You are on page 1of 20

MODULE 1: COURSE INTRODUCTION

At the end of this module, you will be able to:


Identify the fundamental concepts of cloud computing and virtualization.
Identify the technical challenges and the mitigation measures involved in cloud
computing and virtualization.
Understand the latest digitization trends associated with cloud computing.
Define cloud security and identify the risks involved in cloud computing as well as
the risk mitigation measures.
List the steps to successfully adopt cloud services.

MODULE 2: INTRODUCTION TO CLOUD SERVICES MODEL


At the end of this module, you will be able to:
List the challenges and concerns for traditional computing methodology.
Define NIST’s and Gartner’s definition of cloud computing.
Explain the evolution of cloud computing and list the cloud’s essential
characteristics, service models, and deployment models.
Define NIST’s cloud Taxonomy (service provider versus consumer responsibility
model) and Cloud Actors (service providers, consumers, auditors, carriers,
brokers).
Distinguish between traditional and cloud computing models in terms of business
value.
List the cloud computing benefits and its challenges.
Define the various common cloud terminologies used in cloud computing.

MODULE 3: INTRODUCTION TO VIRTUALIZATION: THE BACKBONE


TECHNOLOGY OF CLOUD COMPUTING
At the end of this module, you will be able to:
Understand the definition, history, and fundamental concepts of virtualization
including the relationship between virtualization and cloud computing.
Understand the benefits, challenges, risks, and suitability of virtualization to
organizations.
Understand what a hypervisor is, its role in virtualization, and different types of
hypervisors.

Identify leading hypervisor manufacturers and service providers who use them.
Understand various virtualization terminologies.
Understand briefly about various types of virtualization (server, storage, network,
desktop, application).

MODULE 4: THE ROLE OF CLOUD AND OTHER TECHNOLOGIES IN DIGITAL


TRANSFORMATION
At the end of this module, you will be able to:
Understand the concepts of Big Data and Big Data Analytics, Hadoop, NoSQL
databases, and their characteristics and types.
Explain what is Internet of Things (IoT) and its types.
Explain how cloud computing and DevOps together.
Understand the latest digitization trends in Artificial Intelligence (AI) and Machine
Learning (ML).

MODULE 5: CLOUD SECURITY, RISK, COMPLIANCE AND GOVERNANCE

At the end of this module, you will be able to:


Understand general definitions of IT security, risk and risk management.
Understand the role of IT compliance and audits.
Understand the impact of cloud essential characteristics, cloud service models,
cloud deployment models on business value and risk.
Identify common cloud attack vectors and remediating controls.

MODULE 6: PREPARING FOR CLOUD ADOPTION


At the end of this module, you will be able to:
Explain typical steps that lead to successful adoption of cloud computing services.

Describe appropriate solution architectures for various service and deployment


models.

Understand organizational capabilities that are relevant for realizing cloud benefits.

Understand the roles and capabilities of cloud computing providers, vendors and
dependencies on vendors.
Describe multiple approaches for migrating applications.
1 - PREPARING TO DEPLOY CLOUD SOLUTIONS
Describe Interaction of Cloud Components and Services
Describe Interaction of Non-cloud Components and Services
Evaluate Existing Components and Services for Cloud Deployment
Evaluate Automation and Orchestration Options
Prepare for Cloud Deployment
2 - DEPLOYING A PILOT PROJECT
Manage Change in a Pilot Project
Execute Cloud Deployment Workflow
Complete Post-Deployment Configuration
3 - TESTING PILOT PROJECT DEPLOYMENTS
Identify Cloud Service Components for Testing
Test for High Availability and Accessibility
Perform Deployment Load Testing
Analyze Test Results

4 - DESIGNING A SECURE AND COMPLIANT CLOUD INFRASTRUCTURE


Design Cloud Infrastructure for Security
Determine Organizational Compliance Needs

