases like MySQL, PostgreSQL, Oracle, and SQL Server.
o Amazon DynamoDB: A fully managed NoSQL database service known for its
fast, predictable performance.
o Amazon Redshift: A data warehousing service optimized for complex data
queries and analytics.
• Networking Services
o Amazon VPC (Virtual Private Cloud): Enables users to define a private
network within the AWS cloud, enhancing security and control over data flow.
o Elastic Load Balancing (ELB): Automatically distributes incoming application
traffic across multiple instances, improving reliability and availability.
o Route 53: A scalable Domain Name System (DNS) service to manage domains
and route end-user requests.
• Developer Tools
o AWS CodePipeline: Automates the code release process, allowing for continuous
delivery.
o AWS CodeBuild: Compiles source code, runs tests, and produces software
packages ready for deployment.
o AWS CodeDeploy: Automates application deployments to Amazon EC2, AWS
Lambda, and on-premises servers.

12
• Machine Learning and Artificial Intelligence
o Amazon SageMaker: A fully managed service that enables developers to build,
train, and deploy machine learning models quickly.
o Amazon Rekognition: Provides image and video analysis for facial recognition,
object detection, and other capabilities.
o Amazon Comprehend: A natural language processing (NLP) service that enables
text analysis for sentiment, key phrases, and topics.
• Security and Identity Services
o AWS Identity and Access Management (IAM): Controls user access and
permissions to AWS services and resources.
o AWS Key Management Service (KMS): Manages cryptographic keys for
securing data.
o Amazon GuardDuty: A threat detection service that continuously monitors for
malicious activity and unauthorized behavior.

Fig 1.3- AWS & types of services.

13
4. AWS Pricing Model

• AWS pricing is structured to be flexible and cost-effective, offering several models to


help users optimize costs based on their usage patterns and needs. AWS operates on a
pay-as-you-go pricing model, with multiple options for customizing how resources are
paid for and utilized. Here’s a breakdown of AWS’s primary pricing models:
• Pay-as-You-Go
Overview: In this model, users only pay for the resources they consume, with no upfront
commitments. Charges are based on usage per second, minute, or hour, depending on the service.

Ideal For: Dynamic or short-term workloads with unpredictable usage patterns.

Example: With Amazon EC2, you pay for compute hours only when instances are running.
Similarly, with Amazon S3, you’re charged based on the amount of storage used and the data
requests made.

• Savings Plans
Overview: Savings Plans offer significant discounts on AWS compute services (like EC2 and
Fargate) in exchange for a commitment to a consistent amount of usage over a 1- or 3-year term.

Types of Savings Plans:

o Compute Savings Plans: Provide the most flexibility, as they apply across AWS regions
and instance types.
o EC2 Instance Savings Plans: Offer higher discounts for committing to specific instance
families within a chosen region.

Ideal For: Workloads with predictable and consistent usage, as they can save up to 72%
compared to pay-as-you-go pricing.

• Reserved Instances (RIs)


Overview: Reserved Instances allow users to make a long-term commitment (1- or 3-year term)
for specific EC2 instance types in return for up to 75% cost savings over the pay-as-you-go model.

Flexible Options:

o Standard RIs: Offer the highest discount for specific instance types and regions. These
can be modified for availability zone, instance size, etc.
o Convertible RIs: Allow instance type flexibility and can be exchanged across different
instance types within the same instance family.

Ideal For: Stable workloads with predictable usage that will likely remain unchanged over time,
such as databases or applications with steady demand.

• Spot Instances

14
Overview: AWS offers spare EC2 capacity at steep discounts—up to 90% off compared to on-
demand pricing. Spot Instances are ideal for fault-tolerant and flexible applications, as instances
can be interrupted when AWS needs the capacity back.

Ideal For: Non-time-sensitive, fault-tolerant workloads like batch processing, big data jobs, or
development environments where interruptions are acceptable.

• Dedicated Hosts
Overview: Dedicated Hosts provide physical servers dedicated to a single customer, offering
more control over server placement and allowing the use of existing software licenses that require
physical hardware.

Ideal For: Regulatory or licensing requirements that need dedicated hardware, or for applications
requiring consistent hardware configurations.

