Vi ste ovdje
Overview/Description
This course provides IT professionals with a working definition of cloud computing, explores the technological precursors of today's cloud as well as the current technologies the cloud is dependant on. Also covered are the benefits and drawbacks of cloud computing for the IT department and business as a whole. It then explores in more detail the different types of services that have become available in the cloud with examples of key pioneers in those areas.
Target Audience
This course is intended for IT professionals including managers, engineers, and technical staff...
Overview/Description
This course takes a closer look at the main enabling technologies and core components that allow clouds to function. While the cloud is not necessarily dependant on virtualization, it's widely accepted that any competitive cloud will utilize it. Infrastructural and network connectivity considerations of the modern datacenter are greatly influenced by the requirements of the cloud. Datacenter infrastructure and components must be designed to address security, scalability, disaster recovery, and redundant high-speed connectivity needed to provide a successful cloud service...
Overview/Description
This course provides a closer look at enterprise resources in the cloud and the use of cloud storage services. Cloud storage is of key interest to many consumers as it has a number of advantages over traditional data storage. Cloud-stored data is available from any location that has Internet access. However, depending on the type of business and data, some organizations need to carefully evaluate if and what types of regulations and compliance standards may apply to their data. This course presents the importance of classifying your type of data, what type of security...
Overview/Description
As we move towards more applications being delivered via the cloud, and businesses using a cloud computing models, we also need to consider the implications for the management of identity. This course ensures you are familiar with identity and access management (IAM) and the common industry protocols used to extend identity to the cloud. It covers the concept of federation between different CSPs and businesses, the need for proper identity and access control management, and it also explores the use of a Cloud Identity as a Service (IDaaS) offering. The course also...
Overview/Description
This course explores the evolution and definition of cloud computing and cloud services. It provides a look at the key characteristics that make cloud services unique and very valuable to some business scenarios. The course serves as a basic technology overview of the concepts and strategies emerging from the cloud and aims to provide the background needed to determine if and how cloud products and services can improve traditional business processes.
Target Audience
This course is intended for customers looking for an overview of the cloud computing concept, the services...
Overview/Description
This course explores the steps you should take in determining if your infrastructure has components that are suitable for a cloud solution. It discusses the Service Oriented Architecture (SOA) and grid computing, and highlights characteristics that make these infrastructures suitable or unsuitable for extension to the cloud. The course also explores the recommended step of analyzing your current infrastructure to inventory data, services, and processes used, as well as identify problem areas that may be addressed through a cloud solution. Upon completion of your analysis...
Overview/Description
This course further explores how cloud service offerings affect service-oriented architecture and traditional IT services and how aspects of cloud services can present new opportunities to businesses. It outlines strategic implication and provides tips on how businesses can attempt to measure the value of transitioning to cloud computing. This course presents cloud-enabled business models, an example of a cloud adoption lifecycle, the cloud computing reference model, concerns about cloud governance and security, and a look at cloud services providers â all of which...
Overview/Description
This course explores some of the key risk areas when it comes to security and cloud computing. Although some of the fears in regards to security in the cloud are exaggerated, there are specific areas to be aware and cautious about. The key is knowing your IT infrastructure and needs, as well as carefully assessing the cloud provider offering and security measures. The course introduces control assessment frameworks and models that can be used in assessing your risk in going to the cloud and evaluating the cloud provider's security offering. Along with the top identified...