5 - DESIGNING AND IMPLEMENTING A SECURE CLOUD ENVIRONMENT


Design Virtual Network for Cloud Deployment
Determine Network Access Requirements
Secure Networks for Cloud Interaction
Manage Cloud Component Security
Implement Security Technologies
6 - PLANNING IDENTITY AND ACCESS MANAGEMENT FOR CLOUD
DEPLOYMENTS
Determine Identity Management and Authentication Technologies
Plan Account Management Policies for the Network and Systems
Control Access to Cloud Objects
Provision Accounts

7 - DETERMINING CPU AND MEMORY SIZING FOR CLOUD DEPLOYMENTS


Determine CPU Size for Cloud Deployment
Determine Memory Size for Cloud Deployment
8 - DETERMINING STORAGE REQUIREMENTS FOR CLOUD
DEPLOYMENTS
Determine Storage Technology Requirements
Select Storage Options for Deployment
Determine Storage Access and Provisioning Requirements
Determine Storage Security Options
9 - ANALYZING WORKLOAD CHARACTERISTICS TO ENSURE SUCCESSFUL
MIGRATION
Determine the Type of Cloud Deployment to Perform
Manage Virtual Machine and Container Migration
Manage Network, Storage, and Data Migration
10 - MAINTAINING CLOUD SYSTEMS
Patch Cloud Systems
Design and Implement Automation and Orchestration for Maintenance
11 - IMPLEMENTING BACKUP, RESTORE, DISASTER RECOVERY, AND
BUSINESS CONTINUITY MEASURES
Back Up and Restore Cloud Data
Implement Disaster Recovery Plans
Implement Business Continuity Plans
12 - ANALYZING CLOUD SYSTEMS FOR PERFORMANCE
Monitor Cloud Systems to Measure Performance
Optimize Cloud Systems to Meet Performance Criteria
13 - ANALYZING CLOUD SYSTEMS FOR ANOMALIES AND GROWTH
FORECASTING
Monitor for Anomalies and Resource Needs
Plan for Capacity
Create Reports on Cloud System Metrics
14 - TROUBLESHOOTING DEPLOYMENT, CAPACITY, AUTOMATION, AND
ORCHESTRATION ISSUES
Troubleshoot Deployment Issues
Troubleshoot Capacity Issues
Troubleshoot Automation and Orchestration Issues
15 - TROUBLESHOOTING CONNECTIVITY ISSUES
Identify Connectivity Issues
Troubleshoot Connectivity Issues
16 - TROUBLESHOOTING SECURITY ISSUES
Troubleshoot Identity and Access Issues
Troubleshoot Attacks
Troubleshoot Other Security Issues
Course OutlineModule 1: Cloud ConceptsIn this module you will learn basic cloud concepts.Lessons
Learning Objectives
Why Cloud Services?
Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS)
Public, Private, and Hybrid cloud models
After completing this module, students will be able:

Understand general cloud computing concepts

Module 2: Core Azure ServicesIn this module you will learn the basics core services available with Microsoft Azure
Core Azure architectural components
Core Azure Services and Products
Azure Solutions
Azure management tools
After completing this module, students will be able:

Understand core services available with Microsoft Azure 

Module 3: Security, Privacy, Compliance and TrustIn this module, you learn about security, privacy, compliance,
Securing network connectivity in Azure
Core Azure Identity services
Security tools and features
Azure governance methodologies
Monitoring and Reporting in Azure
Privacy, Compliance and Data Protection standards in Azure
After completing this module, students will be able:

Understand security, privacy, compliance and trust with Microsoft Azure 

Module 4: Azure Pricing and SupportIn this module, you will focus on pricing and support models available with M
Azure subscriptions
Planning and managing costs
Support options available with Azure
Service lifecycle in Azure
After completing this module, students will be able:

Understand pricing and support models available with Microsoft 


soft Azure.Lessons
Module 1: Managing Azure Subscriptions and ResourcesIn this module you will explore Azure monitoring capab
After completing this module, students will be able to:

