You are on page 1of 2

Fundamentals of Cloud Computing

Duration: 3 Days

Module 1: Cloud Services and deployment Models


Cloud deployment models
Public (external) cloud
Private/Internal/Corporate cloud
Hybrid cloud
Community cloud
Cloud Service Models
Infrastructure-as-a-Service (IaaS)
Platform-as-a-Service (PaaS)
Software-as-a-Service (SaaS)
Component of Cloud Computing
Advantages of Cloud Computing
Limitations of Cloud Computing
Cloud Computing Service Providers
Amazon
Microsoft
Google
IBM
Salesforce.com

Module 2: Virtualization
Introduction to Virtualization and its Technical Evolution
History of Virtualization
Introduction to Virtualization
Types of Virtual Machines
Advantages of Virtualization
Components of Virtualization
Types of Virtualization
Virtualization Systems

Module 3: Software as a Service


Evolution of SaaS
Brief Introductory part of Software as a Service
SaaS Unification Technologies
SaaS Integration Products and Technologies
SaaS Product Selection Criteria
SaaS Integration Services
Advantages of SaaS

Module 4 Platform as a Service


Introduction to PaaS
PaaS Service Providers
Acquia Cloud
Amazon AWS
Amazon Elastic Beanstalk
CloudFoundry
Microsoft Azure
Google App Engine
PaaS Application Framework
Advantages and Challenges of PaaS

Module 5: Infrastructure as a Service


Evolution
IaaS Architecture
DAS Model
SAN Model
IaaS Providers
Amazon AWS
RackSpace
Microsoft Azure Virtual Machine
Google Compute Engine
OpenNebula
Network Level Virtualization

Module 6: Data in Cloud


Evolution of Network Storage in Cloud
Data as a Service
Architecture of DaaS
Pricing Models for DaaS
Advantages of DaaS
Disadvantages of DaaS
Database as a Service
Implementing DBaaS
Benefits of DBaaS for Enterprises
Deployment Issues
Cloud Based Data Storage
Architecture of Cloud Based Data Storage
Issues in Cloud Storage
Advantages and Limitations of Cloud Based Storage Solution
Advantages of Cloud Storage
Disadvantages of cloud-based storage

Module 7: Cloud Security


Introduction
Security Risks and Best Practices
Securing Cloud with RBAC
CIA Concept
Threats to infrastructure, Data, and Access Control
Types of Security Attacks
Security Policy Implementation
Policy Types
Computer Security Incident Response Teams
Techniques to Secure Data
Cloud Encryption
Symmetric Encryption
Asymmetric Encryption
Cloud Security Alliance
Cloud Security Strategy
Cloud Computing Security Architecture

You might also like