-
This course provides a very good insight into the cloud infrastructures of modern data centers. It explains which technologies are used to build them and what must be implemented to ensure that the solution meets modern security requirements. The concrete implementation is illustrated by means of market-leading products. The course provides a holistic picture as well as a solid know-how foundation on the topic of cloud platforms and provides an outlook on how data centers and cloud architectures will continue to change in the coming years.
-
Course Contents
-
- Driving forces for the development of cloud infrastructures
- Server, desktop and container virtualization: VMware, Microsoft, Xen, KVM, Docker and Kubernetes
- Security in virtualization, application security, VM-to-VM security, hypervisor security
- Modern data center design: security and technological developments
- Modern network technologies: SDN, OpenFlow, Cisco ACI, VMware NSX and VXLAN
- Service virtualization and network function virtualization (NFV)
- Storage developments: Virtual SAN infrastructures, object storage and software-defined storage
- Software-Defined Data Center (SDDC): Architecture and implementation variants
- vCloud Suite and OpenStack
- Innovative server and complete solutions as well as hyperconverged systems (HCI)
- WAN requirements: limitations of classic solutions and SD-WAN
- Transition phase and possible pitfalls
The detailed digital documentation package, consisting of an e-book and PDF, is included in the price of the course.
Premium Course Documents
In addition to the digital documentation package, the exclusive Premium Print Package is also available to you.
- High-quality color prints of the ExperTeach documentation
- Exclusive folder in an elegant design
- Document pouch in backpack shape
- Elegant LAMY ballpoint pen
- Practical notepad
The Premium Print Package can be added during the ordering process for € 175,- plus VAT (only for classroom participation). -
Target Group
-
This course is designed for anyone involved in building cloud infrastructures in engineering, presales, or IT security.
-
Knowledge Prerequisites
-
You should be interested and open-minded towards new topics. Basic network and IT knowledge should be available.
-
Alternatives
-
You can also purchase this course at a reduced price as part of this Qualification Package.
1 | Der Trend: Cloud Computing |
1.1 | IT im Wandel |
1.2 | Treiber für die Cloud |
1.2.1 | Verfügbarkeit des Business |
1.2.2 | Von fixen zu variablen Kosten |
1.2.3 | Agile Infrastruktur |
1.2.4 | Technologisch immer aktuell |
1.2.5 | Sicherheit und Compliance |
1.3 | Typische Herausforderungen und Einwände |
1.3.1 | Anforderungen an die Cloud Provider |
1.3.2 | Faktoren für die Kundenzufriedenheit |
1.4 | Virtualization – Enabler für die Cloud |
1.5 | Definition: Cloud Computing |
1.5.1 | Service-Modelle des Cloud Computings |
1.5.2 | Die verschiedenen Cloud-Varianten (Private Cloud, Public Cloud, …) |
1.5.3 | Multi-Cloud |
1.5.4 | Eigenschaften der Hyperscaler |
1.5.5 | Shared Responsibility |
2 | Server-Virtualisierung |
2.1 | Server-Zentralisierung und Edge Computing |
2.2 | Server-Virtualisierung |
2.2.1 | Vorteile: Schnelles Provisioning und Pooling |
2.2.2 | Vorteile: Automation und Hochverfügbarkeit |
2.2.3 | Vorteile: Konsolidierung und Green IT |
2.2.4 | Virtualisierungstechniken |
2.3 | VMware vSphere |
