Course curriculum

  • 1

    Module 1: Welcome to Cloud Computing

    • Segment - 01 - Course Introduction
  • 2

    Module 2: Intro to Cloud Computing

    • Segment - 02 - Cloud Computing the History
    • Segment - 03 - On the Road to Cloud Computing Virtualization
    • Segment - 04 - Are we using Cloud Computing?
    • Segment - 05 - What is Cloud Computing?
  • 3

    Module 3: Cloud Services Models

    • Segment - 06 - Cloud Service Models Overview
    • Segment - 07 - Pizza as a Service
    • Segment - 08 - What is IaaS?
    • Segment - 09 - What is PaaS?
    • Segment - 10 - What is SaaS?
  • 4

    Module 4: Cloud Computing Deployment Models

    • Segment - 11 - Cloud Computing Deployment Models Overview
    • Segment - 12 - Public Cloud
    • Segment - 13 - Private Cloud
    • Segment - 14 - Hybrid Cloud
    • Segment - 15 - Which Cloud Model Should You Choose?
  • 5

    Module 5: Best Practices to benefit from Cloud Computing Services

    • Segment - 16 - Best Practices Introduction
    • Segment - 17 - Which Cloud Provider is the Best for you?
    • Segment - 18 - Conclusion
  • 6

    Module 6: Cloud Computing Challenges

    • Segment - 19 - Cloud Computing Challenges Introduction
    • Segment - 20 - Security
    • Segment - 21 - Managing Cloud Spend
    • Segment - 22 - Governance
    • Segment - 23 - Lack of Cloud Security
    • Segment -24 - Compliance
    • Segment - 25 - Byol
    • Segment - 26 - Managing Multi Cloud
    • Segment - 27 - Cloud Migration
  • 7

    Module 7: Cloud Computing Security Issues Identified by CSA

    • Segment - 28 - What is Cloud Security?
    • Segment - 29 - CSA Cloud Security Alliance
    • Segment - 30 - Cloud Computing Security Issues Identified
    • Segment - 31 - Data Breaches
    • Segment - 32 - Misconfiguration and Inadequate Change
    • Segment - 33 - Lack of Resources Expertise
    • Segment - 34 - Insufficient Identity Credentials
    • Segment - 35 - Account Hijacking
    • Segment - 36 - Insider Threats
    • Segment - 37 - Insecure Interfaces ans APIS
    • Segment - 38 - Weak Control Plane
    • Segment - 39 - Metastructure and Applistructure Failures
    • Segment - 40 - Limited Cloud Usage Visibility
    • Segment - 41 - Abuse and Nefarious Use of Cloud Services
    • Segment - 42 - Keep in Mind (Security)
    • Segment - 43 - Cyber Attacks In Action
  • 8

    Module 8: Cloud Computing Security Strategies

    • Segment - 44 - Cloud Computing Security Strategies Overview
    • Segment - 45 - End to End Data Encryption
    • Segment - 46 - Secure Data Transfers
    • Segment - 47 - Local Data Backups
    • Segment - 48 - DDOS
    • Segment - 49 - Vulnerability Assessments
    • Segment - 50 - Access Management
    • Segment - 51 - Keep In Mind Security Strategies
  • 9

    Module 9: Commercial VS Open Source Cloud Solutions

    • Segment - 52 - Commercial VS Opensource Introduction
    • Segment - 53 - Amazon Web Services
    • Segment - 54 - Microsoft Azure
    • Segment - 55 - Openstack
    • Segment - 56 - Apache Cloudstack
    • Segment - 57 - Opensource or Commercial Which One to Adopt
  • 10

    Module 10: Build Your Own Private Cloud at Home

    • Segment - 58 - Build Your Own Openstack Devstack on Ubuntu