-
This course provides a condensed overview of the topic of cloud computing. After an introduction to the change in IT architectures, terms such as cloud computing, cloud services and cloud models are explained and the advantages for companies are discussed. However, the new IT architecture also has far-reaching effects on the organizational, personnel, infrastructural and technical areas of a company. These are discussed from the perspective of both the user and the provider. The technical structure of typical cloud infrastructures and their security mechanisms and technologies will then be presented. The BootCamp ends with a market overview, a discussion of current cloud offerings and an outlook.
-
Course Contents
-
- Definition of Cloud Computing (NIST, CSA and BSI) as well as of the Cloud and Service Models
- Private Clouds: VMware vCloud Suite, Microsoft Windows Azure Pack, and OpenStack
- Data Protection in Europe and on an International Scale Laws and their Limits
- Data Privacy Risk of Data Theft and Legal Overall Conditions
- Contract Law, Data Protection, Information Security, and Compliance
- SOX, HGB, KonTraG, EG Dual Use, etc.
- SLAs and Service Management: ITIL, CoBit, ISO 27001/2, BSI Standard 100-4, etc.
- Cloud Standards and Interfaces (REST-API, OVF, vCloud API, etc.)
- Server and Desktop Virtualization VMware, Microsoft, XEN, KVM, and Docker
- Modern Data Center Design and Technological Developments
- FabricPath, SDN, OpenFlow, Cisco ACI, VMware NSX, VXLAN, and NFV
- Storage Development: Object Storage, Software-Defined Storage, and SAN Security
- Software-defined Data Center (SDDC) Architecture and Implementation Variants
- vCloud Suite and OpenStack
- Innovative Server and Overall Solutions, as well as Hyperconvergent Systems
- Cloud Security—Introduction and Setup (ISO 27001, BSI)
- Demands Made on the WAN and Possible Pitfalls
- Transition Phase, Possible Pitfalls, as well as Typical Application and Migration Scenarios
- Market Overview, Internationally and for Germany, as well as Market Development and Trends
- Public Cloud Offers in a Comparison: AWS, Azure, vCloud Air, Google, Salesforce, etc.
The detailed digital documentation package, consisting of an e-book and PDF, is included in the price of the course.
-
Target Group
-
The course is aimed at anyone who wants to acquire in-depth knowledge of the cloud from a conceptual and legal as well as a technical and organizational perspective.
-
Knowledge Prerequisites
-
A willingness to deal with conceptual and legal issues is a prerequisite. Basic network and IT knowledge is a great advantage for the technical part of the course.
1 | Cloud Computing |
1.1 | Setup of Applications |
1.2 | The Motivation from the Viewpoint of the Customer |
1.2.1 | Business Availability |
1.2.2 | From Fixed to Variable Costs |
1.2.3 | Agile Infrastructure |
1.2.4 | Technologically Always Sate-of-the-Art |
1.2.5 | High Utilization of Resources and Energy Efficiency |
1.2.6 | High Performance, Availability and Service Quality |
1.2.7 | Security and Compliance |
1.2.8 | Cost Reduction and Time Savings |
1.3 | Typical Objections |
1.4 | Growth Market Cloud Computing |
1.5 | Virtualization as an Enabler for Cloud Computing |
1.6 | Cloud Computing |
1.6.1 | Service Models of Cloud Computing |
1.6.2 | Various Cloud Variants |
1.7 | Challenges of Cloud Computing |
1.8 | Services from the Cloud |
1.8.1 | Typical Services |
2 | Security Requirements |
2.1 | Basic IT Standards |
2.2 | Basic BSI Protection According to BSI Standard 100-4 and ISO 27001 |
2.3 | BS 25999 and ISO 22301 |
2.4 | ISO/IEC 27001 and 27002 |
3 | Data Protection, Contract Law, Information Security, and Compliance |
3.1 | Which law is applicable? |
3.2 | Data Protection |
3.2.1 | European Data Protection Directive |
3.2.2 | Basic Data Protection Directive |
3.2.3 | Current National Legal Situation |
3.2.4 | Effects on Cloud Computing |
3.2.5 | Further Legal Aspects |
3.2.6 | Summary—Part 1 |
3.3 | Contract Law |
3.4 | Information Security |