2.3.1 | Lizenzierung in vSphere 8 |
2.3.2 | Aufgaben der Virtualisierungsschicht |
2.3.3 | CPU-Virtualisierung |
2.3.4 | Arbeitsspeicher |
2.3.5 | Virtuelle Netzwerke |
2.3.6 | Festplatten und Laufwerke |
2.3.7 | Migration virtueller Maschinen |
2.3.8 | vMotion |
2.3.9 | Distributed Resource Scheduling (DRS) |
2.3.10 | High Availability (HA) |
2.3.11 | Fault Tolerance |
2.4 | Microsoft Hyper-V |
2.5 | Citrix XenServer |
2.6 | QEMU & KVM |
2.6.1 | KVM |
2.6.2 | libvirt |
2.7 | Security in virtualisierten Umgebungen |
2.7.1 | Allgemeine Fragestellungen |
2.7.2 | Schutz des Hypervisors |
2.7.3 | Patch-Management und Compliance |
2.7.4 | Schutzmaßnahmen in virtuellen Netzwerken |
2.7.5 | Isolation von VMs |
2.7.6 | Verschlüsselung |
2.8 | Virtual Desktop Infrastructure |
3 | Containerization |
3.1 | Container-Virtualisierung |
3.1.1 | Linux Containers (LXC) |
3.1.2 | Container- vs. Server-Virtualisierung |
3.2 | Docker |
3.2.1 | Docker-Repository und Docker-Registry |
3.2.2 | Docker-Image |
3.2.3 | Netzwerk |
3.3 | Potentielle Gefahren |
3.4 | Kubernetes |
3.4.1 | Kubernetes Pod |
3.4.2 | Kubernetes-Deployment |
3.4.3 | Kubernetes Services |
4 | Modernes Data Center Design |
4.1 | Server-Technologien (Rackmount, Blade, ...) |
4.1.1 | Komplettlösungen |
4.2 | Physischer Zugriff |
4.3 | Data Center Network Design |
4.3.1 | Netzwerk-Separation in virtualisierten Umgebungen |
4.3.2 | Load-Balancing |
4.3.3 | WDM zwischen den Rechenzentren |
4.3.4 | Service Virtualization |
4.4 | Hohe Ressourcen-Ausnutzung und Energieeffizienz |
4.5 | Kühlung |
4.6 | Data Center Design Trends |
5 | Das Netzwerk im Wandel |
5.1 | Motivation für SDN |
5.1.1 | Nachteile klassischer Netzwerke |
5.1.2 | Agilität |
5.2 | Definition von SDN |
5.2.1 | Aufgaben von Control und Data Plane |
5.2.2 | Klassische Netzwerke |
5.2.3 | Zentrale Steuerung |
5.2.4 | Network Programmability |
5.3 | Software-Architektur des Controllers |
5.3.1 | North- & Southbound-Protokolle |
5.3.2 | Controller Redundanz und Skalierbarkeit |
5.4 | Underlay-Vernetzung |
5.4.1 | Wirkungsbereich des Controllers |
5.4.2 | Remote-Zugriff auf SDN-Komponenten |
5.4.3 | NETCONF |
5.4.4 | OpenFlow |
5.5 | Overlay-Vernetzung |
5.5.1 | Motivation für Overlay-Netze |
5.5.2 | VXLAN-Tunnel |
5.5.3 | NVGRE |
5.5.4 | Geneve |
5.6 | Übersicht: Controller-Produkte |
5.7 | Application Centric Infrastructure (ACI) von Cisco |
5.8 | VMware NSX |
5.8.1 | Details zu VMware NSX |
5.8.2 | NSX Distributed Firewall |
5.8.3 | Edge Devices |
5.9 | Network Function Virtualisation |
5.9.1 | NFV Rahmenwerk |
5.9.2 | Virtualisierung von IMS und EPC |
5.9.3 | Virtualisierung des Home Networks |
5.9.4 | Integration von NFV in SDN |
5.10 | Security und Network Function Virtualization |
5.10.1 | Schutzmaßnahmen |
5.10.2 | NFV Security Framework |
5.10.3 | Konzepte mit SDN |
5.10.4 | Realisierung des VNF FG |
5.10.5 | Beispiel anhand von ACI von Cisco |
5.11 | Auswirkungen von Cloud auf das Netzwerk |
6 | Speicher-Virtualisierung und Software-Defined Storage |
6.1 | Bedeutung des Datenspeichers |
6.1.1 | Direct Attached Storage |
6.2 | Netzwerkstorage |
6.2.1 | Network Attached Storage |
6.2.2 | Storage Area Networks |
6.3 | Datenspeicher in der Cloud |
6.3.1 | Object Storage |
6.4 | Speichervirtualisierung |
6.4.1 | Speichersystem-basierte Virtualisierung |
6.5 | Software-Defined Storage |
6.5.1 | Ceph |
6.5.2 | GlusterFS |
6.5.3 | VMware Virtual SAN |