Managing Azure Subscriptions and Resources


Module 2: Implementing and Managing StorageIn this module you will learn about Azure storage accounts, data
After completing this module, students will be able to:

Implementing and Managing Storage

Module 3: Deploying and Managing Virtual Machines (VMs)In this module you will learn how to do the following:
After completing this module, students will be able to:

Deploying and Managing VMs


Module 4: Configuring and Managing Virtual NetworksIn this module you will create and implement virtual netwo
Network routing using routing tables and algorithms
Inter-site connectivity using VNet-to-VNet connections and VPNs
Virtual network peering for regional and global considerations
Gateway transit
After completing this module, students will be able to:

Configuring and Managing Virtual Networks

Module 5: Managing IdentitiesThis module covers Azure Active Directory (Azure AD) for IT Admins and Developer
Role-Based Access Control (RBAC)
built-in roles
Self-Service Password Reset (SSPR)
authentication methods for password reset
After completing this module, students will be able to:

Managing Identities using Azure Active Directory

Module 6: Evaluating and Performing Server Migration to AzureThis module covers migrating workloads to a ne
After completing this module, students will be able to:

Evaluating and Performing Server Migration to Azure

Module 7: Implementing and Managing Application ServicesThis module includes the following topics: • Deployi
After completing this module, students will be able to:

Implementing and Managing Application Services


Module 8: Implementing Advanced Virtual NetworkingThis module includes the following topics: • Azure Load Ba
After completing this module, students will be able to:

Implementing Advanced Virtual Networking.


Module 9: Securing IdentitiesThis module includes the following topics with an emphasis on identity and roles: • A
After completing this module, students will be able to:

Securing Identities using Azure AD.

Module 10: Selecting Compute and Storage SolutionsThis module includes the following topics: • Azure Architec
After completing this module, students will be able to:

Design and Connectivity Patterns

Module 11: Hybrid NetworkingThis module includes the following topics: • Site-to-site connectivity • Point-to-site co
After completing this module, students will be able to:

Hybrid Networking
Module 12: Measuring Throughput and Structure of Data AccessThis module includes the following topics: • DT
After completing this module, students will be able to:

Address Durability of Data and Caching


Measure Throughput and Structure of Data Access

Module 13: Creating Web Applications using PaaSThis module provides and overview of Azure App Service Web
After completing this module, students will be able to:

Use shell commands to create an App Service Web App


Create Background Tasks
Use Swagger to document an API
Module 14: Creating Apps and Services Running on Service FabricThis module provides an overview of Azure
After completing this module, students will be able to:

Create a reliable service


Create a Reliable Actors app
Hands-on with Reliable collections
Module 15: Using Azure Kubernetes Service This module focuses on the AzureKubernetes Service (AKS) for d
After completing this module, students will be able to:

Understand the Azure Container Registry


Use Azure Container instances

Module 16: Developing Long-Running Tasks and Distributed TransactionsTopics for this modu
Implementing resilient apps by using queues As well as, implementing code to address application ev
request to that URL whenever a change is made that requires the application to take an action.
Module 17: Configuring a Message-Based Integration ArchitectureLessons
Configure an app or service to send emails
Configure an event publish and subscribe model
Configure the Azure Relay service
Configure apps and services with Microsoft Graph
After completing this module, students will be able to:

How to configure a message-based integration architecture


Module 18: Developing for Asynchronous ProcessingLessons
Implement parallelism, multithreading, and processing
Implement Azure Functions and Azure Logic Apps
Implement interfaces for storage or data access
Implement appropriate asynchronous computing models
Implement autoscaling rules and patterns
After completing this module, students will be able to:

Understand how to Develop for Asynchronous Processing

Module 19: Developing for AutoscalingLessons


Implementing autoscaling rules and patterns
Implementing code that addresses singleton application instances
Implementing code that addresses a transient state
After completing this module, students will be able to:

Begin creating apps for Autoscaling


Module 20: Developing Azure Cognitive Services SolutionsLessons
Developing Solutions using Computer Vision
Developing solutions using Bing Web Search
Developing solutions using Custom Speech Service
Developing solutions using QnA Maker
After completing this module, students will be able to:

Understand Azure Cognitive Services Solutions


Module 21: Develop for Azure StorageLessons
Develop Solutions that use Azure Cosmos DB Storage
Develop Solutions that use a Relational Database
Modeling a Database by using Entity Framework Core
Develop Solutions that use Microsoft Azure Blob Storage
Manipulating Blob Container Properties in .NET
After completing this module, students will be able to:

Understand Azure Storage services such as blobs and Cosmos DB


plates • Deploy Linux Virtual Machines (VM)s • Monitor Virtual Machines (VM)s Additionally, you will learn how to protect data us

with other Azure resources, your on-premises network, and the Internet.Lessons

ss-focused goals for migrations, and the benefits to an organization’s business. Activities include components of the Azure migr

rks into the Microsoft cloud over a dedicated private connection facilitated by a connectivity provider.
ses on Azure AD Connect to integrate on-premises directories with Azure Active Directory.

ns, or shards. Each shard has the same schema but holds its own distinct subset of the data.

ailover, backup, or even migration between providers such as AWS.

Creating Background Tasks • Using Swagger to document an API As well as an explanation of how Logic Apps help to build sol

ule also addresses the challenges in developing and managing cloud native applications. Additional topics include: • Creating a

ponsibility to Azure, such as health monitoring and maintenance. Additional topics include: • Azure Container Registry • Azure C
ll learn how to protect data using backups at regular intervals, whether by snapshot, Azure Backup, or Azure Site Recovery.

omponents of the Azure migration process: creating a project, creating a collector, assessing readiness, and estimating costs. A
w Logic Apps help to build solutions that integrate apps, data, systems, and services across enterprises or organizations by aut

al topics include: • Creating a reliable service • Creating a Reliable Actors app • Working with Reliable collections

Container Registry • Azure Container Instances


p, or Azure Site Recovery.

diness, and estimating costs. Additionally, you will receive and overview of Azure Site Recovery (ASR) that includes and end-to-
prises or organizations by automating tasks and business processes as workflows.

able collections
SR) that includes and end-to-end scenarios.
Course: AWS
Duration: 3 Days

Course outline:  In this course, you will learn how to create automatable and repeatable deployments of networks and systems
explore the AWS features and tools related to configuration and deployment and best practices for configuring and deploying s

Pre-requisites: We recommend that attendees of this course have the following prerequisites:
AWS Technical Essentials
Background in software development or systems administration
Proficiency maintaining operating systems at the command line, such as shell scripting in Linux environments or cmd/Pow
Basic knowledge of networking protocols, such as TCP/IP and HTTP

Course Content:
Day 1
1.     Fundamentals of Amazon Web Services (AWS)
Regions
Availability Zones and Data centers
AWS Credentials

2.     IAM Overview
Basic Concepts of IAM
IAM Terminology
Groups and Users
Application “Roles” in IAM
IAM Best Practices and Important Facts
Labs:
Create some groups in IAM service and give some privileges to that created group
Create users in IAM and users to group and assign user defined policies to the users
Create Access Key
Create Role with EC2 Access and assign AmazonRDSFullAccess policy

3.     Amazon VPC
Overview of AWS networking infrastructure
VPC Networking Fundamentals
Private and Public Subnets
Internet Gateways

4.     Amazon Elastic Compute Cloud (EC2)


Basic Concepts of EC2
EC2 Instance Creation Process
Instance Types
Overview of LoadBalancer and AutoScaling
Labs:
Create WebServerSG Security Group
Create a Key Pair
Launch an EC2 instance in public subnet with WebServerSG Security Group
Assigning the Role also