• Free Tier
Overview: AWS offers a free tier for new customers, which includes a set amount of usage for
certain services. The free tier has three main types:

o Always Free: Services that are always free up to a certain usage limit (e.g., 1 million
requests per month on AWS Lambda).
o 12-Month Free: Services that are free for 12 months from account creation, such as 750
hours of EC2 compute time on certain instance types.
o Trials: Temporary free access to try specific services.

Ideal For: New users who want to explore AWS services at no cost and learn about the platform
before committing financially.

• Other Pricing Models for Specialized Services


Data Transfer: Charges are based on the amount of data transferred out of AWS regions or from
certain services.

Storage Pricing Tiers: For storage services like S3, pricing is based on data stored, request and
retrieval fees, and data transfer.

Serverless Services (e.g., AWS Lambda): Billed based on the number of requests and duration
of execution, allowing for fine-grained control over compute costs.

15
Fig 1.4- AWS Billing Dashboard.

16
5. AWS Cloud Security

• AWS cloud security encompasses a comprehensive set of practices, tools, and services
designed to protect data, workloads, and applications in the Amazon Web Services
(AWS) environment. AWS operates on a shared responsibility model, where AWS is
responsible for the security of the cloud infrastructure itself, while customers are
responsible for securing their own data, applications, and configurations within the cloud.
• Shared Responsibility Model

AWS Responsibilities: AWS manages the security of the physical infrastructure that hosts
all the services in its cloud environment. This includes physical security of data centers,
hardware maintenance, and network infrastructure protection.

Customer Responsibilities: Customers are responsible for securing the applications, data,
and configurations they deploy within AWS. This includes managing identity and access,
encrypting data, configuring network security, and ensuring compliance with relevant
standards.

1. AWS Security Services

Identity and Access Management (IAM): AWS IAM is the cornerstone of AWS security,
allowing customers to manage user permissions, define roles, set policies, and enforce multi-
factor authentication (MFA). IAM enables precise access control, helping to restrict who can
access resources.

AWS Key Management Service (KMS): AWS KMS provides a fully managed key
management system that lets customers create and control encryption keys for data
protection. KMS integrates with other AWS services, allowing customers to encrypt data
easily across storage and compute services.

AWS CloudHSM: For organizations needing dedicated hardware for compliance reasons,
AWS CloudHSM offers hardware security modules (HSMs) for key management, enabling
customers to meet strict compliance requirements.

AWS Shield: A managed Distributed Denial of Service (DDoS) protection service, AWS
Shield comes in two tiers—Standard (automatically enabled) and Advanced (providing
additional protection and reporting for critical workloads).

AWS Web Application Firewall (WAF): AWS WAF helps protect applications against
common web exploits, such as SQL injection and cross-site scripting (XSS). WAF integrates
with CloudFront and Application Load Balancer to block malicious traffic.

Amazon GuardDuty: GuardDuty is an intelligent threat detection service that continuously


monitors for malicious activity and unauthorized behavior. It uses machine learning and
threat intelligence to detect and alert on threats in AWS accounts.

17
AWS Inspector: Inspector is a vulnerability assessment tool that analyzes Amazon EC2
instances for security flaws. It provides a report on potential risks and helps prioritize patches
or configuration changes.

AWS Secrets Manager: Secrets Manager helps manage, retrieve, and rotate secrets, such as
database credentials or API keys, allowing secure storage and automatic rotation.

AWS Config: AWS Config provides continuous monitoring of AWS resources, helping to
maintain compliance and track configuration changes over time. It enables security auditing
by recording changes in configuration settings and evaluating them against predefined
security policies.

2. Encryption and Data Protection

Encryption at Rest: AWS supports encryption at rest through AWS-managed services like
S3, RDS, and EBS, allowing data to be encrypted without customer involvement. Customers
can use AWS-managed keys or bring their own keys through KMS or CloudHSM.

Encryption in Transit: AWS secures data in transit using SSL/TLS protocols, ensuring that
data is protected when moving between AWS services, applications, and users.

Data Classification and Masking: AWS helps customers implement data classification and
masking, essential for handling sensitive data in compliance with privacy laws and standards.

3. Identity and Access Management (IAM)

Roles and Permissions: IAM enables the creation of roles with specific permissions,
controlling access to resources based on the least privilege principle. It uses policies (written
in JSON) that specify what actions are allowed or denied for a user or role.

