βοΈ DevOps [AWS Track]
Currently available in Islamabad
DevOps in 2026 is no longer a single role β it has fractured into specialisations: platform engineering, SRE, cloud security, ML Ops, and FinOps. But every one of those paths starts from the same foundation: Linux, networking, containers, CI/CD, and Infrastructure as Code on a major cloud platform. This course builds that foundation on AWS β the most widely used cloud platform in the world and the one that appears in the majority of remote DevOps job postings targeting Pakistan's IT export market.
The core program is designed to be completed in 4β5 weeks and covers everything a working DevOps engineer needs to be productive on day one: automated pipelines, containerised deployments, infrastructure as code, observability, and cost control. Advanced specialisations β Kubernetes, security, ML infrastructure, multi-cloud, and platform engineering β are offered as separate add-on tracks, each 2β3 weeks, so students can go deep on the areas most relevant to their career goals without paying for everything at once.
π‘ Why AWS DevOps in 2026
- AWS holds over 31% of the global cloud market β more than Azure and Google Cloud combined β making it the single most valuable cloud platform to know
- GitHub Actions has replaced Jenkins as the default CI/CD platform β simpler, cheaper, and better integrated with modern development workflows
- Terraform remains the most employer-demanded IaC tool globally β appearing in the vast majority of senior DevOps and platform engineering job postings
- Containers and Kubernetes are now baseline skills for any cloud infrastructure role β not advanced topics
- The shift-left security movement means DevOps engineers are now expected to own security scanning, secrets management, and compliance in the pipeline β not just deployment
- FinOps has become a mandatory skill as organisations try to control rapidly growing cloud bills
- Remote DevOps roles from Pakistan pay significantly above local market rates β AWS certification + hands-on project experience is the fastest path to these positions
π Core Program β 4 to 5 Weeks
(Foundation every DevOps engineer needs before specialising)
Week 1 β Linux, Networking & Shell Automation
DevOps starts with Linux. Every container, every EC2 instance, every CI/CD runner is a Linux environment. This week builds the operating system and networking knowledge that everything else sits on top of.
- Linux fundamentals for DevOps: process management, systemd services, file permissions, user management, and the /proc and /sys filesystems
- Shell scripting in Bash: variables, conditionals, loops, functions, error handling with set -euo pipefail, and writing production-grade automation scripts
- Text processing tools: grep, awk, sed, cut, sort, uniq, jq for JSON, and yq for YAML β the DevOps data transformation toolkit
- File system and storage: inodes, hard links, soft links, mount points, LVM, and disk usage analysis
- Networking fundamentals: TCP/IP, subnets (CIDR notation), routing tables, DNS resolution, NAT, and how packets move through a cloud VPC
- Linux networking tools: ip, ss, netstat, curl, wget, dig, nslookup, tcpdump, and nc for debugging connectivity
- TLS/SSL: how certificates work, the certificate chain, Let's Encrypt, and inspecting certificates with openssl
- SSH: key generation, SSH config files, agent forwarding, tunnelling, and hardening SSH server configuration
- Cron and systemd timers: scheduling recurring tasks reliably on Linux
- Vim and nano: enough editor proficiency to edit files on remote servers without a GUI
- Git advanced workflows: rebasing, cherry-picking, reflog, bisect, signed commits, and monorepo patterns
- Python for DevOps automation: writing scripts with boto3, subprocess, pathlib, and argparse β replacing Bash for complex automation
Week 2 β Docker & Containers in Depth
Containers are the unit of deployment in modern cloud infrastructure. This week covers Docker from first principles to production-quality container builds and multi-container orchestration.