Day 2
5.     Amazon S3
Fundamental APIs: PUT, GET, LIST, DELETE
Consistency model
Types of consistency model for distributed storage
S3 Namespace
Access Control List
Bucket Policy
Hands on: S3 Labs; Creating Buckets, objects, and managing access control

6.     CloudWatch
Introduction of AWS Monitoring
Understanding Virtualization
Making a Status Check Failed Incident manually
CloudWatch Basic and Detailed Monitoring and Its Features
Implementing Real-Time monitoring by Integrating with SNS.
Understanding CloudWatch Logs and Metrics
Creating Alarms and its Actions
Configuring Dashboards for Organization Architectures

7.     AWS Lambda
Notion of serverless computing
Developing code using Lambda
Monitor Lambda functions through Amazon CloudWatch
Labs:
Handling S3 events using the AWS Lambda Console
Monitor Lambda S3 functions through Amazon CloudWatch

Day 3
8.     AWS DynamoDB
Basic Concepts of DynamoDB
Capacity and Throughput Management
Setting Up DynamoDB
Accessing DynamoDB
Labs:
Serverless Web Apps using Amazon DynamoDB, API Gateway, IAM roles and Lambda function
Generate the SDK for your API
Hosting a Static Website on Amazon S3

9.     Amazon Kinesis
·         What is Amazon Kinesis?
·         Amazon Kinesis Streams
·         Use Cases
·         Amazon Kinesis Streams Concepts
·         Working With Amazon Kinesis Streams
·         Amazon Kinesis Firehose
·         Use Cases
·         Creating an Amazon Kinesis Firehose Delivery Stream
·         Select Destination
·         Testing your Delivery Stream
Labs:
Event-driven programming with Amazon Kinesis and AWS Lambda (Python/Java)
Create a Firehose Delivery Stream to Amazon S3

10.  Amazon SQS
·         What Is Amazon SQS?
Creating Queues
Adding Permissions to a Queue
Sending Messages
Sending a Message
Sending a Message with Attributes
Sending a Message with a Timer
Receiving and Deleting a Message
Subscribing a Queue to a Topic
Configuring a Lambda Trigger (node.js)

11.  Deployment and Provisioning


Demonstrate the ability to provision cloud resources and manage implementation automation
Creating Our First Stack
Creating an Amazon Virtual Private Cloud with Cloud Formation And Launching An Stack
Course objectives:
Upon successful completion of this course, the participant:
·         Use standard AWS infrastructure features such as Amazon Virtual Private Cloud (Amazon VPC), Amazo
(Amazon EC2), Elastic Load Balancing (ELB), and AWS Auto Scaling from the command line
·         Use AWS CloudFormation and other automation technologies to produce stacks of AWS resources
·         Build virtual private networks with Amazon VPC
·         Deploy Amazon EC2 instances using command line calls and troubleshoot common problems with ins
·         Monitor the health of Amazon EC2 instances and other AWS services
·         Manage identity, AWS permissions, and security in the AWS Cloud
·         Manage resource consumption in an AWS account using tags, Amazon CloudWatch.
·         Determine the best strategy for creating reusable Amazon EC2 instances
·         Configure a set of Amazon EC2 instances that launch behind a load balancer
·         Troubleshoot a basic AWS CloudFormation stack definition
·         Working with the Serverless architecture.
1. Core AWS Knowledge
2. Designing Your Environment
3. Making Your Environment Highly Available
4. Forklifting an Existing Application onto AWS
5. Event-Driven Scaling
6. Automating and Decoupling Your Infrastructure
7. Designing Storage at Scale
8. Hosting a New Web Application on AWS
9. The Four Pillars of the Well-Architected Framework
10. Disaster Recovery and Failover Strategies
11. Troubleshooting Your Environment
12. Large-Scale Design Patterns and Case Studies

You might also like