ExperTeach Networking Logo

Cloud BootCamp

Processes, Infrastructure, Security, Migration, and Market Overview

ExperTeach Networking Logo

The course at hand offers a comprehensive overview of the topic of Cloud Computing in a compressed form. After an introduction to the changes in the IT architectures, terms like Cloud Computing, Cloud Services, and Cloud Models are explained and the benefits for the companies entailed are discussed. The new IT architecture, however, also has significant effects on the sectors of organizational and technical structures, staff, and infrastructure of the companies concerned. These effects are discussed from the viewpoints of both the user and provider. Subsequently, the technical setup of typical cloud infrastructures and the security mechanisms and technologies related are discussed. The BootCamp is concluded with a market overview, the discussion of state-of-the-art offers and a preview.

Course Contents

  • Definition of Cloud Computing (NIST, CSA and BSI) as well as of the Cloud and Service Models
  • Private Clouds: VMware vCloud Suite, Microsoft Windows Azure Pack, and OpenStack
  • Data Protection in Europe and on an International Scale Laws and their Limits
  • Data Privacy Risk of Data Theft and Legal Overall Conditions
  • Contract Law, Data Protection, Information Security, and Compliance
  • SOX, HGB, KonTraG, EG Dual Use, etc.
  • SLAs and Service Management: ITIL, CoBit, ISO 27001/2, BSI Standard 100-4, etc.
  • Cloud Standards and Interfaces (REST-API, OVF, vCloud API, etc.)
  • Server and Desktop Virtualization VMware, Microsoft, XEN, KVM, and Docker
  • Modern Data Center Design and Technological Developments
  • FabricPath, SDN, OpenFlow, Cisco ACI, VMware NSX, VXLAN, and NFV
  • Storage Development: Object Storage, Software-Defined Storage, and SAN Security
  • Software-defined Data Center (SDDC) Architecture and Implementation Variants
  • vCloud Suite and OpenStack
  • Innovative Server and Overall Solutions, as well as Hyperconvergent Systems
  • Cloud Security—Introduction and Setup (ISO 27001, BSI)
  • Demands Made on the WAN and Possible Pitfalls
  • Transition Phase, Possible Pitfalls, as well as Typical Application and Migration Scenarios
  • Market Overview, Internationally and for Germany, as well as Market Development and Trends
  • Public Cloud Offers in a Comparison: AWS, Azure, vCloud Air, Google, Salesforce, etc.

Print E-Book PDF Symbol You will receive the comprehensive documentation package of the ExperTeach Networking series – printed documentation, e-book, and personalized PDF! As online participant, you will receive the e-book and the personalized PDF.

Target Group

The course addresses all students who wish to acquire profound know-how on the topic Cloud from conceptual, legal, and technical viewpoints.

Knowledge Prerequisites

The student should be willing to discuss and deal with conceptual and legal aspects. Basic networking and IT know-how would be a major advantage to understand the technical issues imparted in the course.

1 Cloud Computing
1.1 Setup of Applications
1.2 The Motivation from the Viewpoint of the Customer
1.2.1 Business Availability
1.2.2 From Fixed to Variable Costs
1.2.3 Agile Infrastructure
1.2.4 Technologically Always Sate-of-the-Art
1.2.5 High Utilization of Resources and Energy Efficiency
1.2.6 High Performance, Availability and Service Quality
1.2.7 Security and Compliance
1.2.8 Cost Reduction and Time Savings
1.3 Typical Objections
1.4 Growth Market Cloud Computing
1.5 Virtualization as an Enabler for Cloud Computing
1.6 Cloud Computing
1.6.1 Service Models of Cloud Computing
1.6.2 Various Cloud Variants
1.7 Challenges of Cloud Computing
1.8 Services from the Cloud
1.8.1 Typical Services
   
2 Security Requirements
2.1 Basic IT Standards
2.2 Basic BSI Protection According to BSI Standard 100-4 and ISO 27001
2.3 BS 25999 and ISO 22301
2.4 ISO/IEC 27001 and 27002
   
