Cloud Computing Essentials

Level
Total time
Logo Perpetual Solutions
Provider rating: starstarstarstarstar 10 Perpetual Solutions has an average rating of 10 (out of 1 reviews)

Need more information? Get more details on the site of the provider.

Starting dates and places

There are no known starting dates for this product.

Description

Prerequisites:

There are no prerequisites for this course.

Course Description:

Explore the potential of cloud computing in this interactive course. Gain clarity about the rapidly developing world of cloud computing and discover its potential in this interactive four-day course. You will learn about the evolution of the cloud and how increases in processing power and bandwidth have made cloud computing possible today. You will also learn who's who in today's world of cloud computing and what products and services they offer. You will explore the financial benefits as well as the security risks, and you will gain a solid understanding of fundamental concepts, deployment, architecture, and design …

Read the complete description

Frequently asked questions

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.

Didn't find what you were looking for? See also: Cloud Computing, CompTIA A+ / Network+ / Security+, M&A (Mergers & Acquisitions), IT Security, and Cisco.

Prerequisites:

There are no prerequisites for this course.

Course Description:

Explore the potential of cloud computing in this interactive course. Gain clarity about the rapidly developing world of cloud computing and discover its potential in this interactive four-day course. You will learn about the evolution of the cloud and how increases in processing power and bandwidth have made cloud computing possible today. You will also learn who's who in today's world of cloud computing and what products and services they offer. You will explore the financial benefits as well as the security risks, and you will gain a solid understanding of fundamental concepts, deployment, architecture, and design of the fast-growing field of cloud computing.

This course includes interactive labs, demonstrations, and case studies to illustrate cloud computing concepts and applications.

By the end of this course you will have learnt:

  • Essential elements of cloud computing
  • Pros and cons of cloud computing
  • Who's who in cloud computing and the product and services they offer
  • The business case for going to the cloud
  • How to build a cloud network
  • Virtualization architecture
  • Products used to implement the virtualization architecture
  • Security and privacy issues with cloud computing
  • Federation and presence
  • Cloud computing standards and best practices
  • Platforms and applications used by cloud computing end users
  • How mobile devices can be used in the cloud

This course includes the following modules:

Introduction to Cloud Computing

  • What is Cloud Computing?
  • Cloud Computing Defined
  • Cloud Computing Infrastructure
  • Cloud Computing Terms
  • Benefits and Limitations of Cloud Computing
  • Cloud Computing Case Studies
  • How Companies Are Using Cloud Computing
  • Implementing Applications and Services in the Cloud
  • Using Your Company's Services vs. the Cloud Provider
  • A Cloud Service Provider Introduced
  • Cloud Computing Risks and Issues

Who Who in Today's Cloud

  • Cloud Computing Companies
  • Products and Services Provided by Cloud Computing Companies

The Business Case for Going to the Cloud

  • Benefits of Cloud Computing (Operational, Economic, Staffing)
  • Should Your Company Invest in Cloud Computing?
  • What Should Not be Moved to the Cloud

The Evolution of Cloud Computing

  • Early Mainframe Environment
  • Virtualization in Mainframe Architectures and Operating Systems
  • LANs and the Cloud
  • Internet and the Cloud
  • Web Services, Browsers, and the Cloud
  • Thin Client
  • Advances in Networking and Processing Speeds that Led to Cloud Computing
  • Networking Developments
  • Increased Processing Speeds
  • Managed Service Provider Model to Cloud Computing and Software as a Service (SaaS)
  • Single Purpose Architectures Migrate to Multipurpose Architectures
  • Data Center Virtualization
  • Collaboration
  • The Cloud as a Reach Extender
  • The Cloud as a Communication Enabler
  • The Cloud as an Employee Enabler
  • Service-Oriented Architecture (SOA)
  • Evolving from SOA to the Cloud
  • Capacity: Limited Performance
  • Availability: Communications Failure and Performance Issues
  • Security: Newer Security Protocols Provide More Protection
  • What's Next in Cloud Computing

