Vi ste ovdje
Overview/Description
This course provides IT professionals with a working definition of cloud computing, explores the technological precursors of today's cloud as well as the current technologies the cloud is dependant on. Also covered are the benefits and drawbacks of cloud computing for the IT department and business as a whole. It then explores in more detail the different types of services that have become available in the cloud with examples of key pioneers in those areas.
Target Audience
This course is intended for IT professionals including managers, engineers, and technical staff...
Overview/Description
This course takes a closer look at the main enabling technologies and core components that allow clouds to function. While the cloud is not necessarily dependant on virtualization, it's widely accepted that any competitive cloud will utilize it. Infrastructural and network connectivity considerations of the modern datacenter are greatly influenced by the requirements of the cloud. Datacenter infrastructure and components must be designed to address security, scalability, disaster recovery, and redundant high-speed connectivity needed to provide a successful cloud service...
Overview/Description
This course provides a closer look at enterprise resources in the cloud and the use of cloud storage services. Cloud storage is of key interest to many consumers as it has a number of advantages over traditional data storage. Cloud-stored data is available from any location that has Internet access. However, depending on the type of business and data, some organizations need to carefully evaluate if and what types of regulations and compliance standards may apply to their data. This course presents the importance of classifying your type of data, what type of security...
Overview/Description
As we move towards more applications being delivered via the cloud, and businesses using a cloud computing models, we also need to consider the implications for the management of identity. This course ensures you are familiar with identity and access management (IAM) and the common industry protocols used to extend identity to the cloud. It covers the concept of federation between different CSPs and businesses, the need for proper identity and access control management, and it also explores the use of a Cloud Identity as a Service (IDaaS) offering. The course also...
Overview/Description
This course explores the steps you should take in determining if your infrastructure has components that are suitable for a cloud solution. It discusses the Service Oriented Architecture (SOA) and grid computing, and highlights characteristics that make these infrastructures suitable or unsuitable for extension to the cloud. The course also explores the recommended step of analyzing your current infrastructure to inventory data, services, and processes used, as well as identify problem areas that may be addressed through a cloud solution. Upon completion of your analysis...
Overview/Description
This course explores some of the key risk areas when it comes to security and cloud computing. Although some of the fears in regards to security in the cloud are exaggerated, there are specific areas to be aware and cautious about. The key is knowing your IT infrastructure and needs, as well as carefully assessing the cloud provider offering and security measures. The course introduces control assessment frameworks and models that can be used in assessing your risk in going to the cloud and evaluating the cloud provider's security offering. Along with the top identified...