3 Data Protection, Contract Law, Information Security, and Compliance
3.1 Which law is applicable?
3.2 Data Protection
3.2.1 European Data Protection Directive
3.2.2 Basic Data Protection Directive
3.2.3 Current National Legal Situation
3.2.4 Effects on Cloud Computing
3.2.5 Further Legal Aspects
3.2.6 Summary—Part 1
3.3 Contract Law
3.4 Information Security
3.5 Compliance
3.6 The Biggest Risk
3.7 Important Links
   
4 Cloud Security—Server and LAN
4.1 Setup of Cloud Infrastructures
4.2 Cloud Security Basics
4.3 Server Security in Virtualized Environments
4.4 Network Security in Virtualized Environments
   
5 Licensing and Standardization
5.1 Licensing in the Hybrid Cloud
5.2 Standardization and Interfaces
   
6 Important Models of Service Management
6.1 The Classic: Plan—Build—Run
6.1.1 Service Model Phases
6.1.2 Limitations
6.2 ITIL Edition 2011
6.3 Service Strategy
6.4 Service Design
6.5 Service Transition
6.5.1 Transition Planning and Support
6.5.2 Change Management
6.5.3 Service Asset and Configuration Management
6.5.4 Release and Deployment Management
6.5.5 Service Validation and Testing
6.5.6 Change Evaluation
6.5.7 Knowledge Management
6.6 Service Operation
6.6.1 Event Management
6.6.2 Incident Management
6.6.3 Request Fulfillment
6.6.4 Problem Management
6.6.5 Access Management
6.6.6 Service Desk, Technical Management, IT Operations, and Application Management
6.6.7 Service Operations
6.7 Continual Service Improvement (CSI)
6.8 Organizational Aspects—Example: Cloud Security
6.9 Characteristic IT Parameters
6.10 Further Standards, Directives, and Methods in an Overview
6.10.1 ISO/IEC 20000
6.10.2 COBIT
6.10.3 ISO/IEC 27001 and 27002
6.10.4 IPMA, PMP, and PRINCE2
   
7 Server and Desktop Virtualization
7.1 Business Requirements Made on IT
7.2 Server Centralization
7.3 Server Virtualization, Consolidation, and Automation
7.3.1 Advantage: Faster Provisioning
7.3.2 Advantage: Automation
7.3.3 Advantage: Consolidation
7.3.4 Advantage: Pooling
7.3.5 Advantage: High Availability
7.3.6 Advantage: Green IT
7.4 VMware, KVM, Xen, and Hyper-V in Comparison
7.5 Server Virtualization by Means of VMware
7.5.1 Development
7.6 The vSphere Product Range
7.7 Hyper-V 3.0
7.8 Fields of Application and Benefits
7.8.1 Virtual Networks
7.8.2 Challenges for Network Configuration
7.8.3 VMotion
7.8.4 Distributed Resource Scheduling (DRS)
7.8.5 High Availability (HA) and Fault Tolerance (FT)
7.9 The Software-Defined Data Center
7.10 Server Hardware and Software
7.11 Special Features in the Sectors Network, Server, and Memory
7.12 The Network in the Course of Change
7.12.1 FabricPath
7.12.2 Overlay Transport Virtualization—OTV
7.12.3 Example: VCS by Brocade
7.12.4 The Switch on the Server
7.13 Virtual Desktop Infrastructure
7.14 Security in Virtual Environments
7.14.1 Cisco Virtual Security Gateway—VSG
   
8 Unified Computing System—UCS
8.1 The Server Market
8.2 The Unified Computing System
8.3 The Cisco UCS C Series
8.4 The Cisco UCS B Series
8.4.1 Chassis
8.4.2 Power Supplies
8.4.3 Blade Server
8.4.4 Mezzanine Adapter
8.4.5 I/O Modules (IOM)
8.4.6 Fabric Interconnect
8.4.7 UCS Manager
8.5 Added Value of the Unified Computing System
8.6 All-in Solutions
8.6.1 FlexPod—Cisco and NetApp
8.6.2 Vblock
8.6.3 EMC VSPEX
8.7 Cisco VXI Infrastructure
8.8 Design Scenarios with UCS
8.9 HP c-Class Series
8.10 IBM BladeCenter
8.11 Dell
8.12 Management Server Area
8.13 Application Security in Cloud Environments
8.14 The Term Proxy
8.14.1 Explicit Proxies
8.14.2 Transparent Proxies
8.14.3 Reverse Proxies
8.14.4 Generic Proxies
8.14.5 Application Layer Gateways
8.14.6 Working Mode
8.14.7 Limitations
8.14.8 Web Proxies
8.14.9 Authentication at the Firewall
8.14.10 The Server End
8.14.11 The Client End
8.15 Mail Relays
   
