NCTA Cloud Architecture

Request more details:

submit request
To be a cloud architect and a cloud master, you must apply techniques and strategies to design secure, scalable, cost-effective cloud solutions, and be able to convince executives to move forward with your recommendations. In this course, you will develop critical skills in discovering information essential to successfully planning cloud projects, determining requirements, and documenting information and recommendations. In addition, you will apply those concepts to evaluate cloud service providers, and design highly available and scalable solutions that are secure. You will leave this course able to compare, evaluate, and recommend cloud service providers, design secure and scalable cloud solutions, and give compelling, data-backed presentations that will get your recommendations approved, and your cloud projects green-lighted.
To ensure your success in this course you should have experience with basic client and server deployment, configuration, and use. You should also be familiar with evaluating, implementing, accessing, and administering cloud services, including Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS) solutions. You should also have experience deploying applications to, and managing applications in, cloud environments. You can obtain this level of skills and knowledge by taking the following courses:
NCTA Cloud Technologies
NCTA Cloud Operations
Course Objectives:
In this course, you will manage the design and plan the implementation of cloud architectures as needed to function as a Certified Cloud Master.
You will:
Assess cloud solutions options.
Prepare for cloud migration.
Determine technical requirements.
Evaluate cloud service components.
Select AWS infrastructure components.
Determine database requirements.
Select Rackspace cloud features and components.
Select Microsoft Azure features and components.
Determine licensing and SLA requirements.
Design scalable cloud solutions.
Provide business continuity and disaster recovery.
Secure data in the cloud.
Secure access to cloud services.
Present your cloud migration plan.
Assessing Cloud Solution Options :
Overview of Cloud Computing Technologies and Roles
Determine the Type of Cloud Service Model
Determine the Type of Cloud Implementation
Preparing for Cloud Migration :
Manage Cloud Migration Risks
Assemble a Cloud Team
Document Cloud Project Information
Determining Technical Requirements :
Determine Operating System Requirements
Identify Application Requirements
Evaluating Cloud Service Components :
Evaluate Cloud Computing Faciliities
Evaluate Cloud Compute Components
Evaluate Cloud Storage and Delivery Components
Evaluate Virtualization Software
Evaluate Cloud Management Platform Components
Selecting AWS Infrastructure Components :
Select for Data Center Requirements
Select AWS Compute Components
Select AWS Networking Components
Select AWS Storage and Content Delivery Components
Select AWS Management and Monitoring Solutions
Evaluate AWS PaaS Features
Determining Database Requirements:
Define Database Requirements
Select AWS Database Services
Selecting Rackspace Cloud Features and Components :
Select Rackspace Cloud Compute and Network Components
Select Rackspace Cloud Database Components
Select Rackspace Cloud Storage
Monitor Rackspace Solutions with Cloud Analytics
Selecting Microsoft Azure Features and Components :
Select Azure Compute and Network Services
Select Azure Database Services
Select Azure Storage Services
Select Azure App Services
Select Azure Monitoring Solutions
Determining Licensing and SLA Requirements:
Determine Licensing Requirements for Cloud Solutions
Evaluate SLAs
Designing Scalable Cloud Solutions:
Evaluate Scaling Options
Manage Compute Resources
Manage Memory Usage for Cloud Solutions
Manage Storage for Cloud Solutions
Manage Network Components
Providing Business Continuity and Disaster Recovery :
Protect Cloud Data
Ensure Business Continuity
Plan for Disaster Recovery
Securing Data in the Cloud :
Use Encryption to Secure Data
Secure Data-in-Transit
Secure Data-at-Rest
Securing Access to Cloud Services :
Evaluate Perimeter Security Requirements
Define Authentication Requirements
Define Security Event Processes
Presenting Your Cloud Migration Plan :
Apply Presentation Fundamentals
Create a Cloud Migration Presentation
Deliver a Cloud Migration Presentation