Database capacity planning (for example, capacity units, instance types, Provisioned IOPS)
AWS security best practices (for example, the principle of least privilege)
Storage types with associated characteristics (for example, object, file, block)
AWS purchasing options (for example, Spot Instances, Reserved Instances, Savings Plans)
Database replication (for example, read replicas)
Threat vectors external to AWS (for example, DDoS, SQL injection)
When to use read replicas
Access controls and management across multiple accounts
AWS global infrastructure (for example, Availability Zones, AWS Regions)
Distributed design patterns
How to design network architecture (for example, subnet tiers, routing, IP addressing)
Hybrid compute options (for example, AWS Outposts, AWS Snowball Edge)
Storage tiering (for example, cold tiering for object storage)
Security services with appropriate use cases (for example, Amazon Cognito, Amazon GuardDuty, Amazon Macie)
Disaster recovery (DR) strategies (for example, backup and restore, pilot light, warm standby, active-active failover, recovery point objective [RPO], recovery time objective [RTO])