9 Storage Consolidation and Virtualization
9.1 Significance of the Data Storage Unit
9.1.1 Direct Attached Storage
9.2 Network Storage
9.2.1 Network-Attached Storage
9.2.2 Storage Area Networks
9.2.3 NFS, iSCSI, FC, and FCoE in Comparison
9.3 Storage Consolidation and Data Deduplication
9.4 Storage Virtualization
9.4.1 Host-Based Virtualization—LVM
9.4.2 Host-Based Virtualization—Storage Meta-Data Server
9.4.3 Server-Based Storage APIs
9.4.4 Storage-System-Based Virtualization
9.4.5 Distributed Modular Array Virtualization
9.4.6 Network-Based Virtualization
9.4.7 Virtualization Appliances
9.4.8 Decisive Points in the Selection of Virtualization Technologies
9.5 Storage Virtualization—Vendor Overview
9.6 FCoE and Competitors
9.7 The Storage Market
9.8 Cisco Products and Positioning
9.9 Brocade Products and Positioning
9.10 Introduction to SAN Security
9.11 Myths and Assumptions
9.11.1 Isolated Environment
9.11.2 Security by Obscurity
9.11.3 Tapping of Fibre Channel
9.11.4 Delivered Security
9.12 Security in the Fabric
9.12.1 Security at the Storage Unit
9.12.2 Advanced Security Features in the SAN
9.12.3 NPIV and NPV
9.12.4 Unified Fabric Data Center
9.12.5 Brocade: Virtual Fabrics
9.12.6 The Cisco Cloud Story for the SAN
9.12.7 VSAN Concept
   
10 Modern Data Center Design
10.1 Classic Network Virtualization Methods
10.2 Data Center Network Design
10.3 Data Center Infrastructure
10.4 Access Layer Design
10.5 Service Virtualization
10.6 Aggregation Layer Design
10.7 Data Center Core Layer Design
10.8 WDM between Data Centers
10.9 Unified Fabric
10.10 Current Changes
10.10.1 Security in the Data Center
10.10.2 Manufacturers
10.10.3 HP
10.10.4 Brocade
10.10.5 Cisco
10.11 Cloud Security—Infrastructure
10.11.1 Data Center Edge Security
10.11.2 Data Center Core Security
10.11.3 The Technologies in an Overview
10.11.4 Protection of Management Access and Control Plane
10.11.5 Protection of the Data Plane
10.11.6 Quality of Service
10.11.7 Link Encryption According to IEEE 802.1AE and Cisco TrustSec
10.11.8 Virtual Switches: Example of Cisco VDCs
10.11.9 MPLS or VRF Lite for Separate Networks
10.11.10 Security on the Aggregation Layer
10.11.11 Data Center Services
10.11.12 Security in the Access Area
10.11.13 IEEE 802.1X
10.11.14 DHCP Snooping
10.11.15 Dynamic ARP Inspection
10.11.16 IP Source Guard
   
11 WAN Connection
11.1 WAN Basics
11.2 Requirements Made by the Applications
11.2.1 Typical Pitfalls
11.2.2 Possible Solutions
11.2.3 Applications which Are not Applicable in the Cloud
   
12 Management Access to the Cloud
12.1 Cloud Security—Organizational Aspects
12.2 Physical Access Protection
12.3 User Accounts and Passwords
12.3.1 Default Parameters
12.3.2 Central User Administration
12.4 Information on User Activity
12.5 Access via CLI
12.6 Access with SNMP
12.6.1 SNMPv1 and SNMPv2c
12.6.2 SNMPv3
12.7 Cloud Management Tools
12.7.1 Scenario of a Cloud NMS Structure
12.7.2 Network Management Systems
12.7.3 Element Manger—e.g. vCenter Server by VMware
12.7.4 Element Manager—Cisco UCS Manager
12.7.5 End-to-End Management—e.g. BMC BladeLogic
   