Multi-Factor Authentication (MFA): AWS recommends MFA to enhance security. IAM


policies enforce MFA for sensitive operations, helping to secure accounts even if credentials
are compromised.

Federation and Single Sign-On (SSO): AWS integrates with existing identity providers to
enable SSO. IAM federation allows users to access AWS resources without requiring
separate AWS credentials.

4. Network Security

Virtual Private Cloud (VPC): AWS VPC allows users to create isolated networks within
AWS, configuring subnets, route tables, and gateways. Customers can define their IP range,
segment their network, and set up security groups and Network Access Control Lists
(NACLs) to control traffic at various levels.

Security Groups and NACLs: Security groups act as virtual firewalls for EC2 instances,
while NACLs provide a layer of security for subnets within a VPC. These tools allow
customers to control inbound and outbound traffic based on IP addresses and ports.
18
PrivateLink and VPNs: AWS PrivateLink and VPNs secure connections between AWS
resources and on-premises environments, reducing exposure to the public internet.

5. Compliance and Certifications

ISO/IEC 27001, 27017, and 27018: Certifications for information security, cloud security,
and privacy.

SOC 1, SOC 2, and SOC 3: Reports that validate controls around security, availability,
processing integrity, confidentiality, and privacy.

HIPAA, PCI DSS, FedRAMP, and GDPR: Compliance frameworks for healthcare data,
payment card data, U.S. government data, and data privacy, respectively.

6. Monitoring, Logging, and Threat Detection

Amazon CloudWatch: CloudWatch monitors resources and applications, collects metrics,


and enables alerting based on thresholds. It can also perform actions like scaling resources
when usage metrics indicate increased demand.

AWS CloudTrail: CloudTrail records API calls, providing an audit trail of all actions taken
within an AWS account. This helps with both security auditing and operational
troubleshooting.

AWS Security Hub: Security Hub aggregates and prioritizes security alerts from across
AWS services. It provides a centralized dashboard with recommendations based on best
practices.

Amazon Detective: Detective automatically collects and analyzes log data to help security
teams identify, investigate, and understand the root causes of security issues.

7. Incident Response and Recovery

Automated responses: Leveraging AWS Lambda to trigger actions based on security alerts.

Backup and Disaster Recovery: AWS offers services like S3, Glacier, and AWS Backup
for data backup, archiving, and disaster recovery.

Runbooks and Playbooks: Detailed instructions and predefined scripts can be developed to
respond quickly to security incidents.

8. AWS cloud security provides the tools, practices, and support needed for organizations to
protect their data and applications. With the shared responsibility model, AWS secures
the infrastructure while giving customers the control and resources to implement their
own security measures, making it a powerful and flexible platform for secure cloud
computing.

19
Fig 1.5- AWS Cloud Security.

20
Chapter II

Specific Assignment / Project Handled: Tools Technology Used; Training


Schedule: Work Done / Observations:
• At the end of each course completed, the AWS platform rewards you with a badge which in
turn leads to the obtainment of the respected course certificate. The Foundation course takes
about 20 hours to complete whereas the Architecture course takes about 60 hours to
complete. Since the latter course has more advanced implementation and real world problem
solving related modules which will help in complete development and understanding of the
platform and its services.

1. AWS Cloud Computing Foundation Course

• Tools and Technology Used

AWS Management Console: Main interface for interacting with and managing AWS
services.

AWS Identity and Access Management (IAM): Used for managing user permissions and
roles within AWS.

Amazon EC2 (Elastic Compute Cloud): Provides virtual servers, helping to understand
compute resources.

Amazon S3 (Simple Storage Service): Used for storing and retrieving data objects,
understanding storage services.

AWS Lambda: Serverless computing service, demonstrating event-driven functions.

Amazon RDS (Relational Database Service): Introduction to managed databases.

AWS CloudFormation: Service for infrastructure as code, to define and provision


infrastructure.

AWS CloudWatch: Used for monitoring resources and setting alerts.

• Training Schedule

Week 1: Introduction to Cloud Computing and AWS, setting up the AWS Management
Console, understanding the shared responsibility model, and exploring basic AWS services.

Week 2: Introduction to compute services with Amazon EC2, configuring and launching
instances, and understanding IAM policies and roles.

21
Week 3: Understanding storage options and using Amazon S3 for object storage, S3 bucket
policies, and data management.

Week 4: Introduction to serverless computing with AWS Lambda, building simple event-
driven applications.