3.5 | Compliance |
3.6 | The Biggest Risk |
3.7 | Important Links |
4 | Cloud Security—Server and LAN |
4.1 | Setup of Cloud Infrastructures |
4.2 | Cloud Security Basics |
4.3 | Server Security in Virtualized Environments |
4.4 | Network Security in Virtualized Environments |
5 | Licensing and Standardization |
5.1 | Licensing in the Hybrid Cloud |
5.2 | Standardization and Interfaces |
6 | Important Models of Service Management |
6.1 | The Classic: Plan—Build—Run |
6.1.1 | Service Model Phases |
6.1.2 | Limitations |
6.2 | ITIL Edition 2011 |
6.3 | Service Strategy |
6.4 | Service Design |
6.5 | Service Transition |
6.5.1 | Transition Planning and Support |
6.5.2 | Change Management |
6.5.3 | Service Asset and Configuration Management |
6.5.4 | Release and Deployment Management |
6.5.5 | Service Validation and Testing |
6.5.6 | Change Evaluation |
6.5.7 | Knowledge Management |
6.6 | Service Operation |
6.6.1 | Event Management |
6.6.2 | Incident Management |
6.6.3 | Request Fulfillment |
6.6.4 | Problem Management |
6.6.5 | Access Management |
6.6.6 | Service Desk, Technical Management, IT Operations, and Application Management |
6.6.7 | Service Operations |
6.7 | Continual Service Improvement (CSI) |
6.8 | Organizational Aspects—Example: Cloud Security |
6.9 | Characteristic IT Parameters |
6.10 | Further Standards, Directives, and Methods in an Overview |
6.10.1 | ISO/IEC 20000 |
6.10.2 | COBIT |
6.10.3 | ISO/IEC 27001 and 27002 |
6.10.4 | IPMA, PMP, and PRINCE2 |
7 | Server and Desktop Virtualization |
7.1 | Business Requirements Made on IT |
7.2 | Server Centralization |
7.3 | Server Virtualization, Consolidation, and Automation |
7.3.1 | Advantage: Faster Provisioning |
7.3.2 | Advantage: Automation |
7.3.3 | Advantage: Consolidation |
7.3.4 | Advantage: Pooling |
7.3.5 | Advantage: High Availability |
7.3.6 | Advantage: Green IT |
7.4 | VMware, KVM, Xen, and Hyper-V in Comparison |
7.5 | Server Virtualization by Means of VMware |
7.5.1 | Development |
7.6 | The vSphere Product Range |
7.7 | Hyper-V 3.0 |
7.8 | Fields of Application and Benefits |
7.8.1 | Virtual Networks |
7.8.2 | Challenges for Network Configuration |
7.8.3 | VMotion |
7.8.4 | Distributed Resource Scheduling (DRS) |
7.8.5 | High Availability (HA) and Fault Tolerance (FT) |
7.9 | The Software-Defined Data Center |
7.10 | Server Hardware and Software |
7.11 | Special Features in the Sectors Network, Server, and Memory |
7.12 | The Network in the Course of Change |
7.12.1 | FabricPath |
7.12.2 | Overlay Transport Virtualization—OTV |
7.12.3 | Example: VCS by Brocade |
7.12.4 | The Switch on the Server |
7.13 | Virtual Desktop Infrastructure |
7.14 | Security in Virtual Environments |
7.14.1 | Cisco Virtual Security Gateway—VSG |
8 | Unified Computing System—UCS |
8.1 | The Server Market |
8.2 | The Unified Computing System |
8.3 | The Cisco UCS C Series |
8.4 | The Cisco UCS B Series |
8.4.1 | Chassis |
8.4.2 | Power Supplies |
8.4.3 | Blade Server |
8.4.4 | Mezzanine Adapter |
8.4.5 | I/O Modules (IOM) |
8.4.6 | Fabric Interconnect |
8.4.7 | UCS Manager |
8.5 | Added Value of the Unified Computing System |
8.6 | All-in Solutions |
8.6.1 | FlexPod—Cisco and NetApp |
8.6.2 | Vblock |
8.6.3 | EMC VSPEX |
8.7 | Cisco VXI Infrastructure |
8.8 | Design Scenarios with UCS |
8.9 | HP c-Class Series |
8.10 | IBM BladeCenter |
8.11 | Dell |
8.12 | Management Server Area |
8.13 | Application Security in Cloud Environments |
8.14 | The Term Proxy |
8.14.1 | Explicit Proxies |
8.14.2 | Transparent Proxies |
8.14.3 | Reverse Proxies |
8.14.4 | Generic Proxies |
8.14.5 | Application Layer Gateways |
8.14.6 | Working Mode |
8.14.7 | Limitations |
8.14.8 | Web Proxies |
8.14.9 | Authentication at the Firewall |
8.14.10 | The Server End |
8.14.11 | The Client End |
8.15 | Mail Relays |
9 | Storage Consolidation and Virtualization |
9.1 | Significance of the Data Storage Unit |
9.1.1 | Direct Attached Storage |
9.2 | Network Storage |
9.2.1 | Network-Attached Storage |
9.2.2 | Storage Area Networks |