13 Large-Scale Cloud Providers
13.1 Cloud Providers
13.2 Amazon Web Services
13.2.1 EC2
13.2.2 Amazon S3
13.2.3 Amazon EBS, DynamoDB and RDS
13.2.4 Further Amazon Services
13.3 Microsoft Azure Services Platform
13.3.1 Windows Azure
13.3.2 Windows Azure AppFabric
13.3.3 Windows SQL Azure
13.4 IBM LotusLive
13.5 Fujitsu
13.6 Google Apps
13.7 SalesForce
   
14 Transition Phase and Pitfalls
14.1 Transition Phase
14.1.1 Technical Planning
14.1.2 Organizational Planning
14.2 Pitfalls
   

Classroom training

Do you prefer the classic training method? A course in one of our Training Centers, with a competent trainer and the direct exchange between all course participants? Then you should book one of our classroom training dates!

Hybrid training

Hybrid training means that online participants can additionally attend a classroom course. The dynamics of a real seminar are maintained, and the online participants are able to benefit from that. Online participants of a hybrid course use a collaboration platform, such as WebEx Training Center or Saba Meeting. To do this, a PC with browser and Internet access is required, as well as a headset and ideally a Web cam. In the seminar room, we use specially developed and customized audio- and video-technologies. This makes sure that the communication between all persons involved works in a convenient and fault-free way.

Online training

You wish to attend a course in online mode? We offer you online course dates for this course topic. To attend these seminars, you need to have a PC with Internet access (minimum data rate 1Mbps), a headset when working via VoIP and optionally a camera. For further information and technical recommendations, please refer to.

Tailor-made courses

You need a special course for your team? In addition to our standard offer, we will also support you in creating your customized courses, which precisely meet your individual demands. We will be glad to consult you and create an individual offer for you.
Request for customized courses
PDF SymbolYou can find the complete description of this course with dates and prices ready for download at as PDF.

The course at hand offers a comprehensive overview of the topic of Cloud Computing in a compressed form. After an introduction to the changes in the IT architectures, terms like Cloud Computing, Cloud Services, and Cloud Models are explained and the benefits for the companies entailed are discussed. The new IT architecture, however, also has significant effects on the sectors of organizational and technical structures, staff, and infrastructure of the companies concerned. These effects are discussed from the viewpoints of both the user and provider. Subsequently, the technical setup of typical cloud infrastructures and the security mechanisms and technologies related are discussed. The BootCamp is concluded with a market overview, the discussion of state-of-the-art offers and a preview.

Course Contents

  • Definition of Cloud Computing (NIST, CSA and BSI) as well as of the Cloud and Service Models
  • Private Clouds: VMware vCloud Suite, Microsoft Windows Azure Pack, and OpenStack
  • Data Protection in Europe and on an International Scale Laws and their Limits
  • Data Privacy Risk of Data Theft and Legal Overall Conditions
  • Contract Law, Data Protection, Information Security, and Compliance
  • SOX, HGB, KonTraG, EG Dual Use, etc.
  • SLAs and Service Management: ITIL, CoBit, ISO 27001/2, BSI Standard 100-4, etc.
  • Cloud Standards and Interfaces (REST-API, OVF, vCloud API, etc.)
  • Server and Desktop Virtualization VMware, Microsoft, XEN, KVM, and Docker
  • Modern Data Center Design and Technological Developments
  • FabricPath, SDN, OpenFlow, Cisco ACI, VMware NSX, VXLAN, and NFV
  • Storage Development: Object Storage, Software-Defined Storage, and SAN Security
  • Software-defined Data Center (SDDC) Architecture and Implementation Variants
  • vCloud Suite and OpenStack
  • Innovative Server and Overall Solutions, as well as Hyperconvergent Systems
  • Cloud Security—Introduction and Setup (ISO 27001, BSI)
  • Demands Made on the WAN and Possible Pitfalls
  • Transition Phase, Possible Pitfalls, as well as Typical Application and Migration Scenarios
  • Market Overview, Internationally and for Germany, as well as Market Development and Trends
  • Public Cloud Offers in a Comparison: AWS, Azure, vCloud Air, Google, Salesforce, etc.