Week 5: Introduction to databases with Amazon RDS, setting up databases, and


understanding data security options.

• Week 6: Overview of monitoring and logging with AWS CloudWatch, creating and
responding to alerts.

• Work Done / Observations

IAM: Learned the importance of role-based access control and how IAM policies can secure
resources. Observed how multi-factor authentication (MFA) increases account security.

EC2: Launched and configured instances, learning about instance types, storage options, and
security groups. Understood how scaling and cost optimization can be achieved.

S3: Worked with S3 bucket configurations, set up access policies, and explored lifecycle
management for cost-effective storage.

Lambda: Created and deployed serverless functions, gaining insight into how AWS Lambda
supports low-latency event-driven processing.

RDS: Set up an RDS instance, observed the automation of backups and replication, and
understood how managed services reduce administrative overhead.

CloudWatch: Set up monitoring for resources, configured alerts, and understood how
CloudWatch can help in operational monitoring and troubleshooting.

22
2. AWS Cloud Computing Architecting Course

• Tools and Technology Used

Amazon VPC (Virtual Private Cloud): Used to design secure network architectures and
isolated networks within AWS.

Elastic Load Balancing (ELB): Learned about distributing traffic across instances for high
availability.

Auto Scaling: Used for scaling compute resources based on demand.

AWS CloudFormation: Deployed complex infrastructure using code templates, gaining


hands-on experience with infrastructure as code.

AWS Trusted Advisor: Utilized for best practice recommendations on security, cost
optimization, and performance.

Amazon Route 53: Configured DNS routing for web applications.

AWS Well-Architected Tool: Reviewed best practices for architecture, particularly focusing
on the security and cost pillars.

AWS Systems Manager: Used for centralized management and operational insights.

• Training Schedule

Week 1: Overview of cloud architecture principles, introducing concepts of scalability,


elasticity, and fault tolerance.

Week 2: Deep dive into networking with Amazon VPC, designing public and private
subnets, configuring NAT gateways, and setting up security groups and NACLs.

Week 3: Introduction to Elastic Load Balancing and Auto Scaling, setting up load balancing
and implementing auto-scaling policies.

Week 4: Infrastructure as Code with AWS CloudFormation, building reusable templates and
managing versioning.

Week 5: Understanding DNS and routing with Amazon Route 53, setting up custom
domains, and understanding routing policies.

Week 6: Security and compliance best practices with AWS Trusted Advisor and Well-
Architected Tool, reviewing recommendations for cost and performance.

Week 7: Centralized management with AWS Systems Manager, understanding patching,


inventory, and configuration management.
23
• Work Done / Observations

VPC: Designed a secure VPC architecture, observed the importance of network isolation and
configuring firewall rules for fine-grained access control.

ELB and Auto Scaling: Set up load balancing and auto-scaling policies, understanding how
these services ensure application availability during peak demand.

CloudFormation: Used CloudFormation templates to automate infrastructure deployment,


gaining insights into version control and replicability in infrastructure.

Route 53: Configured routing policies and custom domains, understanding how DNS routing
works in a scalable architecture.

Trusted Advisor and Well-Architected Tool: Reviewed security and cost


recommendations, which provided actionable insights into optimizing architecture based on
AWS best practices.

Systems Manager: Centralized management of instances, configured automation scripts for


patching and maintenance, and observed how operational efficiency can be improved.

• About AWS Architecting course

• The AWS Cloud Architecting course offers a deep dive into the principles, practices, and
tools needed to design scalable, resilient, and secure applications on the AWS platform.
Designed for professionals who aim to work as cloud architects, this course helps participants
build strong foundational knowledge on how to leverage AWS services to architect optimal
solutions for various business scenarios.

• The course begins with an introduction to AWS’s core services, including foundational
topics such as the global infrastructure of AWS, understanding regions, availability zones,
and edge locations. Students learn the concept of a "shared responsibility model," where
AWS manages the underlying infrastructure's security, while customers are responsible for
securing the workloads they deploy. This distinction is key for architects, as it informs
decisions on configuring resources, setting up permissions, and managing data flow within a
given architecture.

