How load balancing works at layer 3, layer 4, and layer 7 of the OSI model
Scaling factors for load balancers
Testing compliance with the initial requirements (for example, failover test, resiliency)
Implementing security between network boundaries
Different DNS record types (for example, A, AAAA, TXT, pointer records, alias records)
Implementing a network audit strategy across single or multiple AWS network services and accounts (for example, Firewall Manager, security groups, network ACLs)
Implementing a certificate management solution by using a certificate authority (for example, ACM, AWS Private Certificate Authority [ACM PCA])
Optimizing network connectivity by using Global Accelerator to improve network performance and application availability
Log creation in different AWS services (for example, VPC flow logs, load balancer access logs, CloudFront access logs)
How to share DNS services between accounts (for example, AWS RAM)
Implementing a solution on an appropriate network connectivity service (for example, VPC peering, Transit Gateway, VPN connection) to meet network requirements
Securing outbound traffic flows from AWS (for example, Network Firewall, proxies, Gateway Load Balancers)
Tools to collect and analyze logs and metrics (for example, CloudWatch, VPC Flow Logs, VPC Traffic Mirroring)
Log delivery mechanisms (for example, Amazon Kinesis, Route 53, CloudWatch)
Mechanisms to audit network security configurations (for example, security groups, AWS Firewall Manager, AWS Trusted Advisor)