Open Site Navigation

Cloud Computing

Using cloud is the way forward for organizations. However, living in the era of cloud technologies requires different skills that organizations are struggling to fulfill in existing or new job roles. We understand organizations are in different phases with unique business goals to achieve, which is why we enable companies, teams and individuals to bridge skills gaps and advance their cloud maturity. Cloud technology makes new opportunities and job roles. By enhancing your current skill set to include cloud computing, enhancing proficient in delivering applications and files over the Internet. With information technology on the move to the cloud, stay in front of the pack; make sure you have the cloud services skills you need to endure to be the IT professional.

Cloud Computing

Course Modules

Compare And Contrast Cloud Services


  • SaaS (according to NIST)
  • IaaS (according to NIST)
  • CaaS (according to NIST)
  • PaaS (according to NIST)
  • XaaS (according to NIST)
  • DaaS (according to NIST)
  • BPaaS
  • Accountability and responsibility based on service models




Explain Object Storage Concepts


  • Object ID
  • Metadata
  • Data/blob
  • Extended metadata
  • Policies
  • Replicas
  • Access control




Given A Scenario, Perform Virtual Resource Migration


  • Establish requirements
  • Maintenance scheduling
  • Reasons
  • Storage migration
  • Online vs. offline migrations
  • Physical to Virtual (P2V)
  • Virtual to Virtual (V2V)
  • Virtual to Physical (V2P)




Compare And Contrast Various Storage Technologies


  • Network Attached Storage (NAS)
  • Direct Attached Storage (DAS)
  • Storage Area Network (SAN)
  • Different access protocols
  • Protocols and applications
  • Management differences




Given A Scenario, Implement Appropriate Network Configurations


  • NAT
  • PAT
  • Subnetting/Supernetting
  • VLAN and VLAN tagging
  • Network port configurations
  • Switching and routing in physical and virtual environments




Explain Common Network Protocols, Ports, And Topologies


  • Trunk ports
  • Port binding/aggregation
  • Common ports
  • Common protocols
  • Types of networks




Given A Scenario, Appropriately Allocate Physical (Host) Resources Using Best Practices


  • Memory
  • CPU
  • Storage and network allocation
  • Entitlement/quotas (shares)
  • Reservations
  • Licensing
  • Resource pooling




Explain Network Security Concepts, Tools, And Best Practices


  • ACLs
  • VPNs
  • IDS/IPS hardware/software-based firewalls
  • DMZ
  • Review / audit logs
  • Attacks




Identify Access Control Methods


  • Role-based administration
  • Mandatory access controls
  • Discretionary access controls
  • Multifactor authentication
  • Single sign-on
  • Federation




Compare And Contrast Disaster Recovery Methods And Concepts


  • Redundancy
  • Failover
  • Geographical diversity
  • Failback
  • Replication
  • Site mirroring
  • Hot site
  • Cold site
  • Warm site
  • Backup and recovery
  • Archiving and offsite storage
  • Replication types
  • RTO
  • RPO
  • MTBF
  • MTTR
  • Mission critical requirements




Given A Scenario, Diagnose, Remediate And Optimize Physical Host Performance


  • Disk performance
  • Disk tuning
  • Disk latency
  • Swap disk space
  • I/O tuning
  • Performance management and monitoring tools
  • Establish baseline and create documentation with appropriate tools
  • Hypervisor configuration best practices
  • Impact of configuration changes to the virtual environment
  • Common issues




Compare And Contrast Cloud Delivery Models And Services


  • Private
  • Public
  • Hybrid
  • Community
  • On-premise vs. Off-premise hosting
  • Accountability and responsibility based on delivery models
  • Security differences between models
  • Functionality and performance validation based on chosen delivery model
  • Orchestration platforms




Explain The Differences Between Hypervisor Types


  • Type I and Type II
  • Proprietary vs. open source
  • Consumer vs. enterprise use




Explain The Benefits Of Virtualization In A Cloud Environment


  • Shared resources
  • Elasticity
  • Network and application isolation
  • Infrastructure consolidation
  • Virtual datacenter creation




Explain Storage Configuration Concepts


  • Disk types
  • Tiering
  • RAID levels
  • File system types




Explain The Importance Of Network Optimization


  • WAN
  • LAN
  • MAN
  • Bandwidth
  • Latency
  • Compression
  • Caching
  • Load balancing
  • Devices on the same subnet