- Container fundamentals: namespaces, cgroups, and the Linux kernel features that make containers possible β not just how to use Docker but why it works
- Docker architecture: the Docker daemon, containerd, runc, image layers, and the union filesystem (OverlayFS)
- Writing production Dockerfiles: multi-stage builds, minimal base images (distroless, alpine, scratch), non-root users, and build cache optimisation
- Docker image security: scanning with Trivy and Docker Scout, removing secrets from build context, and .dockerignore
- Docker networking: bridge, host, overlay, and macvlan drivers β inter-container communication and exposing ports
- Docker volumes: bind mounts vs named volumes, tmpfs, and managing persistent data in containers
- Docker Compose: multi-container application stacks β depends_on, health checks, environment files, and profiles
- Container registries: AWS ECR β pushing, pulling, tagging strategies, lifecycle policies, and cross-account access
- Container resource limits: CPU and memory limits in Docker β preventing noisy neighbour problems
- Docker in CI/CD: building and pushing images in GitHub Actions β layer caching in CI and multi-platform builds (ARM + AMD64) with buildx
- Debugging containers: docker exec, docker logs, docker inspect, and attaching to running containers
- Docker security: AppArmor/seccomp profiles, read-only root filesystems, and capability dropping
Week 3 β AWS Core Services & Infrastructure as Code with Terraform
AWS from the perspective of a DevOps engineer β not a developer using console buttons, but an infrastructure engineer provisioning everything as code, with proper networking, security, and automation.
AWS fundamentals for DevOps:
- AWS account structure: root account, IAM users, roles, policies, and the principle of least privilege in practice
- VPC architecture: subnets (public/private), route tables, internet gateways, NAT gateways, VPC endpoints, and security groups vs NACLs
- EC2: instance types, AMIs, launch templates, user data scripts, instance profiles, EBS volumes, and EC2 Auto Scaling Groups
- Load balancers: ALB (Layer 7) vs NLB (Layer 4) β target groups, health checks, listener rules, and SSL termination
- S3: bucket policies, versioning, lifecycle rules, cross-region replication, and S3 as a Terraform state backend
- RDS: managed PostgreSQL and MySQL β parameter groups, snapshots, read replicas, and Multi-AZ for high availability
- ElastiCache: Redis clusters β node types, replication groups, and failover
- IAM in depth: role assumption, cross-account roles, OIDC identity providers for GitHub Actions, and IAM Access Analyzer
- Route 53: hosted zones, record types, health checks, routing policies (weighted, latency, failover), and DNS validation for ACM certificates
- ACM (Certificate Manager): provisioning and renewing TLS certificates for ALB and CloudFront
- AWS CLI and aws-vault: authenticating securely, profile management, and scripting AWS operations
Terraform for AWS:
- Terraform core concepts: providers, resources, data sources, locals, variables, and outputs
- HCL in depth: expressions, functions, for_each, count, dynamic blocks, and the depends_on meta-argument
- Terraform state: local state vs remote state, S3 + DynamoDB locking, state isolation per environment
- Terraform modules: writing reusable VPC, ECS, and RDS modules β module versioning and the Terraform Registry
- Workspaces and environment promotion: dev β staging β production with separate state files
- Provisioning a complete AWS environment with Terraform: VPC, subnets, security groups, EC2 Auto Scaling, ALB, RDS, and S3
- Terraform Cloud and Atlantis: team-based IaC workflows with plan-on-PR and apply-on-merge
- Drift detection: identifying infrastructure that has diverged from Terraform state
- Checkov: static analysis of Terraform code for security misconfigurations before applying
- Terragrunt: DRY Terraform configurations across multiple environments
Week 4 β CI/CD with GitHub Actions & ECS Deployments
The complete pipeline: from code push to production deployment, automated, secure, and repeatable. GitHub Actions is the primary CI/CD platform β ECS Fargate is the production container hosting target.