24
• Networking is a major focus of the course, as architects must understand how to design a
robust, secure network for cloud deployments. The course delves into Amazon Virtual
Private Cloud (VPC), explaining how to isolate networks and create secure environments
with subnets, route tables, network access control lists, and security groups. This section also
covers hybrid cloud setups using AWS Direct Connect and VPNs, enabling participants to
connect on-premises environments with AWS cloud infrastructure. By the end, participants
understand how to build secure, flexible network architectures that support high availability
and are optimized for various workloads.

• As the course progresses, the focus shifts to compute, storage, and database services.
Students explore Amazon EC2 instances, understanding various instance types and how to
scale them dynamically using Auto Scaling. For storage, they study Amazon S3 and Amazon
EBS, with discussions on durability, data redundancy, and backup strategies. Database
options, including Amazon RDS and Amazon DynamoDB, are explored in depth, allowing
architects to make informed decisions about relational versus non-relational databases based
on the application’s needs. Here, participants also learn about AWS’s serverless offerings
like AWS Lambda, understanding how these can reduce overhead and create scalable, event-
driven applications.

• A unique aspect of the AWS Cloud Architecting course is its focus on designing for security
and compliance. Participants learn best practices for securing applications, including identity
and access management (IAM), encryption, and secure application development. Tools like
AWS Key Management Service (KMS), AWS CloudTrail, and Amazon GuardDuty are
covered to ensure architects know how to safeguard data, monitor activities, and detect
threats proactively. Additionally, compliance-related topics introduce architects to AWS’s
adherence to global standards like GDPR, HIPAA, and PCI DSS, which is essential
knowledge for designing architectures that meet regulatory requirements.

• The course also highlights cost optimization, a critical aspect of cloud architecture.
Participants gain insights into AWS pricing models and learn how to use services like AWS
Trusted Advisor to identify savings opportunities. They are taught how to estimate and
control costs for various workloads by selecting appropriate instance types, implementing
right-sizing strategies, and leveraging Savings Plans or Reserved Instances. By understanding
the financial implications of their architectural choices, architects can ensure cost-effective
solutions for their organizations or clients.

• Monitoring and operational excellence are emphasized, with practical coverage of AWS’s
monitoring and automation tools. Students learn to use Amazon CloudWatch to set up
alarms, track metrics, and ensure that applications perform optimally. They also dive into
AWS Systems Manager, which simplifies the management of application resources through
25
automated patching, configuration compliance, and inventory tracking. This allows architects
to build reliable systems that are not only resilient but also self-healing, with minimal manual
intervention required.

• Overall, the AWS Cloud Architecting course is comprehensive, equipping participants with
the necessary skills to design and manage AWS solutions effectively. Through hands-on labs,
real-world scenarios, and best practices derived from AWS’s extensive experience, the
course prepares participants to make informed, strategic decisions in cloud architecture.

Fig 2.1- AWS Courses.

26
Chapter III
Learning after Training

Introduction
• Learning continues after AWS courses through a combination of hands-on practice,
engaging with the AWS community, and staying updated on the latest AWS
advancements. After training, one of the most effective ways to solidify and expand
knowledge is by applying concepts in real-world projects. This hands-on approach builds
practical experience, especially when working with foundational services such as
Amazon EC2, S3, and IAM, along with more advanced tools like AWS Lambda, Elastic
Load Balancing, and CloudFormation for infrastructure automation.

Importance of Learning After Training

• Another valuable way to deepen knowledge is by engaging with AWS’s vibrant


community, which includes online forums, and user groups. Engaging with other
professionals offers fresh perspectives, shared experiences, and advice on complex
challenges, especially around specific industry use cases or new services. Community
interactions help bridge knowledge gaps and expose learners to best practices beyond
what’s taught in formal training sessions.
• Keeping skills sharp also involves continuous learning. AWS regularly releases new
services, features, and best practices, which can impact how architects, developers, and
administrators approach cloud projects. AWS blogs, whitepapers, and the Well-Architected
Framework, which details best practices across pillars like cost optimization, security, and
performance, are key resources for ongoing education. Regularly exploring these updates
ensures familiarity with new tools, optimizations, and compliance capabilities.