6.6 | Hyperkonvergente Systeme (Hyper Converged Infrastructure) |
6.6.1 | NUTANIX |
6.6.2 | Dell EMC VxRail & VMware |
6.6.3 | HPE SimpliVity |
6.6.4 | Cisco HyperFlex HX Data Platform |
7 | Das Software-Defined Data Center |
7.1 | Das Software-Defined Data Center |
7.2 | VMware Aria und Cloud Foundation |
7.2.1 | Abstraktion der Ressourcen |
7.2.2 | VMware Aria Operations |
7.2.3 | VMware Aria Automation |
7.3 | Ausblick: Microsoft Azure Stack |
7.4 | OpenStack |
7.4.1 | Merkmale von OpenStack I |
7.4.2 | Module von OpenStack |
7.4.3 | Beispiel zur Netzwerkseparierung anhand von OpenStack |
7.4.4 | Security Groups |
8 | Zugriff auf die Cloud |
8.1 | Konnektivitätsoptionen für Multi-Cloud-Lösungen |
8.1.1 | Public Internet Peering |
8.1.2 | IP VPN |
8.1.3 | Dedicated WAN |
8.1.4 | Cloud Exchange |
8.1.5 | Cloud-Anbieter als Carrier |
8.2 | Erreichbarkeit von Services in der Cloud |
8.3 | VPN Gateways zur Cloud-Anbindung |
8.3.1 | Gateways (für VPN etc.) in Azure |
8.4 | Beispiel: MS Express Route |
8.5 | Redundanzkonzepte |
8.6 | Die Anforderungen der Anwendungen |
8.6.1 | Client/Server-Kommunikation |
8.6.2 | Server/Server-Kommunikation |
8.6.3 | Problem Latenzzeit |
8.6.4 | Mögliche Lösungen |
8.6.5 | Edge Computing |
8.6.6 | Applikationsbeschleuniger |
8.6.7 | SD-WAN |
8.7 | Aufbau und Limitierungen klassischer WANs |
8.8 | SD-WAN |
8.8.1 | SD-WAN Details |
8.8.2 | SD-WAN: Kundennutzen |
8.8.3 | SD-WAN-Konzept |
8.9 | Security-Konzepte bei SD-WAN |
8.9.1 | Lokale SD-WAN-Security |
8.9.2 | Secure Access Service Edge (SASE) |
9 | Migration in die Cloud |
9.1 | Applikations-Migration in die Cloud |
9.1.1 | Lift-and-Shift vs. Refactoring |
9.1.2 | Die 5 Rs der App-Modernisierung |
9.1.3 | Containerization |
9.1.4 | Der Hotel-California-Effekt |
9.2 | Datenmigration in die Cloud |
9.3 | Transition Phase |
9.3.1 | Technische Planung |
9.3.2 | Organisatorische Planung |
9.4 | Fallstricke |
-
Classroom training
- Do you prefer the classic training method? A course in one of our Training Centers, with a competent trainer and the direct exchange between all course participants? Then you should book one of our classroom training dates!
-
Hybrid training
- Hybrid training means that online participants can additionally attend a classroom course. The dynamics of a real seminar are maintained, and the online participants are able to benefit from that. Online participants of a hybrid course use a collaboration platform, such as WebEx Training Center or Saba Meeting. To do this, a PC with browser and Internet access is required, as well as a headset and ideally a Web cam. In the seminar room, we use specially developed and customized audio- and video-technologies. This makes sure that the communication between all persons involved works in a convenient and fault-free way.
-
Online training
- You wish to attend a course in online mode? We offer you online course dates for this course topic. To attend these seminars, you need to have a PC with Internet access (minimum data rate 1Mbps), a headset when working via VoIP and optionally a camera. For further information and technical recommendations, please refer to.
-
Tailor-made courses
-
You need a special course for your team? In addition to our standard offer, we will also support you in creating your customized courses, which precisely meet your individual demands. We will be glad to consult you and create an individual offer for you.