GitHub Actions in depth:
- GitHub Actions architecture: workflows, jobs, steps, runners (GitHub-hosted and self-hosted), and the event model
- Workflow triggers: push, pull_request, schedule, workflow_dispatch, and repository_dispatch
- Jobs and dependencies: needs, matrix builds, and parallel job execution
- Secrets and variables: GitHub secrets, environment secrets, and OIDC-based AWS authentication without stored access keys
- Composite actions and reusable workflows: building a shared action library for your organisation
- Caching in GitHub Actions: actions/cache for npm, pip, Docker layers, and Terraform providers
- Environments and protection rules: requiring manual approval before deploying to production
- GitHub Actions security: pinning action versions to commit SHAs, least-privilege OIDC roles, and secret scanning
- Self-hosted runners on EC2: cost-efficient runners for large teams with private network access requirements
ECS Fargate deployments:
- ECS architecture: clusters, task definitions, services, tasks, and the Fargate launch type
- Task definitions: container definitions, resource limits, environment variables from Secrets Manager, log configuration with awslogs
- ECS services: desired count, deployment configuration (rolling update vs blue/green), and service auto-scaling
- Blue/green deployments with CodeDeploy: zero-downtime deployments β shifting traffic between task set versions
- ECS service discovery: AWS Cloud Map for service-to-service communication within a VPC
- ECS Exec: accessing running containers for debugging without SSH
- Complete CI/CD pipeline: GitHub Actions β Trivy scan β Docker build β push to ECR β Terraform plan β register new task definition β ECS service update β smoke test β notify
- Rollback strategy: automatic rollback on deployment failure and manual rollback procedures
- Lambda deployments: packaging Lambda functions, deploying with Terraform, and versioning with aliases
Week 5 β Observability, Security Basics & FinOps
The three concerns that occupy the most time in a working DevOps engineer's week: understanding what your systems are doing, keeping them secure, and keeping the bill reasonable.
Observability:
- The three pillars: metrics, logs, and traces β and why you need all three to debug production incidents
- CloudWatch Logs: log groups, log streams, structured JSON logging, metric filters, and log insights queries
- CloudWatch Metrics: built-in AWS metrics, custom metrics with PutMetricData, and metric math
- CloudWatch Alarms: threshold alarms, composite alarms, and routing alerts to SNS β Slack / PagerDuty
- CloudWatch Dashboards: building operational dashboards for ECS services, RDS, and Lambda
- AWS X-Ray: distributed tracing for Lambda and ECS β trace maps and segment analysis
- OpenTelemetry with AWS: the ADOT (AWS Distro for OpenTelemetry) Collector β receiving OTel spans and metrics and forwarding to CloudWatch and X-Ray
- Container Insights: ECS and EC2 cluster-level metrics β CPU, memory, network, and storage per task
- Structured logging best practices: correlation IDs, request tracing fields, and log level discipline
AWS security fundamentals:
- AWS Secrets Manager: storing and rotating database credentials, API keys, and certificates β application integration patterns
- AWS Systems Manager Parameter Store: lightweight secrets and configuration β SecureString parameters and path-based organisation
- IAM best practices: MFA enforcement, service control policies, permission boundaries, and Access Analyzer findings
- Security groups and NACLs: layered network security β stateful vs stateless filtering
- AWS GuardDuty: threat detection β understanding findings and automating remediation
- AWS Config: tracking resource configuration changes and compliance rules
- S3 security: blocking public access, bucket policies, server-side encryption, and VPC endpoint access
- Shift-left security in CI/CD: Trivy for container scanning, tfsec/Checkov for Terraform, and git-secrets for credential leak prevention
FinOps and cost control:
- AWS cost visibility: Cost Explorer, cost allocation tags, and per-team/per-service cost tracking
- AWS Budgets: setting budget alerts and automated actions when thresholds are breached
- Rightsizing: identifying over-provisioned EC2 and RDS instances with Compute Optimizer
- Reserved Instances and Savings Plans: committing to usage for 30β70% savings β 1-year vs 3-year, partial vs full upfront
- Spot Instances: using spot for fault-tolerant workloads (CI runners, batch jobs, stateless services) β interruption handling
- S3 storage classes: S3 Intelligent-Tiering, Glacier, and lifecycle policies to reduce storage costs
- NAT Gateway cost optimisation: one of the most consistently surprising AWS cost items β VPC endpoints as a replacement
- Data transfer costs: understanding cross-AZ, cross-region, and internet egress pricing
π Advanced Add-On Tracks
(Each track is 2β3 weeks β additional fee per track. Can be taken in any order after completing the core program.)
Advanced Track 1: Kubernetes & EKS (3 weeks)
Kubernetes is the most in-demand DevOps skill in the market and the most complex. This track dedicates three weeks to learning it properly β not just running deployments but understanding the internals, operating clusters safely, and building the platform layer on top of EKS.
