Module 1: The Term “The Cloud”
This module explains where the term “The Cloud” came from, what it means and how to tell Cloud Technologies from other IT services. Additionally it covers the various kinds of Cloud infrastructure and Cloud services.
Module 2: Understanding and Utilizing Cloud Systems
This module explains how to look at cloud systems in such a way that students can analyze how they can be used to benefit an organization.
Module 3: Cloud Infrastructure Technologies
This module explains how and what protocols and standards are used in Cloud systems, what X.500 Directories are, how X.509 certificates are used and the concepts surrounding the forms of SSO.
Module 4: Control of Data and Continuity of Services
This module explains Service Level Agreements, Change Management and the roles and responsibilities of every organization for making computing services and data secure and available.
Module 5: Security & Privacy Considerations
This module explains the principle security topics important to know for all cloud products and services as well as regulatory requirements, eDiscovery, Investigative Support, Data Segregation, Long Term Viability and auditing.
Module 6: Review Questions
This module reviews all of the major topics covered in this one day class providing students to an opportunity to increase retention of the topics and expound on any related topics. This section also provides the instructor with feedback on how the presentation was comprehended by the learners and to fill in any knowledge gaps.
Module 7: PKI Fundamentals (optional)
This module explains how an understanding of Public Key Infrastructure (PKI) is critical to all cloud technology design, maintenance and management. Nearly every technology that supports the cloud and access to it includes PKI components. PKI is not a standalone system but rather a series of technologies that are incorporated by developers into security and access systems.
Module 8: Understanding Cloud Authentication and Authorization (optional)
This module explains how Authentication is making sure entities such as users or computers are whom they claim to be. Authorization is a system of determine what rights or permissions a user or computer has. SID, GUID and traditional ACLs pose a potential problem in Hybrid Cloud environments or SSO implementations because these identification systems are unique to a vendor or network system. This module explains how new systems are being deployed to overcome these issues.