Fundamental elements of cloud computing
IT security is a concern for most modern organizations and moving to the cloud heightens those concerns for most. The security implications are potentially magnified by large tranches of data existing outside the immediate control of the organization. Although some of the fears with regard to security in the cloud are exaggerated, there are specific areas to be aware of and cautious about. This course explores some of the key risk areas when it comes to security and cloud computing. It also introduces control assessment frameworks and models that can be used in assessing your risk in going to the cloud and evaluating the cloud provider's security offering. It goes on to outline basic guidelines that you should follow to ensure an adequate level of security in an XaaS environment, including key areas of the IT infrastructure and issues relating to data transfer and storage.
As we move toward more applications being delivered via the cloud and businesses using a cloud computing model, we also need to consider the implications for the management of identity. This course ensures you are familiar with identity and access management or IAM and the common industry protocols used to extend identity to the cloud. This course covers the concept of federation between different cryptographic services providers or CSPs and businesses, the need for proper identity and access control management, and it also explores the use of a Cloud Identity as a Service or IDaaS offering. The course also discusses the importance of understanding the presence and privacy factors when conducting business in the cloud and how it is crucial to understand the CSP's responsibility to not only provide security but also a proper level of privacy.
Migrating services to the public cloud has a number of unique challenges. This course explores the steps you should take in determining if your infrastructure has components that are suitable for a cloud solution. It discusses the Service Oriented Architecture or SOA and grid computing, and highlights characteristics that make these infrastructures suitable or unsuitable for extension to the cloud. The course also explores the recommended steps of analyzing your current infrastructure to inventory data, services, and processes used, as well as identifying problem areas that may be addressed through a cloud solution. Upon completion of your analysis, it is time to determine cloud service candidates and match cloud services, as well as look at examples of how to leverage different services to your problem areas. Finally, you'll learn about the use of private clouds as an alternative to public clouds.
Cloud storage is of key interest to many consumers, as it has a number of advantages over traditional data storage. Cloud-stored data is available from any location that has Internet access. However, depending on the type of business and data, some organizations need to carefully evaluate if and what types of regulations and compliance standards may apply to their data. This course provides a closer look at enterprise resources in the cloud and the use of cloud storage services. It describes the importance of classifying your type of data, what type of security regulations or restrictions apply to it, and whether a cloud provider's offering aligns with those requirements. This course also takes a closer look at the protocols, standards, and mobile client access involved in accessing cloud resources. It explores the meaning of open source software and its role in provisioning and accessing cloud resources.
While the cloud is not necessarily dependent on virtualization, it's widely accepted that any competitive cloud will utilize it. Infrastructural and network connectivity considerations of the modern data center are greatly influenced by the requirements of the cloud. Data center infrastructure and components must be designed to address security, scalability, disaster recovery, and redundant high-speed connectivity needed to provide a successful cloud service. This course takes a closer look at the main enabling technologies, including data centers and virtualization that allow clouds to function.
In a computing environment where client data assets are remotely hosted, data asset security becomes an important factor when considering the potential transition to cloud services. This course describes and explores issues relating to the management and protection of data assets hosted on a cloud platform, and data in transit to and from a cloud platform. In this course, you will learn about all aspects of data management: protection, auditing, access, legislative impact, storage, deletion, security, ownership, data rights management, encryption, classification, known threats to data assets, and threat mitigation. The course covers the essential topics for the ICS2's Certified Cloud Security Professional examination - Domain 2 requirements.
Amazon Web Services, also known as AWS, is a secure cloud-computing platform offered by Amazon.com. This course introduces AWS and it's most prominent tools such as IAM, S3, and EC2. Additionally we will cover how to install configure and use a Hadoop cluster on AWS.
This Ultimate Exam Training for the AWS Certified Cloud Practitioner is packed with comprehensive video lessons, hands-on labs, practice exams, quizzes, exam-crams and detailed training notes/cheat sheets! If you are new Amazon Web Services / Cloud Computing and looking to confidently pass your AWS Cloud Practitioner Certification Exam first time - then this highest-rated ALL-IN-ONE course is for you!
This course provides IT professionals with a working definition of cloud computing, explores the technological precursors of today's cloud as well as the current technologies the cloud is dependant on. Also covered are the benefits and drawbacks of cloud computing for the IT department and business as a whole. It then explores in more detail the different types of services that have become available in the cloud with examples of key pioneers in those areas.