Description: IT security is a concern for most modern organizations and moving to the cloud heightens those concerns for most. The security implications are potentially magnified by large tranches of data existing outside the immediate control of the organization. Although some of the fears with regard to security in the cloud are exaggerated, there are specific areas to be aware of and cautious about. This course explores some of the key risk areas when it comes to security and cloud computing. It also introduces control assessment frameworks and models that can be used in assessing your risk in going to the cloud and evaluating the cloud provider's security offering. It goes on to outline basic guidelines that you should follow to ensure an adequate level of security in an XaaS environment, including key areas of the IT infrastructure and issues relating to data transfer and storage.

Target Audience: IT professionals including managers, engineers, and technical staff evaluating or implementing cloud computing applications and services

Duration: 02:01

Description:

Migrating services to the Cloud has a number of unique challenges. Explore principles of a service-oriented architecture (SOA), and discover how to plan migrating your business solutions to the Cloud.

Target Audience:

Duration: 00:59

Description:

Standardization brings more confidence to the public and helps accelerate the acceptance of new technologies. Explore standards and protocols associated with cloud computing, including the use of open-source software.

Target Audience:

Duration: 01:10

Description:

Cloud-stored data is available from anywhere with Internet access. Examine enterprise resources in the Cloud and the use of cloud storage services, including applicable security regulations or restrictions.

Target Audience:

Duration: 00:48

Description:

Modern data center design is highly influenced by requirements of the Cloud to provide a secure, scalable, and highly available infrastructure. Explore technologies, including virtualization, that allow clouds to be a competitive option.

Target Audience:

Duration: 01:15

Description: As we move toward more applications being delivered via the cloud and businesses using a cloud computing model, we also need to consider the implications for the management of identity. This course ensures you are familiar with identity and access management or IAM and the common industry protocols used to extend identity to the cloud. This course covers the concept of federation between different cryptographic services providers or CSPs and businesses, the need for proper identity and access control management, and it also explores the use of a Cloud Identity as a Service or IDaaS offering. The course also discusses the importance of understanding the presence and privacy factors when conducting business in the cloud and how it is crucial to understand the CSP's responsibility to not only provide security but also a proper level of privacy.

Target Audience: IT professionals including managers, engineers, and technical staff evaluating or implementing cloud computing applications and services

Duration: 01:40

Description: Cloud storage is of key interest to many consumers, as it has a number of advantages over traditional data storage. Cloud-stored data is available from any location that has Internet access. However, depending on the type of business and data, some organizations need to carefully evaluate if and what types of regulations and compliance standards may apply to their data. This course provides a closer look at enterprise resources in the cloud and the use of cloud storage services. It describes the importance of classifying your type of data, what type of security regulations or restrictions apply to it, and whether a cloud provider's offering aligns with those requirements. This course also takes a closer look at the protocols, standards, and mobile client access involved in accessing cloud resources. It explores the meaning of open source software and its role in provisioning and accessing cloud resources.

Target Audience: IT professionals including managers, engineers, and technical staff evaluating or implementing cloud computing applications and services |

Duration: 02:04

Description: While the cloud is not necessarily dependent on virtualization, it's widely accepted that any competitive cloud will utilize it. Infrastructural and network connectivity considerations of the modern data center are greatly influenced by the requirements of the cloud. Data center infrastructure and components must be designed to address security, scalability, disaster recovery, and redundant high-speed connectivity needed to provide a successful cloud service. This course takes a closer look at the main enabling technologies, including data centers and virtualization that allow clouds to function.

Target Audience: IT professionals including managers, engineers, and technical staff evaluating or implementing cloud computing applications and services

Duration: 01:23

Description: Cloud computing is massively growing in importance in the IT sector as more and more companies are eschewing traditional IT and moving applications and business processes to the cloud. This course provides IT professionals with a working definition of cloud computing, explores the technological precursors of today's cloud, as well as the current technologies the cloud is dependent on. Also covered are the benefits and drawbacks of cloud computing for the IT department and business as a whole. It then explores in more detail the different types of services that have become available in the cloud with examples of key pioneers in those areas.

Target Audience: IT professionals including managers, engineers, and technical staff evaluating or implementing cloud computing applications and services

Duration: 01:50