Course Code: GES369
The Principles of Cloud Computing: Dive into the concept of cloud computing. Compare the four main deployment models, master the main service models, and study the evolution of cloud computing.
Cloud Computing Fundamentals Continued: Learn about virtualization in cloud computing, study cloud computing architectures, understand service-oriented architecture, drivers, and limitations.
Implementing and Managing Cloud Computing: Discuss the building of a local cloud environment, the main components of a local cloud environment, access VPNs and LANs, risks of connecting to local clouds, and cloud service management.
Using the Cloud: Understand how users access the cloud, cloud web access architecture, thin clients, mobile device involvement, standard application in collaboration, service providers, and the benefits of cloud based services.
Security and Compliance: Learn about the cloud as it pertains to security risks, identify management, privacy, compliance issues, and safeguards.
Evaluation of Cloud Computing: Explore the business case for cloud computing, including costs and possible savings, operational and staff benefits, implementations, performance factors, management requirements, and service providers.
I. The Principles of Cloud Computing
A. The concept of Cloud Computing
B. Explain Cloud Computing
C. Compare the four main Deployment Models
D. Three main Service Models
E. Evolution toward Cloud Computing
F. Concepts from which Cloud Computing developed
G. Role of Virtualization in Cloud Computing
H. Role of managed services in Cloud Computing
I. Cloud Computing architectures
J. Difference between a single purpose and multipurpose architecture
K. Service Oriented Architecture
L. Drivers and limitations of Cloud Computing
II. Implementing and Managing Cloud Computing
A. Building of Local Cloud environment
B. Main components of a local cloud environment and how they are interconnected
C. Use of Virtual Private Network access to a Local Area Network
D. Risks of connecting a local cloud network to the public internet
E. Principles of managing Cloud services
F. Use of IT Service Management principles in a Cloud environment
G. Management of service levels in a Cloud environment
III. Using the Cloud
A. How users can access the Cloud
B. How to access Web Applications through a Web Browser
C. Cloud Web Access Architecture
D. Use of a Thin Client
E. Use of mobile devices in accessing the cloud
F. How Cloud Computing can be used for business processes
G. Impact of Cloud Computing on the primary processes of an organization
H. Role of standard applications in collaboration
I. How Service Providers can use the Cloud
J. How using Cloud Computing changes the relation between vendors and customers
K. Benefits and risks of providing Cloud based services
IV. Security and Compliance
A. Security risks of Cloud Computing and knows mitigating measures
B. Security risks in the cloud
C. Mitigating security risks
D. Managing identity and privacy in the Cloud
E. Identity management
F. Privacy and Compliance issues and safeguards in Cloud Computing
V. Evaluation of Cloud Computing
A. Business case for Cloud Computing
B. Costs and possible savings of Cloud Computing
C. Operational and staffing benefits of Cloud Computing
D. Evaluation of Cloud Computing implementations
E. Evaluation of performance factors, management requirements and satisfaction factors
F. Evaluation of service providers and their services in Cloud Computing
Dean R. Bushmiller has had fun for the past 20 years learning and teaching everything he can in technology and security. His consulting experience in accounting systems, inventory control, migrations, and patch management has breathed life into his 12 years in the classroom. Dean is a courseware developer who specializes in the CISSP and security training. He is the lead instructor for Expanding Security and teaches online as his main job. As a non-military person, he is a proud recipient of six mission coins. Dean has taught more than 1000 classes with a lifetime approval rating of +90% on topics of: CISSP, including: SOX, PCI-DSS, digital rights management, data loss prevention, incident handling, auditing for compliance, penetration testing, patch management, networking, architecture, migration, certification, and administration.
There are no prerequisites to take this course. Students can take this course without any prior IT experience or certifications.
The instructional materials required for this course are included in enrollment and will be available online.
EXIN is an international organization that seeks to advance the information technology (IT) industry through certifications and continuing education. It develops exams in-house to ensure it can keep up with the rapidly changing field of IT. EXIN also acts as an accrediting body, working with partners to offer exams through many channels. EXIN has certified more than two million professionals in its 30 years, and you could be one of them when you enroll in a certified course.
Yes, ed2go courses are online, so you never have to actually travel to the school. Most schools offer telephone or online registration.
This course is open enrollment, so you can register and start the course as soon as you are ready. Access to your course can take 24-48 business hours.
This course is self-paced and open enrollment, so you can start when you want and finish at your own pace. When you register, you'll receive six (6) months to complete the course.
The time allotted for course completion has been calculated based on the number of course hours. However, if you are unable to complete the course, contact your Student Advisor to help you work out a suitable completion date. Please note that an extension fee may be charged.
You may be assigned with an instructor or team of industry experts for one-on-one course interaction. Your support will be available (via e-mail) to answer any questions you may have and to provide feedback on your performance. All of our instructors are successful working professionals in the fields in which they teach. You will be assigned to an Advisor for academic support.
Upon successful completion of the course, you will be awarded a Certificate of Completion.
This course will provide you with the skills you need to obtain an entry-level position in most cases. Potential students should always do research on the job market in their area before registering.
ed2go courses are non-credit, so they do not qualify for federal aid, FAFSA and Pell Grant. In some states, vocational rehab or workforce development boards will pay for qualified students to take our courses. Additionally, some students may qualify for financial assistance when they enroll, if they meet certain requirements. Financing is available from select schools. Learn more: https://www.ed2go.com/career/financial-assistance
If you have questions that are not answered on our website, please feel free to contact us via LIVE CHAT or by calling us at (855) 520-6806. If you are visiting us during non-business hours, please feel free to send us a question using the Contact Us form.