Building Cloud Networks

  • Designing and Implementing a Data Center-Based Cloud
  • Using Industry and International Standards
  • Independent Components
  • Message Base
  • Location Independence
  • Communication Requirements for Cloud Implementation
  • Public Internet
  • Private Internet
  • Routing to the Datacenter
  • Switching within the Data Center
  • Bandwidth
  • Tools Used to Measure Network Performance
  • Using the Protocol Analyzer to Measure Bandwidth
  • Using Ping and Traceroute to Measure Network Performance
  • Security (SSL, VPN, Overhead)
  • Storage Options for Cloud Computing
  • Storage Capacity (Data Protection and Partitioning, NAS, SAN, CAS, Redundancy, Replication, Multisiting, Backup and Recovery)
  • Server Software Environments that Support Cloud Computing
  • Server Capacity (Virtualization, Clustering, Expansion, Server Functions, Application, Web, Database)
  • Vendor Approaches to Cloud Computing
  • Role of Open Source Software in Data Center
  • Cost Reduction vs. Reliability
  • Open Source Server Software
  • Open Source Database Software
  • Open Source Applications Software
  • Open Source System Management Software
  • Open Source Load-Balancing Software

Virtualization

  • Student Virtualization Architectures
  • The Hypervisor
  • Virtualization as the "Operating System"
  • Virtualization with a Host Operating System
  • Virtualization Infections on Virtualized Environments
  • Type 1 Virtualized Environment
  • Type 2 Virtualized Environment
  • Virtualization Environments
  • Microsoft Virtualization
  • Sun xVM VirtualBox
  • Linux/UNIX Virtualization
  • VMware Products
  • Data Center and Cloud Infrastructure Products
  • End-User and Desktop Products
  • IBM Virtualization
  • Using VMware to see a Virtualized Server Environment

Federation, Presence, Security, and Privacy in the Cloud

  • Federation in the Cloud
  • What It Is
  • Permissive Federation
  • Verified Federation
  • Encrypted Federation
  • Trusted Federation
  • Using XMPP in the Federated Environment
  • Presence in the Cloud
  • What It Is
  • Presence Protocols
  • Leveraging Presence
  • Presence Enabled
  • The Future of Presence
  • The Interrelation of Identity, Presence, and Location in the Cloud
  • Identity Management
  • Future of Identity in the Cloud
  • Privacy and Its Relation to Cloud-Based Information Systems
  • Personal Information
  • Privacy-Related Issues
  • Finding Your Private Information

Cloud Computing Standards and Best Practices

  • Open Cloud Consortium
  • Open Cloud Consortium Working Groups
  • Project Matsu
  • Project Comet
  • HPC in the Cloud
  • The Open Cloud Testbed
  • The Open Science Data Cloud
  • Intercloud Testbed
  • Reporting on an Open Cloud Consortium Working Group
  • Distributed Management Task Force (DMTF)
  • DMTK Working Groups Associated with Cloud Computing
  • Standards for Application Developers
  • Protocols
  • Scripting Languages
  • Content Formatting Standards and Languages
  • Standards for Security in the Cloud
  • Confidentiality, Integrity, Availability
  • Authentication, Authorization, Accountability
  • Regulations for Privacy
  • Security Protocols
  • Establishing a Baseline for Cloud Performance
  • Best Practices for Selecting a Vendor and Implementing Cloud-Based Applications
  • Choosing the Right Vendor
  • Implementing Cloud-Based Applications

End-User Access to Cloud Computing

  • Cloud Access Methods Available to End Users
  • Citrix
  • Windows Remote Desktop
  • Vnc
  • Web Browsers
  • Server Extensions
  • Thin Clients
  • Smart Phones, Pads, Pods, etc.
  • Virtual Terminal Security Strengths and Weaknesses

Mobility and the Cloud

  • Mobile Operating Systems for Smartphones
  • iPhone
  • Android
  • BlackBerry
  • Windows Mobile
  • Ubuntu Mobile Internet Device
  • Mobile Platform Virtualization
  • Kernel-Based Virtual Machine
  • VMware Mobile Virtualization Platform
  • Collaboration Applications for Mobile Platforms
  • Text Messaging
  • iPhone Applications
  • BlackBerry Applications
  • Droid Applications

For online live training advice please visit our Learning Advice Centre on our website. Be sure to follow us on Twitter to receive special course offers, news and updates!

There are no reviews yet.

Share your review

Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate £1.- to Stichting Edukans.

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.