9.2.3 | NFS, iSCSI, FC, and FCoE in Comparison |
9.3 | Storage Consolidation and Data Deduplication |
9.4 | Storage Virtualization |
9.4.1 | Host-Based Virtualization—LVM |
9.4.2 | Host-Based Virtualization—Storage Meta-Data Server |
9.4.3 | Server-Based Storage APIs |
9.4.4 | Storage-System-Based Virtualization |
9.4.5 | Distributed Modular Array Virtualization |
9.4.6 | Network-Based Virtualization |
9.4.7 | Virtualization Appliances |
9.4.8 | Decisive Points in the Selection of Virtualization Technologies |
9.5 | Storage Virtualization—Vendor Overview |
9.6 | FCoE and Competitors |
9.7 | The Storage Market |
9.8 | Cisco Products and Positioning |
9.9 | Brocade Products and Positioning |
9.10 | Introduction to SAN Security |
9.11 | Myths and Assumptions |
9.11.1 | Isolated Environment |
9.11.2 | Security by Obscurity |
9.11.3 | Tapping of Fibre Channel |
9.11.4 | Delivered Security |
9.12 | Security in the Fabric |
9.12.1 | Security at the Storage Unit |
9.12.2 | Advanced Security Features in the SAN |
9.12.3 | NPIV and NPV |
9.12.4 | Unified Fabric Data Center |
9.12.5 | Brocade: Virtual Fabrics |
9.12.6 | The Cisco Cloud Story for the SAN |
9.12.7 | VSAN Concept |
10 | Modern Data Center Design |
10.1 | Classic Network Virtualization Methods |
10.2 | Data Center Network Design |
10.3 | Data Center Infrastructure |
10.4 | Access Layer Design |
10.5 | Service Virtualization |
10.6 | Aggregation Layer Design |
10.7 | Data Center Core Layer Design |
10.8 | WDM between Data Centers |
10.9 | Unified Fabric |
10.10 | Current Changes |
10.10.1 | Security in the Data Center |
10.10.2 | Manufacturers |
10.10.3 | HP |
10.10.4 | Brocade |
10.10.5 | Cisco |
10.11 | Cloud Security—Infrastructure |
10.11.1 | Data Center Edge Security |
10.11.2 | Data Center Core Security |
10.11.3 | The Technologies in an Overview |
10.11.4 | Protection of Management Access and Control Plane |
10.11.5 | Protection of the Data Plane |
10.11.6 | Quality of Service |
10.11.7 | Link Encryption According to IEEE 802.1AE and Cisco TrustSec |
10.11.8 | Virtual Switches: Example of Cisco VDCs |
10.11.9 | MPLS or VRF Lite for Separate Networks |
10.11.10 | Security on the Aggregation Layer |
10.11.11 | Data Center Services |
10.11.12 | Security in the Access Area |
10.11.13 | IEEE 802.1X |
10.11.14 | DHCP Snooping |
10.11.15 | Dynamic ARP Inspection |
10.11.16 | IP Source Guard |
11 | WAN Connection |
11.1 | WAN Basics |
11.2 | Requirements Made by the Applications |
11.2.1 | Typical Pitfalls |
11.2.2 | Possible Solutions |
11.2.3 | Applications which Are not Applicable in the Cloud |
12 | Management Access to the Cloud |
12.1 | Cloud Security—Organizational Aspects |
12.2 | Physical Access Protection |
12.3 | User Accounts and Passwords |
12.3.1 | Default Parameters |
12.3.2 | Central User Administration |
12.4 | Information on User Activity |
12.5 | Access via CLI |
12.6 | Access with SNMP |
12.6.1 | SNMPv1 and SNMPv2c |
12.6.2 | SNMPv3 |
12.7 | Cloud Management Tools |
12.7.1 | Scenario of a Cloud NMS Structure |
12.7.2 | Network Management Systems |
12.7.3 | Element Manger—e.g. vCenter Server by VMware |
12.7.4 | Element Manager—Cisco UCS Manager |
12.7.5 | End-to-End Management—e.g. BMC BladeLogic |
13 | Large-Scale Cloud Providers |
13.1 | Cloud Providers |
13.2 | Amazon Web Services |
13.2.1 | EC2 |
13.2.2 | Amazon S3 |
13.2.3 | Amazon EBS, DynamoDB and RDS |
13.2.4 | Further Amazon Services |
13.3 | Microsoft Azure Services Platform |
13.3.1 | Windows Azure |
13.3.2 | Windows Azure AppFabric |
13.3.3 | Windows SQL Azure |
13.4 | IBM LotusLive |
13.5 | Fujitsu |
13.6 | Google Apps |
13.7 | SalesForce |
14 | Transition Phase and Pitfalls |
14.1 | Transition Phase |
14.1.1 | Technical Planning |
14.1.2 | Organizational Planning |
14.2 | Pitfalls |
-
Classroom training
- Do you prefer the classic training method? A course in one of our Training Centers, with a competent trainer and the direct exchange between all course participants? Then you should book one of our classroom training dates!