Real-World Applications of Learning After Training

• Finally, pursuing AWS certifications is a great next step for those interested in validating and
deepening their AWS expertise. Certification tracks, such as the AWS Solutions Architect or
Developer paths, provide a structured, progressively advanced approach to AWS learning,
with each level building on core AWS skills to offer in-depth knowledge across cloud
architecture, serverless computing, DevOps, and data engineering. Here are some key areas
where AWS-trained professionals can apply their knowledge in real-world scenarios:

27
1. Application and Infrastructure Modernization

• Post-training, many professionals find themselves tasked with modernizing legacy


applications and infrastructure. AWS provides a suite of services, such as Amazon EC2,
Amazon RDS, and Elastic Load Balancing, which support migration from on-premises
environments to the cloud. Real-world projects often involve using CloudFormation
templates to automate the setup of complex infrastructure, enabling efficient deployment and
scalability. Additionally, using Amazon Elastic Kubernetes Service (EKS) and AWS
Lambda for containerized and serverless architectures, respectively, allows companies to
modernize applications, enhance performance, and reduce operational overhead.

2. Machine Learning and AI Implementation

• AWS offers robust tools for machine learning, such as Amazon SageMaker, which allows
data scientists to build, train, and deploy machine learning models. After AWS training,
professionals can apply machine learning to real-world challenges, like predicting customer
churn, personalizing marketing efforts, or automating quality control processes. For instance,
a manufacturing company might use SageMaker and IoT data from sensors to predict
equipment failures, reducing downtime and maintenance costs. These applications drive
significant business value and improve operational efficiency.

3. E-commerce Solutions

• E-commerce companies can leverage AWS’s scalability and flexibility to handle large
volumes of transactions, especially during peak seasons like holidays. Using services like
Amazon RDS for database management, CloudFront for content delivery, and DynamoDB
for session handling, professionals can build highly responsive and reliable e-commerce
applications. AWS training equips teams to implement these solutions effectively, ensuring
smooth user experiences even during traffic surges. Additionally, machine learning services
like Amazon Personalize can enhance e-commerce platforms by providing personalized
product recommendations.

4. Disaster Recovery and Business Continuity Planning

• AWS’s global infrastructure, combined with its storage and replication services, enables
businesses to implement effective disaster recovery and continuity strategies. After AWS
training, professionals can create backup and recovery solutions using Amazon S3, Glacier,
and AWS Backup. In practice, a financial services firm might implement cross-region
replication and automated backups to ensure that critical data is available in the event of a
disaster. These solutions provide resilience, minimizing downtime, and protecting valuable
business data.
28
Chapter IV

Discussion

• The discussion around AWS courses, particularly in the areas of Fundamentals and
Architecting, highlights the essential role these training programs play in equipping
professionals with the knowledge and skills necessary to navigate the complexities of cloud
computing. As organizations increasingly migrate their workloads to the cloud,
understanding the foundational principles and architectural best practices becomes crucial for
effective cloud utilization.

1. AWS Fundamentals Training

• AWS Fundamentals courses serve as an introduction to cloud computing concepts and the
AWS ecosystem. They are designed for individuals with varying levels of experience,
including those who may be new to cloud technologies. The curriculum typically covers key
topics such as the basics of cloud computing, the benefits of using AWS, and an overview of
the core services offered, including computing (EC2), storage (S3), databases (RDS), and
networking (VPC).

• One significant advantage of the AWS Fundamentals training is its emphasis on the shared
responsibility model, which clarifies the security and compliance responsibilities of both
AWS and its customers. This understanding is vital for professionals, as it shapes how they
approach security in cloud environments. Additionally, the training includes hands-on labs
and exercises that enable participants to apply what they’ve learned in practical scenarios,
reinforcing their understanding of service configurations and best practices.

• Another critical aspect of the Fundamentals courses is the focus on cost management and
billing. As organizations strive to optimize their cloud spending, understanding AWS pricing
models, including On-Demand Instances, Reserved Instances, and Savings Plans, equips
learners with the knowledge needed to make informed decisions about resource allocation.
This financial literacy is increasingly important for cloud professionals, as it directly impacts
an organization’s bottom line.

2. AWS Architecting Training

29
• Building on the foundational knowledge, AWS Architecting courses delve deeper into the
principles and practices of designing scalable, resilient, and secure applications on the AWS
platform. These courses target individuals who aspire to work as solutions architects or those
involved in designing and implementing cloud solutions within their organizations.

• A key focus of the Architecting training is understanding how to leverage AWS services to
meet specific business requirements. This includes designing for high availability, fault
tolerance, and scalability using various AWS services like Elastic Load Balancing, Auto
Scaling, and AWS Lambda. Participants learn to architect solutions that can handle varying
workloads, ensuring that applications remain performant even during peak demand.