Print E-Book PDF Symbol You will receive the comprehensive documentation package of the ExperTeach Networking series – printed documentation, e-book, and personalized PDF! As online participant, you will receive the e-book and the personalized PDF.

Target Group

The course addresses all students who wish to acquire profound know-how on the topic Cloud from conceptual, legal, and technical viewpoints.

Knowledge Prerequisites

The student should be willing to discuss and deal with conceptual and legal aspects. Basic networking and IT know-how would be a major advantage to understand the technical issues imparted in the course.

1 Cloud Computing
1.1 Setup of Applications
1.2 The Motivation from the Viewpoint of the Customer
1.2.1 Business Availability
1.2.2 From Fixed to Variable Costs
1.2.3 Agile Infrastructure
1.2.4 Technologically Always Sate-of-the-Art
1.2.5 High Utilization of Resources and Energy Efficiency
1.2.6 High Performance, Availability and Service Quality
1.2.7 Security and Compliance
1.2.8 Cost Reduction and Time Savings
1.3 Typical Objections
1.4 Growth Market Cloud Computing
1.5 Virtualization as an Enabler for Cloud Computing
1.6 Cloud Computing
1.6.1 Service Models of Cloud Computing
1.6.2 Various Cloud Variants
1.7 Challenges of Cloud Computing
1.8 Services from the Cloud
1.8.1 Typical Services
   
2 Security Requirements
2.1 Basic IT Standards
2.2 Basic BSI Protection According to BSI Standard 100-4 and ISO 27001
2.3 BS 25999 and ISO 22301
2.4 ISO/IEC 27001 and 27002
   
3 Data Protection, Contract Law, Information Security, and Compliance
3.1 Which law is applicable?
3.2 Data Protection
3.2.1 European Data Protection Directive
3.2.2 Basic Data Protection Directive
3.2.3 Current National Legal Situation
3.2.4 Effects on Cloud Computing
3.2.5 Further Legal Aspects
3.2.6 Summary—Part 1
3.3 Contract Law
3.4 Information Security
3.5 Compliance
3.6 The Biggest Risk
3.7 Important Links
   
4 Cloud Security—Server and LAN
4.1 Setup of Cloud Infrastructures
4.2 Cloud Security Basics
4.3 Server Security in Virtualized Environments
4.4 Network Security in Virtualized Environments
   
5 Licensing and Standardization
5.1 Licensing in the Hybrid Cloud
5.2 Standardization and Interfaces
   
6 Important Models of Service Management
6.1 The Classic: Plan—Build—Run
6.1.1 Service Model Phases
6.1.2 Limitations
6.2 ITIL Edition 2011
6.3 Service Strategy
6.4 Service Design
6.5 Service Transition
6.5.1 Transition Planning and Support
6.5.2 Change Management
6.5.3 Service Asset and Configuration Management
6.5.4 Release and Deployment Management
6.5.5 Service Validation and Testing
6.5.6 Change Evaluation
6.5.7 Knowledge Management
6.6 Service Operation
6.6.1 Event Management
6.6.2 Incident Management
6.6.3 Request Fulfillment
6.6.4 Problem Management
6.6.5 Access Management
6.6.6 Service Desk, Technical Management, IT Operations, and Application Management
6.6.7 Service Operations
6.7 Continual Service Improvement (CSI)
6.8 Organizational Aspects—Example: Cloud Security
6.9 Characteristic IT Parameters
6.10 Further Standards, Directives, and Methods in an Overview
6.10.1 ISO/IEC 20000
6.10.2 COBIT
6.10.3 ISO/IEC 27001 and 27002
6.10.4 IPMA, PMP, and PRINCE2
   