-
This course provides a very good insight into the cloud infrastructures of modern data centers. It explains which technologies are used to build them and what must be implemented to ensure that the solution meets modern security requirements. The concrete implementation is illustrated by means of market-leading products. The course provides a holistic picture as well as a solid know-how foundation on the topic of cloud platforms and provides an outlook on how data centers and cloud architectures will continue to change in the coming years.
-
Course Contents
-
- Driving forces for the development of cloud infrastructures
- Server, desktop and container virtualization: VMware, Microsoft, Xen, KVM, Docker and Kubernetes
- Security in virtualization, application security, VM-to-VM security, hypervisor security
- Modern data center design: security and technological developments
- Modern network technologies: SDN, OpenFlow, Cisco ACI, VMware NSX and VXLAN
- Service virtualization and network function virtualization (NFV)
- Storage developments: Virtual SAN infrastructures, object storage and software-defined storage
- Software-Defined Data Center (SDDC): Architecture and implementation variants
- vCloud Suite and OpenStack
- Innovative server and complete solutions as well as hyperconverged systems (HCI)
- WAN requirements: limitations of classic solutions and SD-WAN
- Transition phase and possible pitfalls
The detailed digital documentation package, consisting of an e-book and PDF, is included in the price of the course.
Premium Course Documents
In addition to the digital documentation package, the exclusive Premium Print Package is also available to you.
- High-quality color prints of the ExperTeach documentation
- Exclusive folder in an elegant design
- Document pouch in backpack shape
- Elegant LAMY ballpoint pen
- Practical notepad
The Premium Print Package can be added during the ordering process for € 175,- plus VAT (only for classroom participation). -
Target Group
-
This course is designed for anyone involved in building cloud infrastructures in engineering, presales, or IT security.
-
Knowledge Prerequisites
-
You should be interested and open-minded towards new topics. Basic network and IT knowledge should be available.
-
Alternatives
-
You can also purchase this course at a reduced price as part of this Qualification Package.
1 | Der Trend: Cloud Computing |
1.1 | IT im Wandel |
1.2 | Treiber für die Cloud |
1.2.1 | Verfügbarkeit des Business |
1.2.2 | Von fixen zu variablen Kosten |
1.2.3 | Agile Infrastruktur |
1.2.4 | Technologisch immer aktuell |
1.2.5 | Sicherheit und Compliance |
1.3 | Typische Herausforderungen und Einwände |
1.3.1 | Anforderungen an die Cloud Provider |
1.3.2 | Faktoren für die Kundenzufriedenheit |
1.4 | Virtualization – Enabler für die Cloud |
1.5 | Definition: Cloud Computing |
1.5.1 | Service-Modelle des Cloud Computings |
1.5.2 | Die verschiedenen Cloud-Varianten (Private Cloud, Public Cloud, …) |
1.5.3 | Multi-Cloud |
1.5.4 | Eigenschaften der Hyperscaler |
1.5.5 | Shared Responsibility |
2 | Server-Virtualisierung |
2.1 | Server-Zentralisierung und Edge Computing |
2.2 | Server-Virtualisierung |
2.2.1 | Vorteile: Schnelles Provisioning und Pooling |
2.2.2 | Vorteile: Automation und Hochverfügbarkeit |
2.2.3 | Vorteile: Konsolidierung und Green IT |
2.2.4 | Virtualisierungstechniken |
2.3 | VMware vSphere |
