The Cloud Computing Professional Consulting course covers fundamental cloud technology architecture models, design practices and cloud security topics. It explores cloud platforms and services, detailing cloud computing mechanisms, design techniques and the incorporation of containerization. The course further dives into implementing cloud security mechanisms, configuring and combining technologies to establish a cloud security architecture.
Upon completing the course you will receive a digital certificate of completion, as well as a digital training badge from Acclaim/Credly. Because this course encompasses both the Cloud Professional and Cloud Computing Consultant certifications, upon passing the exam you will also receive official Cloud Professional and Cloud Computing Consultant digital accreditation certificates and certification badges from Acclaim/Credly, along with an account that can be used to verify your certification status.
The Cloud Security course is comprised of the following 5 course modules, each of which has an estimated completion time of 10 hours:
Module 1: Fundamental Cloud Computing
Module 2: Cloud Technology Concepts
Module 3: Cloud Technology Lab
Module 4: Fundamental Cloud Architecture
Module 7: Fundamental Cloud Security
50 hours of Workbook Lessons & Exercises
Supporting Video Lessons
Course Completion Certificate & Badge
Certification Exam & Practice Questions
Feature-Rich eLearning Platform
Interactive Graded Exercises, Self-Test
Printable PDFs
Lifetime Access
Mind Map Poster
Symbol Legend Poster
This course module provides end-to-end coverage of fundamental cloud computing topics as they pertain to both technology and business considerations. The module content is divided into a series of modular sections, each of which is accompanied by one or more hands-on exercises.
Fundamental Cloud Computing Terminology and Concepts
Basics of Virtualization
Specific Characteristics that Define a Cloud
Understanding Elasticity, Resiliency, On-Demand and Measured Usage
Benefits, Challenges and Risks of Contemporary Cloud Computing Platforms and Cloud Services
Cloud Resource Administrator and Cloud Service Owner Roles
Cloud Service and Cloud Service Consumer Roles
Understanding the IaaS, PaaS, SaaS Cloud Delivery Model
Combining Cloud Delivery Models
Public Cloud, Private Cloud, Hybrid Cloud and Community Cloud Deployment Models
Business Cost Metrics and Formulas for Comparing and Calculating Cloud and On-Premise Solution Costs
Formulas for Calculating and Rating SLA Quality of Service Characteristics
This course module explores a range of the most important and relevant technology-related topics that pertain to contemporary cloud computing platforms. The module content does not get into implementation or programming details, but instead keeps coverage at a conceptual level, focusing on topics that address cloud service architecture, cloud security threats and technologies, virtualization and containerization.
Cloud Computing Mechanisms that Establish Architectural Building Blocks
Virtual Servers, Containers, Ready-Made Environments, Failover Systems and Pay-Per-Use Monitors
Automated Scaling Listeners, Multi-Device Brokers and Resource Replication
Understanding How Individual Cloud Computing Mechanisms Support Cloud Characteristics
An Introduction to Containerization, Container Hosting and Logical Pod Containers
A Comparison of Containerization and Virtualization
Cloud Balancing and Cloud Bursting Architectures
Common Risks, Threats and Vulnerabilities of Cloud-based Services and Cloud-hosted Solutions
Cloud Security Mechanisms used to Counter Threats and Attacks
Understanding Cloud-Based Security Groups and Hardened Virtual Server Images
Cloud Service Implementation Mediums (including Web Services and REST Services)
Cloud Storage Benefits and Challenges, Cloud Storage Services, Technologies and Approaches
Non-Relational (NoSQL) Storage Compared to Relational Storage
Cloud Service Testing Considerations and Testing Types
Service Grids and Autonomic Computing
Cloud Computing Industry Standards Organizations
This course module presents participants with a series of exercises and problems that are designed to test their ability to apply their knowledge of topics covered in previous modules. Completing this lab will help highlight areas that require further attention and will help prove proficiency in cloud computing concepts, technologies, and practices as they are applied and combined to solve real-world problems.
Reading Exercise 3.1: AGC Case Study Background
Lab Exercise 3.2: Plan the Cloud Environments
Lab Exercise 3.3: Perform Cost Comparison Analysis
Lab Exercise 3.4: Secure the PaaS Environment
Reading Exercise 3.5: AFR Case Study Background
Lab Exercise 3.6: Design a SaaS Implementation
Lab Exercise 3.7: Calculate SLA Availability
Lab Exercise 3.8: Calculate Combined SLA Availability
Reading Exercise 3.9: AAS Bargain Service Case Study Background
Lab Exercise 3.10: Identify Benefits/Challenges for Proposed IaaS Environment
Lab Exercise 3.11: Design the Bargain Service Implementation
Lab Exercise 3.12: Secure the IaaS Environment
This course module provides a technical drill-down into the inner workings and mechanics of foundational cloud computing platforms. Private and public cloud environments are dissected into concrete, componentized building blocks (referred to as “patterns”) that individually represent platform feature-sets, functions and/or artifacts, and are collectively applied to establish distinct technology architecture layers.
Understanding the Technology Architecture of Private Clouds and Public Clouds
Understanding the Technology Architecture of SaaS, PaaS and IaaS Environments
Automated Administration and Centralized Remote Administration
Container Sidecars and Container Chains
Self-Provisioning and Platform Provisioning
Rich Containers and Logical Pod Containers
Bare-Metal Provisioning and Resource Management
Single-Node Multi-Containers and Multipath Resource Access
Usage Monitoring and Broad Access
Realtime Resource Availability and Pay-as-You-Go
Shared Resources and Resource Pooling
Rapid Provisioning and Resource Reservation
Non-Disruptive Service Relocation and Service State Management
Workload Distribution and Dynamic Scalability
This foundational course module provides a well-rounded, end-to-end presentation of essential techniques, mechanisms, patterns and industry technologies for establishing cloud-based security controls and security architectures. The cloud security fundamentals covered in Module 2 are continued by introducing threat categorizations and new cloud security mechanisms.
Cloud Security Basics
Common Cloud Security Mechanisms
Cloud Security Threats
Cloud Security Threat Categorization Methodology
Identification and Treatment of Common Threats
Cloud Network Security Patterns and Supporting Mechanisms
Securing Network Connections and Cloud Authentication Gateways
Collaborative Monitoring and Logging
Independent Cloud Auditing
Cloud Identity and Access Management Patterns and Supporting Mechanisms
Federating and Enabling Secure Interoperability among Cloud Consumers
Trust Assurance Patterns and Supporting Mechanisms
Trust Attestation and Establishing Trustworthiness