Your Career
Training Marketplace

Questions? Call Toll-Free: 1-866-540-9677

  • Instant Access
    From Anywhere
  • Unlimited
  • 6-12 Months
    To Complete


This course provides a closer look at enterprise resources in the cloud and the use of cloud storage services. Cloud storage is of key interest to many consumers as it has a number of advantages over traditional data storage. Cloud-stored data is available from any location that has Internet access. However, depending on the type of business and data, some organizations need to carefully evaluate if and what types of regulations and compliance standards may apply to their data. This course presents the importance of classifying your type of data, what type of security regulations or restrictions apply to it, and whether a cloud provider's offering aligns with those requirements. The course also takes a closer look at the protocols, standards, and client access involved in accessing cloud resources. It explores the meaning of open Open-source software and its role in provisioning and accessing cloud resources, as well as a look at cloud client computing.
  • describe the advantages of the Storage-as-a-Service model
  • identify the key considerations for cloud storage
  • match the cloud related issue with the governance domain that deals with it
  • determine the security related cloud regulatory considerations that apply in a given scenario
  • determine if Storage-as-a-Service should be use in a given scenario
  • describe the characteristics of cloud governance
  • specify the security related cloud regulatory considerations that apply in a given scenario
  • match the standardization organization it's description
  • categorize common cloud standards and protocols
  • describe the role of APIs in accessing the cloud
  • describe the role of open-source software in cloud computing
  • match the client type to its description
  • describe key considerations for Virtual Desktop Infrastructure implementation
  • describe how APIs facilitate cloud access
  • specify where open-source software is used in cloud computing
  • identify some of the key considerations involved when interacting with the cloud
This course explores the steps you should take in determining if your infrastructure has components that are suitable for a cloud solution. It discusses the Service Oriented Architecture (SOA) and grid computing, and highlights characteristics that make these infrastructures suitable or unsuitable for extension to the cloud. The course also explores the recommended step of analyzing your current infrastructure to inventory data, services, and processes used, as well as identify problem areas that may be addressed through a cloud solution. Upon completion of your analysis, it is time to determine cloud service candidates and match cloud services, as well as look at examples of how to leverage different services to you problem areas. Finally, if all else fails and you are not comfortable with a public cloud solution, we discuss the use of private clouds as a possible interim solution.
  • describe the importance of SOA to cloud computing
  • differentiate between grid and cloud computing
  • describe the importance of data analysis to any migration to the cloud
  • describe the process for determining the areas or domains in your architecture that may be good candidates for cloud computing
  • identify examples of either tightly or loosely coupled architectural areas
  • identify the factors that make a service, data or process suited to the cloud
  • identify the key enterprise barriers to entering a public cloud
  • classify the characteristics of public cloud alternatives
  • describe the relationship between SOA and cloud computing
  • assess the cloud suitability of an enterprise
  • determine if an application is suited to the cloud
  • propose an alternative to a public cloud solution for a given scenario
As we move towards more applications being delivered via the cloud, and businesses using a cloud computing models, we also need to consider the implications for the management of identity. This course ensures you are familiar with identity and access management (IAM) and the common industry protocols used to extend identity to the cloud. It covers the concept of federation between different CSPs and businesses, the need for proper identity and access control management, and it also explores the use of a Cloud Identity as a Service (IDaaS) offering. The course also discusses the importance of understanding the presence and privacy factors when conducting business in the cloud and how it is crucial to understand the CSP's responsibility to not only provide security but also a proper level of privacy.
  • recognize the need for identity and access management
  • match the key operational areas involved in identity and access management to their descriptions
  • recognize examples of cloud use cases that require IAM support from cloud service providers
  • identify some key cloud federation considerations
  • describe the characteristics of Single Sign-On
  • match the challenges associated with the use Identity as a Service to the user group to which they apply
  • classify the pros and cons of using IDaaS as an identity management solution
  • specify the need for identity and access management in a given scenario
  • propose an access solution for a given scenario
  • describe the considerations involved in using IDaaS
  • describe the technical requirements a business must meet to take advantage of presence information
  • match the main components of a presence service to its description
  • identify the security requirements for presence
  • describe the key privacy concerns in a cloud computing environment
  • match the security measures to the phases of the data life cycle
  • describe the technical and security factors involved in leveraging presence in the cloud
  • specify the key security and privacy considerations involved in operation in the cloud
This course explores some of the key risk areas when it comes to security and cloud computing. Although some of the fears in regards to security in the cloud are exaggerated, there are specific areas to be aware and cautious about. The key is knowing your IT infrastructure and needs, as well as carefully assessing the cloud provider offering and security measures. The course introduces control assessment frameworks and models that can be used in assessing your risk in going to the cloud and evaluating the cloud provider's security offering. Along with the top identified security risks, it outlines basic guidelines that should be followed to ensure an adequate level of security in an xaaS environment. In particular, key areas of the IT infrastructure and issues relating to data transfer and storage are covered.
  • identify methods of providing security for data moving to the cloud or residing in the cloud
  • match the means by which CSPs provide security assurances to their descriptions
  • identify the key risk areas in cloud computing
  • describe the basic security practices that should be implemented in a SaaS environment
  • describe the security considerations involved in connecting your network infrastructure to the cloud
  • distinguish between the security responsibilities of client and CSP for different cloud deployments at the host level
  • match the cloud service delivery model to who is responsible for it's application security
  • describe the key challenges related to securing data in the cloud
  • identify the questions a potential user of cloud data storage needs to ask when conducting a risk assessment
  • determine if a CSP can provide the required security assurances in a given scenario
  • define the cloud data security challenges for a given scenario

Join The 50,000+ Companies That Have Purchased Training from

  • 50K+ Companies Trained

    Including 90% Of Fortune 500 Companies Have Purchased Training With

  • 300K+ Courses & Videos

    Live Instructor-Led (Classroom & Virtual), Self-Paced E-learning & Custom OnSite Training Solutions From Leading Training Providers

  • 800+ Expert Instructors

    Industry-Leading Subject Matter Experts (SMEs).Tenured &
    Award-Winning Instructor Network

Get the latest industry news, recommended courses, & promotions from sent straight to your inbox.