2.3.1 | Lizenzierung in vSphere 8 |
2.3.2 | Aufgaben der Virtualisierungsschicht |
2.3.3 | CPU-Virtualisierung |
2.3.4 | Arbeitsspeicher |
2.3.5 | Virtuelle Netzwerke |
2.3.6 | Festplatten und Laufwerke |
2.3.7 | Migration virtueller Maschinen |
2.3.8 | vMotion |
2.3.9 | Distributed Resource Scheduling (DRS) |
2.3.10 | High Availability (HA) |
2.3.11 | Fault Tolerance |
2.4 | Microsoft Hyper-V |
2.5 | Citrix XenServer |
2.6 | QEMU & KVM |
2.6.1 | KVM |
2.6.2 | libvirt |
2.7 | Security in virtualisierten Umgebungen |
2.7.1 | Allgemeine Fragestellungen |
2.7.2 | Schutz des Hypervisors |
2.7.3 | Patch-Management und Compliance |
2.7.4 | Schutzmaßnahmen in virtuellen Netzwerken |
2.7.5 | Isolation von VMs |
2.7.6 | Verschlüsselung |
2.8 | Virtual Desktop Infrastructure |
3 | Containerization |
3.1 | Container-Virtualisierung |
3.1.1 | Linux Containers (LXC) |
3.1.2 | Container- vs. Server-Virtualisierung |
3.2 | Docker |
3.2.1 | Docker-Repository und Docker-Registry |
3.2.2 | Docker-Image |
3.2.3 | Netzwerk |
3.3 | Potentielle Gefahren |
3.4 | Kubernetes |
3.4.1 | Kubernetes Pod |
3.4.2 | Kubernetes-Deployment |
3.4.3 | Kubernetes Services |
4 | Modernes Data Center Design |
4.1 | Server-Technologien (Rackmount, Blade, ...) |
4.1.1 | Komplettlösungen |
4.2 | Physischer Zugriff |
4.3 | Data Center Network Design |
4.3.1 | Netzwerk-Separation in virtualisierten Umgebungen |
4.3.2 | Load-Balancing |
4.3.3 | WDM zwischen den Rechenzentren |
4.3.4 | Service Virtualization |
4.4 | Hohe Ressourcen-Ausnutzung und Energieeffizienz |
4.5 | Kühlung |
4.6 | Data Center Design Trends |
5 | Das Netzwerk im Wandel |
5.1 | Motivation für SDN |
5.1.1 | Nachteile klassischer Netzwerke |
5.1.2 | Agilität |
5.2 | Definition von SDN |
5.2.1 | Aufgaben von Control und Data Plane |
5.2.2 | Klassische Netzwerke |
5.2.3 | Zentrale Steuerung |
5.2.4 | Network Programmability |
5.3 | Software-Architektur des Controllers |
5.3.1 | North- & Southbound-Protokolle |
5.3.2 | Controller Redundanz und Skalierbarkeit |
5.4 | Underlay-Vernetzung |
5.4.1 | Wirkungsbereich des Controllers |
5.4.2 | Remote-Zugriff auf SDN-Komponenten |
5.4.3 | NETCONF |
5.4.4 | OpenFlow |
5.5 | Overlay-Vernetzung |
5.5.1 | Motivation für Overlay-Netze |
5.5.2 | VXLAN-Tunnel |
5.5.3 | NVGRE |
5.5.4 | Geneve |
5.6 | Übersicht: Controller-Produkte |
5.7 | Application Centric Infrastructure (ACI) von Cisco |
5.8 | VMware NSX |
5.8.1 | Details zu VMware NSX |
5.8.2 | NSX Distributed Firewall |
5.8.3 | Edge Devices |
5.9 | Network Function Virtualisation |
5.9.1 | NFV Rahmenwerk |
5.9.2 | Virtualisierung von IMS und EPC |
5.9.3 | Virtualisierung des Home Networks |
5.9.4 | Integration von NFV in SDN |
5.10 | Security und Network Function Virtualization |
5.10.1 | Schutzmaßnahmen |
5.10.2 | NFV Security Framework |
5.10.3 | Konzepte mit SDN |
5.10.4 | Realisierung des VNF FG |
5.10.5 | Beispiel anhand von ACI von Cisco |
5.11 | Auswirkungen von Cloud auf das Netzwerk |
6 | Speicher-Virtualisierung und Software-Defined Storage |
6.1 | Bedeutung des Datenspeichers |
6.1.1 | Direct Attached Storage |
6.2 | Netzwerkstorage |
6.2.1 | Network Attached Storage |
6.2.2 | Storage Area Networks |
6.3 | Datenspeicher in der Cloud |
6.3.1 | Object Storage |
6.4 | Speichervirtualisierung |
6.4.1 | Speichersystem-basierte Virtualisierung |
6.5 | Software-Defined Storage |
6.5.1 | Ceph |
6.5.2 | GlusterFS |
6.5.3 | VMware Virtual SAN |