Week 1 β Kubernetes fundamentals:
- Kubernetes architecture: control plane (API server, etcd, scheduler, controller manager) and worker nodes (kubelet, kube-proxy, container runtime)
- Core objects: Pods, ReplicaSets, Deployments, StatefulSets, DaemonSets, Jobs, and CronJobs β when each is appropriate
- Services: ClusterIP, NodePort, LoadBalancer, and ExternalName β service discovery with DNS
- Ingress and Ingress Controllers: NGINX Ingress, AWS ALB Ingress Controller β TLS termination and path-based routing
- ConfigMaps and Secrets: injecting configuration and sensitive data into Pods
- Persistent Volumes: PV, PVC, StorageClass, and the AWS EBS CSI driver for dynamic volume provisioning
- Namespaces and RBAC: isolating teams and workloads, ClusterRoles vs Roles, and ServiceAccounts
- Resource requests and limits: LimitRanges, ResourceQuotas, and the QoS classes (Guaranteed, Burstable, BestEffort)
- Health checks: liveness, readiness, and startup probes β writing probes that Kubernetes can trust
- Pod scheduling: nodeSelector, affinity/anti-affinity, taints and tolerations, and PodDisruptionBudgets
- Rolling updates and rollbacks: Deployment update strategy, maxUnavailable, maxSurge, and kubectl rollout
Week 2 β EKS in production:
- EKS cluster provisioning with Terraform: the eks Terraform module, managed node groups, Fargate profiles, and cluster add-ons
- EKS networking: the AWS VPC CNI plugin, pod IP assignment, security groups for pods, and network policy with Calico
- IAM Roles for Service Accounts (IRSA): giving Kubernetes pods least-privilege AWS permissions without static credentials
- EKS cluster upgrades: the upgrade sequence β control plane first, then node groups β zero-downtime upgrade strategy
- Karpenter: the next-generation Kubernetes node autoscaler β NodePools, NodeClaims, and consolidation
- Cluster Autoscaler: the traditional approach β understanding when to use Karpenter vs Cluster Autoscaler
- HPA and VPA: Horizontal and Vertical Pod Autoscalers β metrics-based scaling with custom metrics from Prometheus
- EKS add-ons: CoreDNS, kube-proxy, AWS EBS CSI driver, and the AWS Load Balancer Controller β managed via Terraform
- Secrets management on EKS: External Secrets Operator with AWS Secrets Manager β syncing secrets to Kubernetes automatically
- EKS observability: Container Insights with Fluent Bit log forwarding, Prometheus + Grafana on EKS, and AWS Managed Prometheus
Week 3 β GitOps and advanced deployment patterns:
- Helm: packaging Kubernetes applications β writing charts, values files, hooks, and managing chart releases
- Kustomize: environment-specific overlays without duplicating manifests β base + overlays pattern
- ArgoCD: the GitOps continuous delivery tool β Applications, ApplicationSets, the App of Apps pattern, and sync policies
- FluxCD: the CNCF-native GitOps alternative β source controller, kustomize controller, and helm controller
- Image update automation: automatically promoting new container image tags through environments
- Sealed Secrets and External Secrets: managing secrets safely in a GitOps repository
- Progressive delivery with Argo Rollouts: canary deployments, blue/green deployments, and automated analysis for rollback decisions
- Service mesh basics with Istio: traffic management, mTLS between services, and observability β an overview for when a mesh is needed
Advanced Track 2: AWS Security & Compliance Engineering (2 weeks)
Security is no longer optional in DevOps β regulated industries, enterprise clients, and companies handling user data require a DevSecOps approach where security is automated into the pipeline and infrastructure, not bolted on at the end.