-
Hybrid training
- Hybrid training means that online participants can additionally attend a classroom course. The dynamics of a real seminar are maintained, and the online participants are able to benefit from that. Online participants of a hybrid course use a collaboration platform, such as WebEx Training Center or Saba Meeting. To do this, a PC with browser and Internet access is required, as well as a headset and ideally a Web cam. In the seminar room, we use specially developed and customized audio- and video-technologies. This makes sure that the communication between all persons involved works in a convenient and fault-free way.
-
Online training
- You wish to attend a course in online mode? We offer you online course dates for this course topic. To attend these seminars, you need to have a PC with Internet access (minimum data rate 1Mbps), a headset when working via VoIP and optionally a camera. For further information and technical recommendations, please refer to.
-
Tailor-made courses
-
You need a special course for your team? In addition to our standard offer, we will also support you in creating your customized courses, which precisely meet your individual demands. We will be glad to consult you and create an individual offer for you.

-
This course provides a condensed overview of the topic of cloud computing. After an introduction to the change in IT architectures, terms such as cloud computing, cloud services and cloud models are explained and the advantages for companies are discussed. However, the new IT architecture also has far-reaching effects on the organizational, personnel, infrastructural and technical areas of a company. These are discussed from the perspective of both the user and the provider. The technical structure of typical cloud infrastructures and their security mechanisms and technologies will then be presented. The BootCamp ends with a market overview, a discussion of current cloud offerings and an outlook.
-
Course Contents
-
- Definition of Cloud Computing (NIST, CSA and BSI) as well as of the Cloud and Service Models
- Private Clouds: VMware vCloud Suite, Microsoft Windows Azure Pack, and OpenStack
- Data Protection in Europe and on an International Scale Laws and their Limits
- Data Privacy Risk of Data Theft and Legal Overall Conditions
- Contract Law, Data Protection, Information Security, and Compliance
- SOX, HGB, KonTraG, EG Dual Use, etc.
- SLAs and Service Management: ITIL, CoBit, ISO 27001/2, BSI Standard 100-4, etc.
- Cloud Standards and Interfaces (REST-API, OVF, vCloud API, etc.)
- Server and Desktop Virtualization VMware, Microsoft, XEN, KVM, and Docker
- Modern Data Center Design and Technological Developments
- FabricPath, SDN, OpenFlow, Cisco ACI, VMware NSX, VXLAN, and NFV
- Storage Development: Object Storage, Software-Defined Storage, and SAN Security
- Software-defined Data Center (SDDC) Architecture and Implementation Variants
- vCloud Suite and OpenStack
- Innovative Server and Overall Solutions, as well as Hyperconvergent Systems
- Cloud Security—Introduction and Setup (ISO 27001, BSI)
- Demands Made on the WAN and Possible Pitfalls
- Transition Phase, Possible Pitfalls, as well as Typical Application and Migration Scenarios
- Market Overview, Internationally and for Germany, as well as Market Development and Trends
- Public Cloud Offers in a Comparison: AWS, Azure, vCloud Air, Google, Salesforce, etc.
The detailed digital documentation package, consisting of an e-book and PDF, is included in the price of the course.