Explain Common Hardware Resources And Features Used To Enable Virtual Environments


  • BIOS/firmware configurations
  • Minimum memory capacity and configuration
  • Number of CPUs
  • Number of Cores
  • NICs quantity, speeds, and configurations
  • Internal hardware compatibility
  • HBAs
  • Storage media




Given A Scenario, Appropriately Allocate Physical (Host) Resources Using Best Practices


  • Memory
  • CPU
  • Storage and network allocation
  • Entitlement/quotas (shares)
  • Reservations
  • Licensing
  • Resource pooling




Explain Storage Security Concepts, Methods, And Best Practices


  • Obfuscation
  • Access Control Lists
  • Zoning
  • LUN masking
  • User and host authentication
  • Review/audit logs




Implement Guest And Host Hardening Techniques


  • Disabling unneeded ports and services
  • User credentials
  • Host-based/software firewalls
  • Antivirus software
  • Patching
  • Deactivating default accounts




Explain Common Performance Concepts As They Relate To The Host And The Guest


  • IOPS
  • Read vs. write files
  • File system performance
  • Metadata performance
  • Caching
  • Bandwidth
  • Throughput (bonding/teaming)
  • Jumbo frames
  • Network latency
  • Hop counts
  • QoS
  • Multpathing
  • Load balancing
  • Scaling




Deploy Solutions To Meet Availability Requirements


  • Fault tolerance
  • Multipathing
  • Load balancing




Summarize Cloud Characteristics And Terms


  • Elasticity
  • On-demand self serve/just in time service
  • Pay-as-you-grow
  • Chargeback
  • Ubiquitous access
  • Metering resource pooling
  • Multitenancy
  • Cloud bursting
  • Rapid deployment
  • Automation




Install, Configure, And Manage Virtual Machines And Devices


  • Creating, importing, and exporting template and virtual machines
  • Install guest tools
  • Snapshots and cloning
  • Image backups vs. file backups
  • Virtual NIC
  • Virtual disks
  • Virtual switches
  • VLAN
  • VSAN




Compare And Contrast Virtual Components Used To Construct A Cloud Environment


  • Virtual network components
  • Shared memory
  • Virtual CPU
  • Storage Virtualization




Execute Storage Provisioning


  • Creating LUNs
  • Creating network shares
  • Zoning and LUN masking
  • Multipathing
  • Implications of adding capacity to a NAS and SAN




Given A Scenario, Troubleshoot Basic Network Connectivity Issues


  • Tools
  • Review documentation and device configuration settings
  • Review system logs




Given A Scenario, Implement And Use Proper Resource Monitoring Techniques


  • Protocols
  • Alert methods
  • Establish baselines and thresholds
  • Automated responses to specific events
  • Examine processes usage / resource usage




Given A Scenario, Use Appropriate Tools For Remote Access


  • Remote hypervisor access
  • RDP
  • SSH
  • Console port
  • HTTP




Compare Contrast Different Encryption Technologies And Methods


  • PKI
  • IPSEC
  • SSL/TLS
  • Ciphers
  • Encryption for data in transit and encryption for data at rest




Explain Policies And Procedures As They Relate To A Cloud Environment


  • Network and IP planning/documentation
  • Configuration standardization and documentation
  • Change management best practices
  • Configuration management
  • Capacity management
  • Systems life cycle management
  • Maintenance windows




Implement Appropriate Testing Techniques When Deploying Cloud Services


  • Test replication
  • Test latency
  • Test bandwidth
  • Test load balancing
  • Test application servers
  • Test storage
  • Test application delivery
  • Service performance testing and application performance testing
  • Penetration testing
  • Vulnerability assessment
  • Separation of duties during testing





Duration of the courses: 120 Hours

Prerequisites

Cloud Computing Foundation is intended for everyone playing a role or having an interest in the use and management of internet based IT services. This includes staff from internal and external service providers, their customers, and their managers.

 

Key Benefits

After completing this course, you will be able to (in relation to Cloud Computing) identify essential elements, describe the pros and cons, understand the business case for going to the cloud, describe how to build a cloud network, understand virtualization architecture, describe security and privacy issues, understand federation and presence, describe cloud computing standards and best practices and describe how mobile devices can be used in the cloud