Course Code: GES369
The Principles of Cloud Computing: Dive into the concept of cloud computing. Compare the four main deployment models, master the main service models, and study the evolution of cloud computing.
Cloud Computing Fundamentals Continued: Learn about virtualization in cloud computing, study cloud computing architectures, understand service-oriented architecture, drivers, and limitations.
Implementing and Managing Cloud Computing: Discuss the building of a local cloud environment, the main components of a local cloud environment, access VPNs and LANs, risks of connecting to local clouds, and cloud service management.
Using the Cloud: Understand how users access the cloud, cloud web access architecture, thin clients, mobile device involvement, standard application in collaboration, service providers, and the benefits of cloud based services.
Security and Compliance: Learn about the cloud as it pertains to security risks, identify management, privacy, compliance issues, and safeguards.
Evaluation of Cloud Computing: Explore the business case for cloud computing, including costs and possible savings, operational and staff benefits, implementations, performance factors, management requirements, and service providers.
I. The Principles of Cloud Computing
A. The concept of Cloud Computing
B. Explain Cloud Computing
C. Compare the four main Deployment Models
D. Three main Service Models
E. Evolution toward Cloud Computing
F. Concepts from which Cloud Computing developed
G. Role of Virtualization in Cloud Computing
H. Role of managed services in Cloud Computing
I. Cloud Computing architectures
J. Difference between a single purpose and multipurpose architecture
K. Service Oriented Architecture
L. Drivers and limitations of Cloud Computing
II. Implementing and Managing Cloud Computing
A. Building of Local Cloud environment
B. Main components of a local cloud environment and how they are interconnected
C. Use of Virtual Private Network access to a Local Area Network
D. Risks of connecting a local cloud network to the public internet
E. Principles of managing Cloud services
F. Use of IT Service Management principles in a Cloud environment
G. Management of service levels in a Cloud environment
III. Using the Cloud
A. How users can access the Cloud
B. How to access Web Applications through a Web Browser
C. Cloud Web Access Architecture
D. Use of a Thin Client
E. Use of mobile devices in accessing the cloud
F. How Cloud Computing can be used for business processes
G. Impact of Cloud Computing on the primary processes of an organization
H. Role of standard applications in collaboration
I. How Service Providers can use the Cloud
J. How using Cloud Computing changes the relation between vendors and customers
K. Benefits and risks of providing Cloud based services
IV. Security and Compliance
A. Security risks of Cloud Computing and knows mitigating measures
B. Security risks in the cloud
C. Mitigating security risks
D. Managing identity and privacy in the Cloud
E. Identity management
F. Privacy and Compliance issues and safeguards in Cloud Computing
V. Evaluation of Cloud Computing
A. Business case for Cloud Computing
B. Costs and possible savings of Cloud Computing
C. Operational and staffing benefits of Cloud Computing
D. Evaluation of Cloud Computing implementations
E. Evaluation of performance factors, management requirements and satisfaction factors
F. Evaluation of service providers and their services in Cloud Computing
Dean R. Bushmiller has had fun for the past 20 years learning and teaching everything he can in technology and security. His consulting experience in accounting systems, inventory control, migrations, and patch management has breathed life into his 12 years in the classroom. Dean is a courseware developer who specializes in the CISSP and security training. He is the lead instructor for Expanding Security and teaches online as his main job. As a non-military person, he is a proud recipient of six mission coins. Dean has taught more than 1000 classes with a lifetime approval rating of +90% on topics of: CISSP, including: SOX, PCI-DSS, digital rights management, data loss prevention, incident handling, auditing for compliance, penetration testing, patch management, networking, architecture, migration, certification, and administration.
Students can take this course without any prior IT experience or certifications.
This program can be taken from either a Mac or a PC. It is compatible with the Windows 2000 and later operating systems and any browsers.
There are no specific computer requirements other than an Internet connection and e-mail account. We recommend that you use the latest version of the browser you choose.
The materials for this program are all available online.
Yes, because ed2go programs are online you never have to actually travel to the school. Most schools offer telephone or online registration.
All of our programs are self-paced and open enrollment, so you can start them when you want and finish them at your own pace. When you register, you’ll receive six (6) months to complete the program.
The time allotted to complete your program has been calculated based on the number of hours for each program, so don't worry too much about not completing in time. If, after a concerted effort, you are still unable to complete, your Student Advisor will help you work out a suitable completion date. Please note that a fee may be charged for an extension.
ed2go courses are non-credit courses, so they do not qualify for federal aid. In some states, vocational rehab or workforce development boards will pay for qualified students to take our courses. Additionally, some students may qualify for financial assistance when they enroll, if they meet certain requirements.
Upon successful completion of the program, you will be awarded a certificate of completion.
ed2go programs will provide you with the skills you need to obtain an entry-level position in most cases. We don’t provide direct job placement services, but our facilitators and career counselors will help you build your resume and are available to give advice on finding your first job. Facilitators will also be available to use as a professional reference upon completion of the program. Potential students should always do research on the job market in their area before registering.
Each student is paired with a facilitator for one-on-one interaction. The facilitator will be available (via e-mail) to answer any questions you may have and to provide feedback on your performance. All of our facilitators are successful working professionals in the fields in which they teach.
In order to take our online programs, you must have access to a computer and the Internet. You can access the program contents from any Web-enabled computer. You don’t have to use the same computer to log-in to the program every time. We recommend that you have a word-processing program (Microsoft Word is the best) and the latest version of Internet Explorer.
If you have questions that are not answered on our website, please feel free to contact us via LIVE chat (click the button above). If you are visiting us during non-business hours, please feel free to send us a question using the “Contact Us” form to the right. You may also call us at 1-877-221-5151. We will answer your questions promptly.
Our programs are all open enrollment. You can register and start the program as soon as you are ready.
Please note: Once the program curriculum is accessed online or through submission of a material shipment confirmation, refunds cannot be issued.
This program does not lead to a certification but will help prepare you for the EXIN Cloud Computing Foundation Certification exam.