Week 1 β Infrastructure security:
- AWS Security Hub: centralised security findings across GuardDuty, Inspector, Config, Macie, and IAM Access Analyzer
- AWS Inspector v2: continuous vulnerability scanning for EC2, Lambda, and container images in ECR
- AWS Macie: discovering and protecting sensitive data (PII, credentials) in S3
- KMS (Key Management Service): CMKs, key policies, envelope encryption, and rotating keys for RDS, S3, EBS, and Secrets Manager
- AWS WAF: web application firewall rules β OWASP managed rule groups, rate limiting, and geo-blocking for ALB and CloudFront
- AWS Shield: DDoS protection tiers β Shield Standard vs Shield Advanced
- VPC security hardening: private subnets for all workloads, VPC Flow Logs analysis, and network ACL layering
- AWS CloudTrail: auditing all API calls β trail configuration, log file integrity validation, and alerting on suspicious activity
- AWS Control Tower and landing zones: multi-account governance β OU structure, guardrails, and account vending machine
Week 2 β DevSecOps pipeline and compliance:
- Shift-left security pipeline: integrating Trivy (containers), Checkov (IaC), Semgrep (SAST), OWASP Dependency-Check, and Gitleaks (secrets) into GitHub Actions
- Software Bill of Materials (SBOM): generating SBOMs with Syft and storing in ECR for audit and vulnerability tracking
- Container image signing with Cosign: signing images at build time and verifying signatures before deployment
- Supply chain security: SLSA (Supply chain Levels for Software Artifacts) framework and provenance attestation
- Open Policy Agent (OPA) and Kyverno: policy-as-code for Kubernetes β admission controllers that enforce security standards at deployment time
- Secrets rotation automation: automatic rotation of RDS, Redshift, and third-party API credentials with Secrets Manager rotation Lambdas
- Compliance frameworks on AWS: SOC 2, ISO 27001, and PCI-DSS controls mapped to AWS services β AWS Audit Manager for evidence collection
- Incident response on AWS: runbooks for common security incidents, isolating compromised resources, and forensic investigation with CloudTrail and VPC Flow Logs
Advanced Track 3: Serverless & Event-Driven Architecture on AWS (2 weeks)
Serverless is the fastest path to zero-ops infrastructure β no servers to patch, no clusters to manage, and pay-per-execution pricing. This track covers the full AWS serverless ecosystem and event-driven architecture patterns.
- Lambda deep dive: execution environment, cold starts, the Init phase, SnapStart, concurrency (reserved and provisioned), and the Lambda power tuning tool
- Lambda layers: sharing code and dependencies across functions β packaging custom runtimes
- Lambda function URLs: built-in HTTPS endpoints without API Gateway
- API Gateway: REST API vs HTTP API vs WebSocket API β integration types, custom authorisers, throttling, and caching
- Lambda deployment strategies: blue/green with aliases, weighted routing for canary releases, and Terraform for Lambda deployments
- AWS Step Functions: orchestrating multi-step serverless workflows β state machines, Express Workflows vs Standard Workflows, and error handling
- EventBridge: the event bus for AWS β event patterns, rules, targets, and building event-driven architectures across AWS services
- EventBridge Pipes: point-to-point integrations between event sources and targets with filtering and enrichment
- SQS: standard vs FIFO queues β message visibility, dead-letter queues, long polling, and Lambda event source mapping
- SNS: fan-out patterns β topic subscriptions, message filtering, and SQS+SNS integration
- Kinesis Data Streams: real-time data streaming β shards, consumers, and Lambda event source mapping for stream processing
- DynamoDB: the serverless database β partition keys, sort keys, GSIs, LSIs, DynamoDB Streams, TTL, and on-demand billing
- AppSync: managed GraphQL on AWS β resolvers backed by DynamoDB, Lambda, and HTTP endpoints
- Serverless Framework and AWS SAM: tools for defining and deploying serverless applications as code
- Serverless observability: Lambda Power Tools for Python/Node.js β structured logging, tracing, and metrics as first-class primitives
Advanced Track 4: Platform Engineering & Advanced IaC (2 weeks)
Platform Engineering is the fastest-growing DevOps specialisation β building the internal developer platform that lets development teams self-serve infrastructure without becoming cloud experts themselves.
