Professional Documents
Culture Documents
Overview Duration
Target Audience
• Senior IT Managers
• Decision Makers
• Heads of IT Architecture and/or Operation
Department
• Anyone with interest in understanding Cloud and
Cloud solutions better
Course Overview
Module 1: About the Cloud Module 2: Inside the Cloud
• Enabling Technologies
- CIoud principles
- Automation
- Transformation of operational processes
- CIoud example
Estimating private cloud implementation costs • Scaling computing and storage based on demand
• Analyzing the cost benefits with a decision matrix • Scheduling near-line backups and images
• Comparing pricing models
• Calculating hosted fees vs. on-premises costs Amazon Web Services (AWS) multitenant servers
• Networking with Virtual Private Cloud to ensure
Implementing an On-Premises Private Cloud maximum security
Leveraging open source solutions • Creating and attaching Elastic Block Storage (EBS)
• Identifying architectural components in OpenStack volumes
• Exploring OpenStack community projects • Launching Elastic Cloud Computing (EC2) instances
• Enabling application computing power
• Fabricating facilities for redundant data storage Securing the Private Cloud
• Connecting private cloud components through the virtual
network Evaluating the layers of cloud security
• Applying certification standards as a security
Extending investment in proprietary technologies benchmark
• Examining the Microsoft private cloud solution • SAS70 Type II
• Creating a Hyper-V private cloud • PCI DSS Level 1
• Building a virtual network • ISO 27001
• Customizing storage allocation • FISMA
• Monitoring and reporting on private cloud resource utilization • Enhancing account access security features
• Safeguarding physical and logical assets
Automating self-service provisioning with the System Center
Virtual Machine Manager portal Virtualizing security components
• Planning host sizing and consolidation • Configuring virtual private cloud firewalls
• Working with templates and clones • Establishing Virtual Private Network (VPN) segments
• Deploying virtual machine images • Authenticating users and authorizing access
• Managing hosts and virtual machines • Selecting trusted availability zones
Etisalat Academy (ETAC) reserves the right to alter dates, content, venue and
consultant within a reasonable notice. All dates are tentative and are subject to
a minimum confirmation of 7 delegates. All confirmations are due 2 weeks prior
to the starting date.
Ensuring SLAs meet organizational security requirements Virtual Private Cloud (VPC)
Simulating a private cloud in a public environment
Securing the Cloud Infrastructure Google Secure Data Connector
Amazon VPC
Securing the platform Industry-standard, VPN-encrypted connections
Restricting network access through security groups
Configuring platform-specific user access control The hybrid cloud alternative
Integrating with cloud authentication and authorization systems Connecting on-premises data with cloud applications
Securely bridging with VPC
Compartmentalizing access to protect data confidentiality Dynamically expanding capacity to meet business
Securing data in motion and data at rest surges
Identifying your security perimeter
Techniques for recovering critical data Meeting Compliance Requirements
Managing cloud governance
Operating System and Network Security Retaining responsibility for the accuracy of the data
Verifying integrity in stored and transmitted data
Locking down cloud servers Demonstrating due care and due diligence
Ensuring the cloud is configured according to best practices Supporting electronic discovery
Confirming safeguards have been implemented Preserving a chain of evidence
Networking
Operating Systems Assuring compliance with government certification and
Applications accreditation regulations
Scanning for and patching vulnerabilities HIPAA
Controlling and verifying configuration management Sarbanes-Oxley
Data Protection Act
Leveraging provider-specific security options PCI DSS
Defining security groups to control access Limiting the geographic location of data
Filtering traffic by port number Following standards for auditing information systems
Discovering and benefiting from the provider's built-in security Negotiating third-party provider audits
Protecting archived data
Preparing for Disaster Recovery
Achieving Security in a Private Cloud
Implementing a plan to sustain availability
Taking full responsibility for cyber security Reliably connecting to the cloud across the public
Managing the risks of public clouds internet
Identifying and assigning security tasks in each SPI service Anticipating a sudden provider change or loss
model: SaaS, PaaS, IaaS Archiving SaaS data locally
Addressing data portability and interoperability in
Selecting the appropriate product preparation for a change in cloud providers
Comparing product-specific security features Exploiting the cloud for efficient disaster recovery options
Considering organizational implementation requirements Achieving cost-effective recovery time objectives
Employing a strategy of redundancy to better resist DoS
P.O. Box 99100 | Al Muhaisnah | Dubai | UAE | Emirates Road (E311) | Exit 60
Phone +971 4 264 4444 | Fax +971 4 264 8888
info@etac.ae | www.etac.ae