-
Target Group
-
The course is aimed at anyone who wants to acquire in-depth knowledge of the cloud from a conceptual and legal as well as a technical and organizational perspective.
-
Knowledge Prerequisites
-
A willingness to deal with conceptual and legal issues is a prerequisite. Basic network and IT knowledge is a great advantage for the technical part of the course.
1 | Cloud Computing |
1.1 | Setup of Applications |
1.2 | The Motivation from the Viewpoint of the Customer |
1.2.1 | Business Availability |
1.2.2 | From Fixed to Variable Costs |
1.2.3 | Agile Infrastructure |
1.2.4 | Technologically Always Sate-of-the-Art |
1.2.5 | High Utilization of Resources and Energy Efficiency |
1.2.6 | High Performance, Availability and Service Quality |
1.2.7 | Security and Compliance |
1.2.8 | Cost Reduction and Time Savings |
1.3 | Typical Objections |
1.4 | Growth Market Cloud Computing |
1.5 | Virtualization as an Enabler for Cloud Computing |
1.6 | Cloud Computing |
1.6.1 | Service Models of Cloud Computing |
1.6.2 | Various Cloud Variants |
1.7 | Challenges of Cloud Computing |
1.8 | Services from the Cloud |
1.8.1 | Typical Services |
2 | Security Requirements |
2.1 | Basic IT Standards |
2.2 | Basic BSI Protection According to BSI Standard 100-4 and ISO 27001 |
2.3 | BS 25999 and ISO 22301 |
2.4 | ISO/IEC 27001 and 27002 |
3 | Data Protection, Contract Law, Information Security, and Compliance |
3.1 | Which law is applicable? |
3.2 | Data Protection |
3.2.1 | European Data Protection Directive |
3.2.2 | Basic Data Protection Directive |
3.2.3 | Current National Legal Situation |
3.2.4 | Effects on Cloud Computing |
3.2.5 | Further Legal Aspects |
3.2.6 | Summary—Part 1 |
3.3 | Contract Law |
3.4 | Information Security |
3.5 | Compliance |
3.6 | The Biggest Risk |
3.7 | Important Links |
4 | Cloud Security—Server and LAN |
4.1 | Setup of Cloud Infrastructures |
4.2 | Cloud Security Basics |
4.3 | Server Security in Virtualized Environments |
4.4 | Network Security in Virtualized Environments |
5 | Licensing and Standardization |
5.1 | Licensing in the Hybrid Cloud |
5.2 | Standardization and Interfaces |
6 | Important Models of Service Management |
6.1 | The Classic: Plan—Build—Run |
6.1.1 | Service Model Phases |
6.1.2 | Limitations |
6.2 | ITIL Edition 2011 |
6.3 | Service Strategy |
6.4 | Service Design |
6.5 | Service Transition |
6.5.1 | Transition Planning and Support |
6.5.2 | Change Management |
6.5.3 | Service Asset and Configuration Management |
6.5.4 | Release and Deployment Management |
6.5.5 | Service Validation and Testing |
6.5.6 | Change Evaluation |
6.5.7 | Knowledge Management |
6.6 | Service Operation |
6.6.1 | Event Management |
6.6.2 | Incident Management |
6.6.3 | Request Fulfillment |
6.6.4 | Problem Management |
6.6.5 | Access Management |
6.6.6 | Service Desk, Technical Management, IT Operations, and Application Management |
6.6.7 | Service Operations |
6.7 | Continual Service Improvement (CSI) |
6.8 | Organizational Aspects—Example: Cloud Security |
6.9 | Characteristic IT Parameters |
6.10 | Further Standards, Directives, and Methods in an Overview |
6.10.1 | ISO/IEC 20000 |
6.10.2 | COBIT |
6.10.3 | ISO/IEC 27001 and 27002 |
6.10.4 | IPMA, PMP, and PRINCE2 |
7 | Server and Desktop Virtualization |
7.1 | Business Requirements Made on IT |
7.2 | Server Centralization |
7.3 | Server Virtualization, Consolidation, and Automation |
7.3.1 | Advantage: Faster Provisioning |
7.3.2 | Advantage: Automation |
7.3.3 | Advantage: Consolidation |
7.3.4 | Advantage: Pooling |
7.3.5 | Advantage: High Availability |
7.3.6 | Advantage: Green IT |
7.4 | VMware, KVM, Xen, and Hyper-V in Comparison |
