| Day | Task | Start Date | Completion Date | Reference Material |
|---|---|---|---|---|
| 1 | - Cloud Computing: Deep research into cloud computing models (IaaS, PaaS, SaaS) and core AWS benefits. - IAM: Practice creating and managing Users, Groups, Roles; applying security policies (IAM Policies) and MFA. - EC2: Detailed analysis of Instance types (General Purpose, Compute Optimized,…) and Pricing models (On-Demand, Spot, Reserved). |
20/10/2025 | 20/10/2025 | Cloud Computing IAM EC2 |
| 2 | - EC2 Storage: Compare differences between EBS, Instance Store, and EFS; practice mounting EFS to multiple instances. - ELB & ASG: Configure Elastic Load Balancer (ELB) for load distribution and Auto Scaling Group (ASG) for automatic resource scaling. |
21/10/2025 | 21/10/2025 | EC2 Storage ELB & ASG |
| 3 | - S3: Explore Storage Classes (Standard, IA, Glacier), configure Versioning, and setup Lifecycle Policies for cost optimization. - Databases: Overview of managed database services: RDS (SQL), DynamoDB (NoSQL), ElastiCache, and Redshift. |
22/10/2025 | 22/10/2025 | S3 Databases |
| 4 | - Deploying: Understand Infrastructure as Code process with CloudFormation and application management with Elastic Beanstalk. - Global Infrastructure: Master concepts of Regions, Availability Zones (AZs), and Edge Locations to design high-availability systems. |
23/10/2025 | 23/10/2025 | Deploying Global Infrastructure |
| 5 | - Cloud Integration: Loosely coupled application integration using SQS (Message Queue) and SNS (Notification). - Cloud Monitoring: Monitor system metrics with CloudWatch, track user activity logs with CloudTrail, and manage configuration with AWS Config. |
24/10/2025 | 24/10/2025 | Cloud Integration Cloud Monitoring |
| 6 | - VPC: Design Private Cloud virtual network including Subnets, Route Tables, Security Groups, and NACLs to control network traffic. - Security & Compliance: Understand Shared Responsibility Model, use Inspector for security assessment, and Shield for DDoS protection. |
25/10/2025 | 25/10/2025 | VPC Security Compliance |