6 Weeks Summer Training Cloud Computing
-
Upload
bhupesh-kandhway -
Category
Documents
-
view
29 -
download
0
description
Transcript of 6 Weeks Summer Training Cloud Computing
1 | XPERT INFOTECH | Confidential
COURSE OUTLINE FOR
CLOUD COMPUTING
Specially For Summer Interns
Effective from: Jan 2012
Cloud computing
2 | XPERT INFOTECH | Confidential
COURSE OUTLINE FOR
CLOUD COMPUTING
1. Introduction to Cloud Computing
What is Cloud Computing?
o Cloud Computing Defined
o Cloud Computing Architecture
o Cloud Computing Terms
Communication-as-a-Service (CaaS)
Infrastructure-as-a-Service (IaaS)
Monitoring-as-a-Service (MaaS)
Software-as-a-Service (SaaS)
Platform-as-a-Service (PaaS)
Benefits and Limitations of Cloud Computing
o Benefits
o Limitations
o Cloud Computing Case Studies
How Companies Are Using Cloud Computing
o Implementing Applications and Services in the Cloud
o Using Your Company's Services vs. the Cloud Provider
o A Cloud Service Provider Introduced Cloud Computing Risks and Issues
2. Who's Who in Today's Cloud
Cloud Computing Companies
Products and Services Provided by Cloud Computing Companies
3. The Business Case for Going to the Cloud
Benefits of Cloud Computing
o Operational
o Economic
o Staffing
Should Your Company Invest in Cloud Computing? o What Should Not be Moved to the Cloud
4. The Evolution of Cloud Computing
Early Mainframe Environment
o Virtualization in Mainframe Architectures and Operating Systems
LANs and the Cloud
Internet and the Cloud
Web Services, Browsers, and the Cloud
Thin Client
Advances in Networking and Processing Speeds that Led to Cloud Computing
o Networking Developments
o Increased Processing Speeds
3 | XPERT INFOTECH | Confidential
COURSE OUTLINE FOR
CLOUD COMPUTING
Managed Service Provider Model to Cloud Computing and Software as a Service
(SaaS)
o Single Purpose Architectures Migrate to Multipurpose Architectures
o Data Center Virtualization
Collaboration
o The Cloud as a Reach Extender
o The Cloud as a Communication Enabler
o The Cloud as an Employee Enabler
Service-Oriented Architecture (SOA)
o Evolving from SOA to the Cloud
o Capacity: Limited Performance
o Availability: Communications Failure and Performance Issues
o Security: Newer Security Protocols Provide More Protection What's Next in Cloud Computing
5. Building Cloud Networks
Designing and Implementing a Data Center-Based Cloud
o Using Industry and International Standards
o Independent Components
o Message Base
o Location Independence
Communication Requirements for Cloud Implementation
o Public Internet
o Private Internet
o Routing to the Datacenter
o Switching within the Data Center
o Bandwidth
Tools Used to Measure Network Performance
Using the Protocol Analyzer to Measure Bandwidth
Using Ping and Traceroute to Measure Network Performance
o Security
SSL
VPN
Overhead
Storage Options for Cloud Computing
o Storage Capacity
Data Protection and Partitioning
NAS SAN
CAS
Redundancy
Replication
Multisiting
Backup and Recovery
Server Software Environments that Support Cloud Computing
o Server Capacity
4 | XPERT INFOTECH | Confidential
COURSE OUTLINE FOR
CLOUD COMPUTING
Virtualization
Clustering
Expansion
Server Functions
Application
Web
Database
Vendor Approaches to Cloud Computing
Role of Open Source Software in Data Center
o Cost Reduction vs. Reliability
o Open Source Server Software
o Open Source Database Software
o Open Source Applications Software
o Open Source System Management Software o Open Source Load-Balancing Software
6. Virtualization
Student Virtualization Architectures
o The Hypervisor
o Virtualization as the "Operating System"
o Virtualization with a Host Operating System
Virtualization Infections on Virtualized Environments
o Type 1 Virtualized Environment
o Type 2 Virtualized Environment