• Moreover, the Architecting courses emphasize the importance of security and compliance in
cloud design. Learners are taught best practices for implementing IAM policies, encryption,
and network security, which are crucial for protecting sensitive data and maintaining
compliance with industry regulations. The use of AWS tools like AWS Trusted Advisor and
AWS Well-Architected Tool also helps participants evaluate their architectures against best
practices and optimize for cost, performance, and security.

• Hands-on labs and case studies are integral to the Architecting courses, allowing participants
to engage in real-world scenarios that simulate the challenges faced by cloud architects. This
experiential learning not only builds technical skills but also enhances critical thinking and
problem-solving abilities, preparing individuals to make strategic decisions in their
organizations.

3. Integration of Fundamentals and Architecting Training

• The integration of Fundamentals and Architecting training provides a comprehensive


learning path for individuals looking to deepen their expertise in AWS. Understanding the
foundational concepts allows learners to appreciate the architectural decisions they will face
later on. For instance, knowing how different AWS services interact and the implications of
the shared responsibility model enables architects to design solutions that are both effective
and secure.

• Additionally, the progression from fundamental concepts to architectural strategies mirrors


the real-world career development of cloud professionals. Many start with foundational
knowledge and gradually move into more specialized roles focused on architecture, DevOps,
30
or data analytics. This structured learning approach ensures that participants build a solid
knowledge base while acquiring the advanced skills necessary to thrive in more complex
roles.

31
Chapter V

Conclusion

• In conclusion, AWS courses offer an invaluable opportunity for professionals to deepen their
understanding of cloud computing and acquire the skills needed to thrive in today’s
technology-driven environment. These courses cover a broad spectrum of topics, including
cloud architecture, application development, data analytics, and machine learning, catering to
a diverse audience with varying levels of expertise. By engaging with these subjects, learners
can harness the full potential of AWS services, transforming theoretical knowledge into
practical application.

• The emphasis on hands-on learning is a standout feature of AWS training. Participants


engage in real-world projects that mimic actual scenarios they might encounter in their
careers, fostering critical thinking and problem-solving abilities. This practical experience
not only reinforces learning but also enhances participants' resumes, making them more
attractive candidates in a competitive job market. Additionally, many courses prepare
individuals for AWS certifications, which are widely recognized and valued in the industry,
further validating their skills and knowledge.

• Moreover, AWS training emphasizes the importance of continuous learning and adaptation
in the rapidly changing field of cloud computing. As new services and technologies emerge,
the courses encourage a mindset of lifelong learning, equipping professionals with the tools
to stay current and relevant. This proactive approach is essential for navigating the
complexities of cloud architecture, security, and cost management, allowing organizations to
leverage AWS solutions effectively.

• Networking and collaboration are also crucial outcomes of AWS training. Participants often
have the chance to connect with peers, instructors, and industry professionals, fostering a
community of support and knowledge sharing. This network can be a valuable resource for
mentorship, collaboration on projects, and sharing insights about the latest developments in
cloud technology. Engaging with this community can inspire innovative ideas and
approaches to tackling cloud-related challenges.

• In a world increasingly reliant on cloud solutions, the skills and knowledge acquired through
AWS courses empower individuals and organizations to drive digital transformation.
32
Whether it’s optimizing existing infrastructures, migrating applications to the cloud, or
developing new, cloud-native applications, AWS-trained professionals are well-prepared to
lead their organizations into the future. The impact of these courses extends beyond technical
expertise; they shape strategic thinkers capable of leveraging cloud technology to enhance
business outcomes, improve operational efficiency, and foster innovation.

• Ultimately, AWS courses lay the groundwork for a successful career in cloud computing,
positioning individuals to contribute meaningfully to their organizations and the broader
technology landscape. By mastering AWS services and best practices, participants emerge as
confident cloud professionals ready to tackle the challenges of today’s digital age, ensuring
their relevance and effectiveness in a fast-evolving industry.

33
References

1. AWS Academy Canvas- https://awsacademy.instructure.com/login/canvas

2. Youtube- https://www.youtube.com/

3. GeeksforGeeks- https://www.geeksforgeeks.org/

34
35

You might also like