7.5 | Server Virtualization by Means of VMware |
7.5.1 | Development |
7.6 | The vSphere Product Range |
7.7 | Hyper-V 3.0 |
7.8 | Fields of Application and Benefits |
7.8.1 | Virtual Networks |
7.8.2 | Challenges for Network Configuration |
7.8.3 | VMotion |
7.8.4 | Distributed Resource Scheduling (DRS) |
7.8.5 | High Availability (HA) and Fault Tolerance (FT) |
7.9 | The Software-Defined Data Center |
7.10 | Server Hardware and Software |
7.11 | Special Features in the Sectors Network, Server, and Memory |
7.12 | The Network in the Course of Change |
7.12.1 | FabricPath |
7.12.2 | Overlay Transport Virtualization—OTV |
7.12.3 | Example: VCS by Brocade |
7.12.4 | The Switch on the Server |
7.13 | Virtual Desktop Infrastructure |
7.14 | Security in Virtual Environments |
7.14.1 | Cisco Virtual Security Gateway—VSG |
8 | Unified Computing System—UCS |
8.1 | The Server Market |
8.2 | The Unified Computing System |
8.3 | The Cisco UCS C Series |
8.4 | The Cisco UCS B Series |
8.4.1 | Chassis |
8.4.2 | Power Supplies |
8.4.3 | Blade Server |
8.4.4 | Mezzanine Adapter |
8.4.5 | I/O Modules (IOM) |
8.4.6 | Fabric Interconnect |
8.4.7 | UCS Manager |
8.5 | Added Value of the Unified Computing System |
8.6 | All-in Solutions |
8.6.1 | FlexPod—Cisco and NetApp |
8.6.2 | Vblock |
8.6.3 | EMC VSPEX |
8.7 | Cisco VXI Infrastructure |
8.8 | Design Scenarios with UCS |
8.9 | HP c-Class Series |
8.10 | IBM BladeCenter |
8.11 | Dell |
8.12 | Management Server Area |
8.13 | Application Security in Cloud Environments |
8.14 | The Term Proxy |
8.14.1 | Explicit Proxies |
8.14.2 | Transparent Proxies |
8.14.3 | Reverse Proxies |
8.14.4 | Generic Proxies |
8.14.5 | Application Layer Gateways |
8.14.6 | Working Mode |
8.14.7 | Limitations |
8.14.8 | Web Proxies |
8.14.9 | Authentication at the Firewall |
8.14.10 | The Server End |
8.14.11 | The Client End |
8.15 | Mail Relays |
9 | Storage Consolidation and Virtualization |
9.1 | Significance of the Data Storage Unit |
9.1.1 | Direct Attached Storage |
9.2 | Network Storage |
9.2.1 | Network-Attached Storage |
9.2.2 | Storage Area Networks |
9.2.3 | NFS, iSCSI, FC, and FCoE in Comparison |
9.3 | Storage Consolidation and Data Deduplication |
9.4 | Storage Virtualization |
9.4.1 | Host-Based Virtualization—LVM |
9.4.2 | Host-Based Virtualization—Storage Meta-Data Server |
9.4.3 | Server-Based Storage APIs |
9.4.4 | Storage-System-Based Virtualization |
9.4.5 | Distributed Modular Array Virtualization |
9.4.6 | Network-Based Virtualization |
9.4.7 | Virtualization Appliances |
9.4.8 | Decisive Points in the Selection of Virtualization Technologies |
9.5 | Storage Virtualization—Vendor Overview |
9.6 | FCoE and Competitors |
9.7 | The Storage Market |
9.8 | Cisco Products and Positioning |
9.9 | Brocade Products and Positioning |
9.10 | Introduction to SAN Security |
9.11 | Myths and Assumptions |
9.11.1 | Isolated Environment |
9.11.2 | Security by Obscurity |
9.11.3 | Tapping of Fibre Channel |
9.11.4 | Delivered Security |
9.12 | Security in the Fabric |
9.12.1 | Security at the Storage Unit |
9.12.2 | Advanced Security Features in the SAN |
9.12.3 | NPIV and NPV |
9.12.4 | Unified Fabric Data Center |
9.12.5 | Brocade: Virtual Fabrics |
9.12.6 | The Cisco Cloud Story for the SAN |
9.12.7 | VSAN Concept |
10 | Modern Data Center Design |
10.1 | Classic Network Virtualization Methods |
10.2 | Data Center Network Design |
10.3 | Data Center Infrastructure |
10.4 | Access Layer Design |
10.5 | Service Virtualization |
10.6 | Aggregation Layer Design |
10.7 | Data Center Core Layer Design |
10.8 | WDM between Data Centers |
10.9 | Unified Fabric |
10.10 | Current Changes |
10.10.1 | Security in the Data Center |
