UNIT-III: Amazon Web Services (AWS) Introduction
● Getting Started with AWS: Creating an account, using the
    Management Console, understanding Regions and Availability
    Zones.
 ● AWS Compute: Services for processing power. Amazon EC2
    provides virtual servers.
 ● AWS Storage: Services for storing data. Amazon S3 for object
    storage, Amazon EBS for block storage for EC2, Amazon Glacier
    for archiving.
 ● AWS Networking: Services for networking cloud resources.
    Amazon VPC for isolated private networks, Route 53 for DNS,
    Elastic Load Balancing (ELB) for distributing traffic.
 ● AWS Security:
      ○ Shared Responsibility Model: AWS secures the cloud
         hardware, you secure your data and access in the cloud.
      ○ Identity and Access Management (IAM): Manages user
         access to AWS services using permissions based on the
         "least privilege" principle.
 ● AWS Database Options: Amazon RDS for relational databases,
    Amazon DynamoDB for NoSQL, Amazon Redshift for data
    warehousing.
 ● AWS Elasticity: Automatically scaling resources based on
    demand. Auto Scaling service helps achieve this.
 ● Management Tools: AWS CloudWatch for monitoring, AWS
    CloudFormation for Infrastructure as Code, AWS CLI for
    command-line management.
     4.AWS. Introduction to System Design: Planning how
     application components work together on AWS.
●   AWS Essentials Review: Recap of core services.
●   System Design for High Availability (HA): Designing systems
     that stay operational if components fail using multiple
     Availability Zones, ELB, and Auto Scaling.
●   Automation: Automating tasks like deployment and
     configuration using tools like CloudFormation and CodeDeploy.
●   Serverless Architectures: Running applications without
     managing servers. AWS Lambda runs code based on events,
     and you pay only for compute time.
●   Well-Architected Best Practices (The 5 Pillars): A framework
     for building secure, efficient, and cost-effective architectures.
       ○ Security: Protecting data and systems using services like
          IAM and VPC Security Groups.
       ○ Reliability: Recovering from disruptions and scaling to
          meet demand using Multi-AZ and Auto Scaling.
       ○ Performance Efficiency: Using resources efficiently and
          maintaining efficiency as demand changes using
          appropriate EC2 instance types and Auto Scaling.
       ○ Cost Optimization: Avoiding unneeded costs using
          Reserved Instances and Cost Explorer.
       ○ Operational Excellence: Running n monitoring systems n
          improving processes using CloudFormation n CloudWatch.
●   Cost Optimization and Deployment: Strategies to reduce
     costs and plan application deployments.
● Design Patterns and Sample Architectures: Common
     solutions for specific problems using various AWS services.
UNIT-V: Cloud Security Tools and Technologies
 ● Cloud Security Tools and Technologies: Tools to secure data
    in private and public clouds.
      ○ Encryption: Protecting data using services like AWS KMS.
      ○ Identity and Access Management (IAM): Controlling who
         can access what.
      ○ VPNs & Direct Connect: Securely connecting on-premises
         networks to AWS.
      ○ Firewalls: Network security groups and AWS WAF to filter
         traffic.
      ○ Intrusion Detection/Prevention Systems (IDS/IPS):
         Monitoring for malicious activities (e.g., AWS GuardDuty).
      ○ Data Loss Prevention (DLP): Preventing sensitive data
         from leaving the cloud (e.g., Amazon Macie).
      ○ Security Monitoring & Logging: Tools like AWS CloudTrail
         and CloudWatch.
 ● Security Concerns: Data breaches, misconfigured cloud
    settings, insecure APIs, account hijacking, insider threats.
 ● Compliance & Auditing: Meeting regulations like HIPAA and
    GDPR. AWS provides certifications.
 ● Legal Issues and Aspects: Data sovereignty, data privacy
    regulations, SLAs.
 ● Multi-tenancy Issues: Security risks in environments where
    multiple customers share infrastructure if isolation is not
    properly implemented.
 ● Cloud Simulation: Modeling and testing cloud environments
    before deployment to understand performance, cost, and
    vulnerabilities.