7 Server and Desktop Virtualization
7.1 Business Requirements Made on IT
7.2 Server Centralization
7.3 Server Virtualization, Consolidation, and Automation
7.3.1 Advantage: Faster Provisioning
7.3.2 Advantage: Automation
7.3.3 Advantage: Consolidation
7.3.4 Advantage: Pooling
7.3.5 Advantage: High Availability
7.3.6 Advantage: Green IT
7.4 VMware, KVM, Xen, and Hyper-V in Comparison
7.5 Server Virtualization by Means of VMware
7.5.1 Development
7.6 The vSphere Product Range
7.7 Hyper-V 3.0
7.8 Fields of Application and Benefits
7.8.1 Virtual Networks
7.8.2 Challenges for Network Configuration
7.8.3 VMotion
7.8.4 Distributed Resource Scheduling (DRS)
7.8.5 High Availability (HA) and Fault Tolerance (FT)
7.9 The Software-Defined Data Center
7.10 Server Hardware and Software
7.11 Special Features in the Sectors Network, Server, and Memory
7.12 The Network in the Course of Change
7.12.1 FabricPath
7.12.2 Overlay Transport Virtualization—OTV
7.12.3 Example: VCS by Brocade
7.12.4 The Switch on the Server
7.13 Virtual Desktop Infrastructure
7.14 Security in Virtual Environments
7.14.1 Cisco Virtual Security Gateway—VSG
   
8 Unified Computing System—UCS
8.1 The Server Market
8.2 The Unified Computing System
8.3 The Cisco UCS C Series
8.4 The Cisco UCS B Series
8.4.1 Chassis
8.4.2 Power Supplies
8.4.3 Blade Server
8.4.4 Mezzanine Adapter
8.4.5 I/O Modules (IOM)
8.4.6 Fabric Interconnect
8.4.7 UCS Manager
8.5 Added Value of the Unified Computing System
8.6 All-in Solutions
8.6.1 FlexPod—Cisco and NetApp
8.6.2 Vblock
8.6.3 EMC VSPEX
8.7 Cisco VXI Infrastructure
8.8 Design Scenarios with UCS
8.9 HP c-Class Series
8.10 IBM BladeCenter
8.11 Dell
8.12 Management Server Area
8.13 Application Security in Cloud Environments
8.14 The Term Proxy
8.14.1 Explicit Proxies
8.14.2 Transparent Proxies
8.14.3 Reverse Proxies
8.14.4 Generic Proxies
8.14.5 Application Layer Gateways
8.14.6 Working Mode
8.14.7 Limitations
8.14.8 Web Proxies
8.14.9 Authentication at the Firewall
8.14.10 The Server End
8.14.11 The Client End
8.15 Mail Relays
   
9 Storage Consolidation and Virtualization
9.1 Significance of the Data Storage Unit
9.1.1 Direct Attached Storage
9.2 Network Storage
9.2.1 Network-Attached Storage
9.2.2 Storage Area Networks
9.2.3 NFS, iSCSI, FC, and FCoE in Comparison
9.3 Storage Consolidation and Data Deduplication
9.4 Storage Virtualization
9.4.1 Host-Based Virtualization—LVM
9.4.2 Host-Based Virtualization—Storage Meta-Data Server
9.4.3 Server-Based Storage APIs
9.4.4 Storage-System-Based Virtualization
9.4.5 Distributed Modular Array Virtualization
9.4.6 Network-Based Virtualization
9.4.7 Virtualization Appliances
9.4.8 Decisive Points in the Selection of Virtualization Technologies
9.5 Storage Virtualization—Vendor Overview
9.6 FCoE and Competitors
9.7 The Storage Market
9.8 Cisco Products and Positioning
9.9 Brocade Products and Positioning
9.10 Introduction to SAN Security
9.11 Myths and Assumptions
9.11.1 Isolated Environment
9.11.2 Security by Obscurity
9.11.3 Tapping of Fibre Channel
9.11.4 Delivered Security
9.12 Security in the Fabric
9.12.1 Security at the Storage Unit
9.12.2 Advanced Security Features in the SAN
9.12.3 NPIV and NPV
9.12.4 Unified Fabric Data Center
9.12.5 Brocade: Virtual Fabrics
9.12.6 The Cisco Cloud Story for the SAN
9.12.7 VSAN Concept
   
