DNS (for example, conditional forwarding, hosted zones, resolvers)
Considerations for encryption and authentication with load balancers (for example, TLS termination, TLS passthrough)
Selecting an appropriate load balancer based on the use case
AWS network architecture that meets security and compliance requirements
Situations in which a VPC peer or a transit gateway are appropriate
Encryption methods for data in transit (for example, IPsec)
Common problems of using hardcoded instructions in IaC templates when provisioning cloud networking resources
Configuration options for load balancer target groups (for example, TCP, GENEVE, IP compared with instance)
Configuring existing on-premises networks to connect with the AWS Cloud
Different threat models based on application architecture
Flow logs and traffic mirroring in architectures to provide visibility
Implementing an AWS network architecture to meet security and compliance requirements (for example, untrusted network, perimeter VPC, three-tier architecture)
Analyzing packets to identify issues in packet shaping (for example, VPC Traffic Mirroring)
DNS protocol (for example, DNS records, TTL, DNSSEC, DNS delegation, zones)
Verifying that a network configuration meets network design requirements (for example, Reachability Analyzer)
Using VPC sharing in a multi-account setup