The Cloud Computing Professional Consulting course covers fundamental cloud technology architecture models, design practices and cloud security topics. It explores cloud platforms and services, detailing cloud computing mechanisms, design techniques and the incorporation of containerization. The course further dives into implementing cloud security mechanisms, configuring and combining technologies to establish a cloud security architecture.
Upon completing the course you will receive a digital certificate of completion, as well as a digital training badge from Acclaim/Credly. Because this course encompasses both the Cloud Professional and Cloud Computing Consultant certifications, upon passing the exam you will also receive official Cloud Professional and Cloud Computing Consultant digital accreditation certificates and certification badges from Acclaim/Credly, along with an account that can be used to verify your certification status.
The Cloud Security course is comprised of the following 5 course modules, each of which has an estimated completion time of 10 hours:
.png)
Module 1: Fundamental Cloud Computing
.png)
Module 2: Cloud Technology Concepts
.png)
Module 3: Cloud Technology Lab
Module 4: Fundamental Cloud Architecture
Module 7: Fundamental Cloud Security
.png)
50 hours of Workbook Lessons & Exercises
.png)
Supporting Video Lessons
.png)
Course Completion Certificate & Badge
.png)
Certification Exam & Practice Questions
.png)
Feature-Rich eLearning Platform
.png)
Interactive Graded Exercises, Self-Test
.png)
Printable PDFs
.png)
Lifetime Access
.png)
Mind Map Poster
.png)
Symbol Legend Poster
This course module provides end-to-end coverage of fundamental cloud computing topics as they pertain to both technology and business considerations. The module content is divided into a series of modular sections, each of which is accompanied by one or more hands-on exercises.
.png)
Fundamental Cloud Computing Terminology and Concepts
.png)
Basics of Virtualization
.png)
Specific Characteristics that Define a Cloud
.png)
Understanding Elasticity, Resiliency, On-Demand and Measured Usage
.png)
Benefits, Challenges and Risks of Contemporary Cloud Computing Platforms and Cloud Services
.png)
Cloud Resource Administrator and Cloud Service Owner Roles
.png)
Cloud Service and Cloud Service Consumer Roles
.png)
Understanding the IaaS, PaaS, SaaS Cloud Delivery Model
.png)
Combining Cloud Delivery Models
.png)
Public Cloud, Private Cloud, Hybrid Cloud and Community Cloud Deployment Models
.png)
Business Cost Metrics and Formulas for Comparing and Calculating Cloud and On-Premise Solution Costs
.png)
Formulas for Calculating and Rating SLA Quality of Service Characteristics
This course module explores a range of the most important and relevant technology-related topics that pertain to contemporary cloud computing platforms. The module content does not get into implementation or programming details, but instead keeps coverage at a conceptual level, focusing on topics that address cloud service architecture, cloud security threats and technologies, virtualization and containerization.
.png)
Cloud Computing Mechanisms that Establish Architectural Building Blocks
.png)
Virtual Servers, Containers, Ready-Made Environments, Failover Systems and Pay-Per-Use Monitors
.png)
Automated Scaling Listeners, Multi-Device Brokers and Resource Replication
.png)
Understanding How Individual Cloud Computing Mechanisms Support Cloud Characteristics
.png)
An Introduction to Containerization, Container Hosting and Logical Pod Containers
.png)
A Comparison of Containerization and Virtualization
.png)
Cloud Balancing and Cloud Bursting Architectures
.png)
Common Risks, Threats and Vulnerabilities of Cloud-based Services and Cloud-hosted Solutions
.png)
Cloud Security Mechanisms used to Counter Threats and Attacks
.png)
Understanding Cloud-Based Security Groups and Hardened Virtual Server Images
.png)
Cloud Service Implementation Mediums (including Web Services and REST Services)
.png)
Cloud Storage Benefits and Challenges, Cloud Storage Services, Technologies and Approaches
.png)
Non-Relational (NoSQL) Storage Compared to Relational Storage
.png)
Cloud Service Testing Considerations and Testing Types
.png)
Service Grids and Autonomic Computing
.png)
Cloud Computing Industry Standards Organizations
This course module presents participants with a series of exercises and problems that are designed to test their ability to apply their knowledge of topics covered in previous modules. Completing this lab will help highlight areas that require further attention and will help prove proficiency in cloud computing concepts, technologies, and practices as they are applied and combined to solve real-world problems.
.png)
Reading Exercise 3.1: AGC Case Study Background
.png)
Lab Exercise 3.2: Plan the Cloud Environments
.png)
Lab Exercise 3.3: Perform Cost Comparison Analysis
.png)
Lab Exercise 3.4: Secure the PaaS Environment
.png)
Reading Exercise 3.5: AFR Case Study Background
.png)
Lab Exercise 3.6: Design a SaaS Implementation
.png)
Lab Exercise 3.7: Calculate SLA Availability
.png)
Lab Exercise 3.8: Calculate Combined SLA Availability
.png)
Reading Exercise 3.9: AAS Bargain Service Case Study Background
.png)
Lab Exercise 3.10: Identify Benefits/Challenges for Proposed IaaS Environment
.png)
Lab Exercise 3.11: Design the Bargain Service Implementation
.png)
Lab Exercise 3.12: Secure the IaaS Environment
This course module provides a technical drill-down into the inner workings and mechanics of foundational cloud computing platforms. Private and public cloud environments are dissected into concrete, componentized building blocks (referred to as “patterns”) that individually represent platform feature-sets, functions and/or artifacts, and are collectively applied to establish distinct technology architecture layers.
.png)
Understanding the Technology Architecture of Private Clouds and Public Clouds
.png)
Understanding the Technology Architecture of SaaS, PaaS and IaaS Environments
.png)
Automated Administration and Centralized Remote Administration
.png)
Container Sidecars and Container Chains
.png)
Self-Provisioning and Platform Provisioning
.png)
Rich Containers and Logical Pod Containers
.png)
Bare-Metal Provisioning and Resource Management
.png)
Single-Node Multi-Containers and Multipath Resource Access
.png)
Usage Monitoring and Broad Access
.png)
Realtime Resource Availability and Pay-as-You-Go
.png)
Shared Resources and Resource Pooling
.png)
Rapid Provisioning and Resource Reservation
Non-Disruptive Service Relocation and Service State Management
Workload Distribution and Dynamic Scalability
This foundational course module provides a well-rounded, end-to-end presentation of essential techniques, mechanisms, patterns and industry technologies for establishing cloud-based security controls and security architectures. The cloud security fundamentals covered in Module 2 are continued by introducing threat categorizations and new cloud security mechanisms.
.png)
Cloud Security Basics
.png)
Common Cloud Security Mechanisms
.png)
Cloud Security Threats
.png)
Cloud Security Threat Categorization Methodology
.png)
Identification and Treatment of Common Threats
.png)
Cloud Network Security Patterns and Supporting Mechanisms
.png)
Securing Network Connections and Cloud Authentication Gateways
.png)
Collaborative Monitoring and Logging
.png)
Independent Cloud Auditing
.png)
Cloud Identity and Access Management Patterns and Supporting Mechanisms
.png)
Federating and Enabling Secure Interoperability among Cloud Consumers
.png)
Trust Assurance Patterns and Supporting Mechanisms
Trust Attestation and Establishing Trustworthiness
.avif)