10 Modern Data Center Design
10.1 Classic Network Virtualization Methods
10.2 Data Center Network Design
10.3 Data Center Infrastructure
10.4 Access Layer Design
10.5 Service Virtualization
10.6 Aggregation Layer Design
10.7 Data Center Core Layer Design
10.8 WDM between Data Centers
10.9 Unified Fabric
10.10 Current Changes
10.10.1 Security in the Data Center
10.10.2 Manufacturers
10.10.3 HP
10.10.4 Brocade
10.10.5 Cisco
10.11 Cloud Security—Infrastructure
10.11.1 Data Center Edge Security
10.11.2 Data Center Core Security
10.11.3 The Technologies in an Overview
10.11.4 Protection of Management Access and Control Plane
10.11.5 Protection of the Data Plane
10.11.6 Quality of Service
10.11.7 Link Encryption According to IEEE 802.1AE and Cisco TrustSec
10.11.8 Virtual Switches: Example of Cisco VDCs
10.11.9 MPLS or VRF Lite for Separate Networks
10.11.10 Security on the Aggregation Layer
10.11.11 Data Center Services
10.11.12 Security in the Access Area
10.11.13 IEEE 802.1X
10.11.14 DHCP Snooping
10.11.15 Dynamic ARP Inspection
10.11.16 IP Source Guard
   
11 WAN Connection
11.1 WAN Basics
11.2 Requirements Made by the Applications
11.2.1 Typical Pitfalls
11.2.2 Possible Solutions
11.2.3 Applications which Are not Applicable in the Cloud
   
12 Management Access to the Cloud
12.1 Cloud Security—Organizational Aspects
12.2 Physical Access Protection
12.3 User Accounts and Passwords
12.3.1 Default Parameters
12.3.2 Central User Administration
12.4 Information on User Activity
12.5 Access via CLI
12.6 Access with SNMP
12.6.1 SNMPv1 and SNMPv2c
12.6.2 SNMPv3
12.7 Cloud Management Tools
12.7.1 Scenario of a Cloud NMS Structure
12.7.2 Network Management Systems
12.7.3 Element Manger—e.g. vCenter Server by VMware
12.7.4 Element Manager—Cisco UCS Manager
12.7.5 End-to-End Management—e.g. BMC BladeLogic
   
13 Large-Scale Cloud Providers
13.1 Cloud Providers
13.2 Amazon Web Services
13.2.1 EC2
13.2.2 Amazon S3
13.2.3 Amazon EBS, DynamoDB and RDS
13.2.4 Further Amazon Services
13.3 Microsoft Azure Services Platform
13.3.1 Windows Azure
13.3.2 Windows Azure AppFabric
13.3.3 Windows SQL Azure
13.4 IBM LotusLive
13.5 Fujitsu
13.6 Google Apps
13.7 SalesForce
   
14 Transition Phase and Pitfalls
14.1 Transition Phase
14.1.1 Technical Planning
14.1.2 Organizational Planning
14.2 Pitfalls
   

Classroom training

Do you prefer the classic training method? A course in one of our Training Centers, with a competent trainer and the direct exchange between all course participants? Then you should book one of our classroom training dates!

Hybrid training

Hybrid training means that online participants can additionally attend a classroom course. The dynamics of a real seminar are maintained, and the online participants are able to benefit from that. Online participants of a hybrid course use a collaboration platform, such as WebEx Training Center or Saba Meeting. To do this, a PC with browser and Internet access is required, as well as a headset and ideally a Web cam. In the seminar room, we use specially developed and customized audio- and video-technologies. This makes sure that the communication between all persons involved works in a convenient and fault-free way.

Online training

You wish to attend a course in online mode? We offer you online course dates for this course topic. To attend these seminars, you need to have a PC with Internet access (minimum data rate 1Mbps), a headset when working via VoIP and optionally a camera. For further information and technical recommendations, please refer to.

Tailor-made courses

You need a special course for your team? In addition to our standard offer, we will also support you in creating your customized courses, which precisely meet your individual demands. We will be glad to consult you and create an individual offer for you.
Request for customized courses

PDF SymbolYou can find the complete description of this course with dates and prices ready for download at as PDF.