10.10.2 | Manufacturers |
10.10.3 | HP |
10.10.4 | Brocade |
10.10.5 | Cisco |
10.11 | Cloud Security—Infrastructure |
10.11.1 | Data Center Edge Security |
10.11.2 | Data Center Core Security |
10.11.3 | The Technologies in an Overview |
10.11.4 | Protection of Management Access and Control Plane |
10.11.5 | Protection of the Data Plane |
10.11.6 | Quality of Service |
10.11.7 | Link Encryption According to IEEE 802.1AE and Cisco TrustSec |
10.11.8 | Virtual Switches: Example of Cisco VDCs |
10.11.9 | MPLS or VRF Lite for Separate Networks |
10.11.10 | Security on the Aggregation Layer |
10.11.11 | Data Center Services |
10.11.12 | Security in the Access Area |
10.11.13 | IEEE 802.1X |
10.11.14 | DHCP Snooping |
10.11.15 | Dynamic ARP Inspection |
10.11.16 | IP Source Guard |
11 | WAN Connection |
11.1 | WAN Basics |
11.2 | Requirements Made by the Applications |
11.2.1 | Typical Pitfalls |
11.2.2 | Possible Solutions |
11.2.3 | Applications which Are not Applicable in the Cloud |
12 | Management Access to the Cloud |
12.1 | Cloud Security—Organizational Aspects |
12.2 | Physical Access Protection |
12.3 | User Accounts and Passwords |
12.3.1 | Default Parameters |
12.3.2 | Central User Administration |
12.4 | Information on User Activity |
12.5 | Access via CLI |
12.6 | Access with SNMP |
12.6.1 | SNMPv1 and SNMPv2c |
12.6.2 | SNMPv3 |
12.7 | Cloud Management Tools |
12.7.1 | Scenario of a Cloud NMS Structure |
12.7.2 | Network Management Systems |
12.7.3 | Element Manger—e.g. vCenter Server by VMware |
12.7.4 | Element Manager—Cisco UCS Manager |
12.7.5 | End-to-End Management—e.g. BMC BladeLogic |
13 | Large-Scale Cloud Providers |
13.1 | Cloud Providers |
13.2 | Amazon Web Services |
13.2.1 | EC2 |
13.2.2 | Amazon S3 |
13.2.3 | Amazon EBS, DynamoDB and RDS |
13.2.4 | Further Amazon Services |
13.3 | Microsoft Azure Services Platform |
13.3.1 | Windows Azure |
13.3.2 | Windows Azure AppFabric |
13.3.3 | Windows SQL Azure |
13.4 | IBM LotusLive |
13.5 | Fujitsu |
13.6 | Google Apps |
13.7 | SalesForce |
14 | Transition Phase and Pitfalls |
14.1 | Transition Phase |
14.1.1 | Technical Planning |
14.1.2 | Organizational Planning |
14.2 | Pitfalls |
-
Classroom training
- Do you prefer the classic training method? A course in one of our Training Centers, with a competent trainer and the direct exchange between all course participants? Then you should book one of our classroom training dates!
-
Hybrid training
- Hybrid training means that online participants can additionally attend a classroom course. The dynamics of a real seminar are maintained, and the online participants are able to benefit from that. Online participants of a hybrid course use a collaboration platform, such as WebEx Training Center or Saba Meeting. To do this, a PC with browser and Internet access is required, as well as a headset and ideally a Web cam. In the seminar room, we use specially developed and customized audio- and video-technologies. This makes sure that the communication between all persons involved works in a convenient and fault-free way.
-
Online training
- You wish to attend a course in online mode? We offer you online course dates for this course topic. To attend these seminars, you need to have a PC with Internet access (minimum data rate 1Mbps), a headset when working via VoIP and optionally a camera. For further information and technical recommendations, please refer to.
-
Tailor-made courses
-
You need a special course for your team? In addition to our standard offer, we will also support you in creating your customized courses, which precisely meet your individual demands. We will be glad to consult you and create an individual offer for you.