Virtualization Environments
o Microsoft Virtualization
o Sun xVM VirtualBox
o Linux/UNIX Virtualization
o VMware Products
Data Center and Cloud Infrastructure Products
End-User and Desktop Products
o IBM Virtualization o Using VMware to see a Virtualized Server Environment
7. Federation, Presence, Security, and Privacy in the Cloud
Federation in the Cloud
o What It Is
o Permissive Federation
o Verified Federation
o Encrypted Federation
o Trusted Federation
o Using XMPP in the Federated Environment
Presence in the Cloud
o What It Is
o Presence Protocols
o Leveraging Presence
5 | XPERT INFOTECH | Confidential
COURSE OUTLINE FOR
CLOUD COMPUTING
o Presence Enabled
o The Future of Presence
o The Interrelation of Identity, Presence, and Location in the Cloud
Identity Management
o What It Is
o Future of Identity in the Cloud
Privacy and Its Relation to Cloud-Based Information Systems
o Personal Information
o Privacy-Related Issues
o Finding Your Private Information
8. Cloud Computing Standards and Best Practices
Open Cloud Consortium
o What It Is
o Open Cloud Consortium Working Groups
Project Matsu
Project Comet
HPC in the Cloud
The Open Cloud Testbed
The Open Science Data Cloud
Intercloud Testbed
Reporting on an Open Cloud Consortium Working Group
Distributed Management Task Force (DMTF)
o What It Is?
o DMTK Working Groups Associated with Cloud Computing
Standards for Application Developers
o Protocols
o Scripting Languages
o Content Formatting Standards and Languages
Standards for Security in the Cloud
o Confidentiality, Integrity, Availability
o Authentication, Authorization, Accountability
o Regulations for Privacy
o Security Protocols
Establishing a Baseline for Cloud Performance
Best Practices for Selecting a Vendor and Implementing Cloud-Based Applications
o Choosing the Right Vendor
o Implementing Cloud-Based Applications
9. End-User Access to Cloud Computing
Cloud Access Methods Available to End Users
o Citrix
o Windows Remote Desktop
o Vnc
o Web Browsers
o Server Extensions
6 | XPERT INFOTECH | Confidential
COURSE OUTLINE FOR
CLOUD COMPUTING
o Thin Clients
o Smart Phones, Pads, Pods, etc.
Virtual Terminal Security Strengths and Weaknesses
o Strengths o Weaknesses
10. Mobility and the Cloud
Mobile Operating Systems for Smartphones
o iPhone
o Android
o BlackBerry
o Windows Mobile
o Ubuntu Mobile Internet Device
Mobile Platform Virtualization
o Kernel-Based Virtual Machine
o VMware Mobile Virtualization Platform
Collaboration Applications for Mobile Platforms
o Text Messaging
o iPhone Applications
o BlackBerry Applications o Droid Applications
Notes:
Recommend Practical hours for student except class hours is 90 Hrs.
We also provide weekend classes for all courses.
After completion of 75% of course, student will go through Live Project
Training, Interview Preparation and Recruitment process in Software
Industry.
7 | XPERT INFOTECH | Confidential
COURSE OUTLINE FOR
CLOUD COMPUTING
Our Technology Specialization and Certification Courses:
8 | XPERT INFOTECH | Confidential
COURSE OUTLINE FOR
CLOUD COMPUTING
KKKEEEYYY FFFEEEAAATTTUUURRREEESSS OOOFFF XXXPPPEEERRRTTT IIINNNFFFOOOTTTEEECCCHHH:::
Training by Certified and Experienced Trainers.
Industrial and Corporate Tie-ups for Live projects for student.
Well equipped Computer Lab, Internet and Book Bank facility.
Live project based Summer Trainings, Summer Internships and
summer programs.
100% placement assistance on every course.
Interview Preparation and Technical Events.
On Campus Interviews in every month for the placement of students.
WI-FI enabled classrooms.
100% Placement
Assistance
On Campus
Interviews
58-61 (Basement), Vashist Park, Pankha Road,
New Delhi-46
Ph.: 011-28526572, 65833100, 9990345891
www.xpert-infotech.com Email: [email protected]