- Platform Engineering principles: golden paths, paved roads, and the platform team's mission to reduce cognitive load for developers
- AWS CDK: defining AWS infrastructure in TypeScript, Python, or Go β L1, L2, and L3 constructs and CDK Pipelines for self-mutating infrastructure
- Pulumi: infrastructure as real code β TypeScript and Python Pulumi programs, stacks, and state management
- Terraform advanced patterns: module composition, provider aliasing, dynamic provider configuration, and writing Terraform tests with the native test framework
- Terraform Stacks (preview): the new native deployment orchestration for multi-environment Terraform workflows
- Backstage: the Spotify-open-sourced internal developer portal β service catalogue, TechDocs, scaffolding templates, and AWS plugin integration
- Service cataloguing: defining and publishing golden path templates that provision full application infrastructure from a single Backstage template
- AWS Service Catalog: curated CloudFormation and Terraform products that developers can self-serve without direct IAM permissions
- Internal developer platform metrics: DORA metrics (deployment frequency, lead time, MTTR, change failure rate) β measuring platform effectiveness
- Policy as code at scale: OPA Conftest for validating Terraform plans, CloudFormation templates, and Kubernetes manifests before apply
- Multi-account AWS strategy: AWS Organizations, SCPs, delegated admin, and account-per-environment vs account-per-team patterns
- AWS Control Tower customisations: adding custom guardrails, lifecycle event hooks, and account factory automation
Advanced Track 5: ML Infrastructure & DataOps on AWS (2 weeks)
As AI workloads move into production, DevOps engineers increasingly need to provision and operate the GPU infrastructure, ML pipelines, and data platforms that data science teams depend on. This track covers the infrastructure side of ML engineering.
- AWS SageMaker infrastructure: training job resource provisioning, managed spot training, and SageMaker Studio domain setup
- GPU instance types on AWS: p3, p4d, g4dn, g5 β when to use each and cost comparison with SageMaker managed compute
- S3 as a data lake: partitioned Parquet datasets, S3 event notifications, and organising a data lake with landing, raw, curated, and serving layers
- AWS Glue: serverless ETL β Glue crawlers, Glue Data Catalog, Glue jobs in Python/Spark, and Glue Studio
- AWS Athena: serverless SQL over S3 β partition projection, workgroups, and cost control with result reuse
- Apache Airflow on AWS (MWAA): managed workflow orchestration β DAG deployment, connections, and worker scaling
- AWS Batch: managed batch computing for CPU and GPU workloads β job definitions, job queues, and compute environments
- MLflow on AWS: running the MLflow tracking server on ECS or EC2 with S3 artifact store and RDS backend
- Model serving infrastructure: deploying models to SageMaker Real-Time Endpoints, Serverless Inference, and Batch Transform
- Feature Store on AWS: SageMaker Feature Store β online and offline stores, feature groups, and ingestion pipelines
- Data pipeline CI/CD: testing and deploying Glue jobs and Airflow DAGs with GitHub Actions
- Data infrastructure cost control: Athena query cost management, Glue DPU optimisation, and S3 Intelligent-Tiering for data lake cost reduction
Advanced Track 6: SRE & Advanced Observability (2 weeks)
Site Reliability Engineering is the discipline of applying software engineering to operations problems β defining SLOs, automating toil, and building the systems that prevent incidents before they happen and recover faster when they do.
Week 1 β Advanced observability stack:
- Prometheus in production: scraping configuration, service discovery, recording rules, and federation for large-scale metrics
- PromQL in depth: rate, irate, increase, histogram_quantile, topk, and writing useful alerting rules
- Grafana: building production dashboards β templating, variables, annotations, and on-call alert routing
- Loki: log aggregation without indexing overhead β LogQL queries, label design, and Promtail / Fluent Bit agents
- Tempo: distributed tracing storage β trace ID correlation between Grafana, Loki, and Tempo
- Grafana OnCall: on-call schedule management, escalation policies, and alert grouping
- OpenTelemetry Collector: the OTel Collector as a central telemetry pipeline β receivers, processors, exporters, and pipelines
- AWS Managed Grafana and AWS Managed Prometheus: the managed observability stack on AWS β setup, workspace configuration, and cost
Week 2 β SRE practice:
- SLIs, SLOs, and error budgets: defining meaningful service level indicators, setting realistic objectives, and calculating error budget consumption
- Alerting on SLOs: multi-window, multi-burn-rate alerts β the Google SRE approach to actionable alerting
- Incident management: the incident lifecycle (detect β respond β mitigate β resolve β review), roles, communication templates, and tooling
- Post-mortems: blameless post-mortem culture, the timeline reconstruction technique, and action item tracking
- Chaos engineering on AWS: AWS Fault Injection Simulator (FIS) β running controlled experiments that inject EC2 failures, network latency, and AZ outages
- Resilience testing: validating Auto Scaling Group failover, RDS Multi-AZ switchover, and ECS service recovery times
- Toil reduction: identifying repetitive manual operational work and automating it with Lambda, Systems Manager Automation, and EventBridge
- Capacity planning: using CloudWatch metrics and Cost Explorer data to forecast resource needs and plan scaling ahead of traffic growth
π Schedule & Timings
Choose one group only based on your availability. Max 5 candidates per group to ensure individual attention and hands-on lab support.
