Cloud Computing Fundamentals Course
This course is designed to help you understand the basics of cloud computing, enabling a freshly graduated student looking to start a career in cloud computing, or a working professional switching from another field to understand the core principles
1
Segment - 01 - Course Introduction
2
Segment - 02 - Cloud Computing the History
Segment - 03 - On the Road to Cloud Computing Virtualization
Segment - 04 - Are we using Cloud Computing?
Segment - 05 - What is Cloud Computing?
3
Segment - 06 - Cloud Service Models Overview
Segment - 07 - Pizza as a Service
Segment - 08 - What is IaaS?
Segment - 09 - What is PaaS?
Segment - 10 - What is SaaS?
4
Segment - 11 - Cloud Computing Deployment Models Overview
Segment - 12 - Public Cloud
Segment - 13 - Private Cloud
Segment - 14 - Hybrid Cloud
Segment - 15 - Which Cloud Model Should You Choose?
5
Segment - 16 - Best Practices Introduction
Segment - 17 - Which Cloud Provider is the Best for you?
Segment - 18 - Conclusion
6
Segment - 19 - Cloud Computing Challenges Introduction
Segment - 20 - Security
Segment - 21 - Managing Cloud Spend
Segment - 22 - Governance
Segment - 23 - Lack of Cloud Security
Segment -24 - Compliance
Segment - 25 - Byol
Segment - 26 - Managing Multi Cloud
Segment - 27 - Cloud Migration
7
Segment - 28 - What is Cloud Security?
Segment - 29 - CSA Cloud Security Alliance
Segment - 30 - Cloud Computing Security Issues Identified
Segment - 31 - Data Breaches
Segment - 32 - Misconfiguration and Inadequate Change
Segment - 33 - Lack of Resources Expertise
Segment - 34 - Insufficient Identity Credentials
Segment - 35 - Account Hijacking
Segment - 36 - Insider Threats
Segment - 37 - Insecure Interfaces ans APIS
Segment - 38 - Weak Control Plane
Segment - 39 - Metastructure and Applistructure Failures
Segment - 40 - Limited Cloud Usage Visibility
Segment - 41 - Abuse and Nefarious Use of Cloud Services
Segment - 42 - Keep in Mind (Security)
Segment - 43 - Cyber Attacks In Action
8
Segment - 44 - Cloud Computing Security Strategies Overview
Segment - 45 - End to End Data Encryption
Segment - 46 - Secure Data Transfers
Segment - 47 - Local Data Backups
Segment - 48 - DDOS
Segment - 49 - Vulnerability Assessments
Segment - 50 - Access Management
Segment - 51 - Keep In Mind Security Strategies
9
Segment - 52 - Commercial VS Opensource Introduction
Segment - 53 - Amazon Web Services
Segment - 54 - Microsoft Azure
Segment - 55 - Openstack
Segment - 56 - Apache Cloudstack
Segment - 57 - Opensource or Commercial Which One to Adopt
10
Segment - 58 - Build Your Own Openstack Devstack on Ubuntu