6.6 | Hyperkonvergente Systeme (Hyper Converged Infrastructure) |
6.6.1 | NUTANIX |
6.6.2 | Dell EMC VxRail & VMware |
6.6.3 | HPE SimpliVity |
6.6.4 | Cisco HyperFlex HX Data Platform |
7 | Das Software-Defined Data Center |
7.1 | Das Software-Defined Data Center |
7.2 | VMware Aria und Cloud Foundation |
7.2.1 | Abstraktion der Ressourcen |
7.2.2 | VMware Aria Operations |
7.2.3 | VMware Aria Automation |
7.3 | Ausblick: Microsoft Azure Stack |
7.4 | OpenStack |
7.4.1 | Merkmale von OpenStack I |
7.4.2 | Module von OpenStack |
7.4.3 | Beispiel zur Netzwerkseparierung anhand von OpenStack |
7.4.4 | Security Groups |
8 | Zugriff auf die Cloud |
8.1 | Konnektivitätsoptionen für Multi-Cloud-Lösungen |
8.1.1 | Public Internet Peering |
8.1.2 | IP VPN |
8.1.3 | Dedicated WAN |
8.1.4 | Cloud Exchange |
8.1.5 | Cloud-Anbieter als Carrier |
8.2 | Erreichbarkeit von Services in der Cloud |
8.3 | VPN Gateways zur Cloud-Anbindung |
8.3.1 | Gateways (für VPN etc.) in Azure |
8.4 | Beispiel: MS Express Route |
8.5 | Redundanzkonzepte |
8.6 | Die Anforderungen der Anwendungen |
8.6.1 | Client/Server-Kommunikation |
8.6.2 | Server/Server-Kommunikation |
8.6.3 | Problem Latenzzeit |
8.6.4 | Mögliche Lösungen |
8.6.5 | Edge Computing |
8.6.6 | Applikationsbeschleuniger |
8.6.7 | SD-WAN |
8.7 | Aufbau und Limitierungen klassischer WANs |
8.8 | SD-WAN |
8.8.1 | SD-WAN Details |
8.8.2 | SD-WAN: Kundennutzen |
8.8.3 | SD-WAN-Konzept |
8.9 | Security-Konzepte bei SD-WAN |
8.9.1 | Lokale SD-WAN-Security |
8.9.2 | Secure Access Service Edge (SASE) |
9 | Migration in die Cloud |
9.1 | Applikations-Migration in die Cloud |
9.1.1 | Lift-and-Shift vs. Refactoring |
9.1.2 | Die 5 Rs der App-Modernisierung |
9.1.3 | Containerization |
9.1.4 | Der Hotel-California-Effekt |
9.2 | Datenmigration in die Cloud |
9.3 | Transition Phase |
9.3.1 | Technische Planung |
9.3.2 | Organisatorische Planung |
9.4 | Fallstricke |
-
Classroom training
- Do you prefer the classic training method? A course in one of our Training Centers, with a competent trainer and the direct exchange between all course participants? Then you should book one of our classroom training dates!
-
Hybrid training
- Hybrid training means that online participants can additionally attend a classroom course. The dynamics of a real seminar are maintained, and the online participants are able to benefit from that. Online participants of a hybrid course use a collaboration platform, such as WebEx Training Center or Saba Meeting. To do this, a PC with browser and Internet access is required, as well as a headset and ideally a Web cam. In the seminar room, we use specially developed and customized audio- and video-technologies. This makes sure that the communication between all persons involved works in a convenient and fault-free way.
-
Online training
- You wish to attend a course in online mode? We offer you online course dates for this course topic. To attend these seminars, you need to have a PC with Internet access (minimum data rate 1Mbps), a headset when working via VoIP and optionally a camera. For further information and technical recommendations, please refer to.
-
Tailor-made courses
-
You need a special course for your team? In addition to our standard offer, we will also support you in creating your customized courses, which precisely meet your individual demands. We will be glad to consult you and create an individual offer for you.