Weekday Groups:
- Group 1: MonβWed, 10 AM β 1 PM
- Group 2: MonβWed, 4 PM β 7 PM
Weekend Groups:
- Group 3: Sat & Sun, 10 AM β 2 PM
- Group 4: Sat & Sun, 4 PM β 8 PM
π Location: In-house training in Islamabad
π± Online option may be arranged for out-of-city participants
π οΈ Core Program Tools & Technologies
- OS & Scripting: Ubuntu Linux, Bash, Python (boto3), vim
- Containers: Docker, Docker Compose, AWS ECR, Trivy, Docker Scout
- AWS Services: VPC, EC2, ALB/NLB, ECS Fargate, RDS, ElastiCache, S3, IAM, Route 53, ACM, Secrets Manager, CloudWatch, X-Ray, GuardDuty, Config
- IaC: Terraform, Terragrunt, Checkov, tfsec
- CI/CD: GitHub Actions (OIDC auth, matrix builds, reusable workflows, self-hosted runners)
- Observability: CloudWatch, AWS X-Ray, OpenTelemetry (ADOT Collector)
- Security: AWS Secrets Manager, KMS, IAM Access Analyzer, GuardDuty, AWS WAF
- Cost: AWS Cost Explorer, AWS Budgets, Compute Optimizer
π Advanced Track Summary
- Track 1: Kubernetes & EKS β 3 weeks (Helm, ArgoCD, Karpenter, GitOps, Argo Rollouts)
- Track 2: AWS Security & Compliance Engineering β 2 weeks (DevSecOps pipeline, OPA, SBOM, Cosign)
- Track 3: Serverless & Event-Driven Architecture β 2 weeks (Lambda, Step Functions, EventBridge, DynamoDB)
- Track 4: Platform Engineering & Advanced IaC β 2 weeks (CDK, Pulumi, Backstage, multi-account)
- Track 5: ML Infrastructure & DataOps β 2 weeks (SageMaker, Glue, Athena, MWAA, MLflow)
- Track 6: SRE & Advanced Observability β 2 weeks (Prometheus, Grafana, Loki, Tempo, chaos engineering)
π― AWS Certifications Aligned
- Core program: AWS Solutions Architect Associate, AWS SysOps Administrator Associate
- Track 1 (EKS): Kubernetes CKA (Certified Kubernetes Administrator)
- Track 2 (Security): AWS Security Specialty
- Track 3 (Serverless): AWS Developer Associate
- Track 4 (Platform): AWS DevOps Engineer Professional, HashiCorp Terraform Associate
- Track 5 (ML): AWS Machine Learning Specialty
- Track 6 (SRE): AWS SysOps Administrator Professional
β Prerequisites
- Comfortable using the Linux command line (navigating directories, editing files, running commands)
- Basic understanding of how web applications work (HTTP, DNS, servers)
- Familiar with at least one programming language for scripting (Python preferred)
- Git basics: clone, commit, push, pull, branch
- No prior AWS or DevOps experience required for the core program
π― Who This Is For
- Backend or full-stack developers who want to own the infrastructure layer
- System administrators transitioning to cloud-native DevOps roles
- Engineers targeting remote DevOps, SRE, or platform engineering roles
- Technical leads who need to make infrastructure and deployment decisions for their teams
- Anyone pursuing AWS certification with hands-on practical training to complement exam prep
π³ Course Fee & Booking
- β Core Program Duration: 4β5 Weeks
- β Each Advanced Track: 2β3 additional weeks (additional fee per track)
- π¦ Available Advanced Tracks: Kubernetes & EKS Β· Security & Compliance Β· Serverless & Event-Driven Β· Platform Engineering Β· ML Infrastructure & DataOps Β· SRE & Observability
- π Seats: 5 only per group