Cloud Computing II - ??Cloud Computing II Cloud Infrastructures and Cloud Security Cloud Computing II The course at hand provides an excellent insight into the cloud infrastructures of

  • Published on
    29-Mar-2018

  • View
    216

  • Download
    4

Embed Size (px)

Transcript

  • Cloud Computing IICloud Infrastructures and Cloud Security

    Clou

    d Co

    mpu

    ting

    II

    The course at hand provides an excellent insight into the cloud infrastructures ofmodern data centers. It explains which technologies are used to set up theseinfrastructures and which components have to be implemented to ensure thatthe solution complies with state-of-the-art security requirements. The seminardeals with topics like management and monitoring, as well as with the technicalrequirements to be met by the customer to enter the cloud. The specificimplementation is explained with the help of market-leading products. Thecourse provides the student with a holistic overview and a solid know-howbasis on the topic of cloud infrastructures and shows in a preview how datacenters and cloud architectures will change in the course of the next years.

    Course ContentsDriving Forces for the Setup of Cloud InfrastructuresServer and Desktop Virtualization VMware, Microsoft, XEN, KVM, and DockerModern Data Center Design and Technological DevelopmentsFabricPath, SDN, OpenFlow, Cisco ACI, VMware NSX, VXLAN, and NFVVirtual SAN Infrastructures: Brocade and CiscoStorage Development: Object Storage, Software-Defined Storage, and SAN SecuritySoftware-defined Data Center (SDDC) Architecture and Implementation VariantsvCloud Suite and OpenStackInnovative Server and Overall Solutions, as well as Hyper-convergent SystemsCloud SecurityIntroduction and Setup (ISO 27001, BSI)Security in LAN and SAN, Security of Applications and Databases, VM-to-VM SecurityWeb Access and Web Services in Cloud InfrastructuresDemands Made on the WAN and Possible PitfallsTransition Phase and Possible Pitfalls

    E-Book Each participant will receive the comprehensive course documentation of theExperTeach Networking series in German language. The course documentation is alsoavailable as ExperTeach e-book.

    Target GroupThe course at hand addresses technicians and pre-sales staff concerned with the setup ofcloud infrastructures and/or cloud security.

    Knowledge PrerequisitesThe students should have a basic networking and IT know-how.

    Dat

    a Ce

    nter

    &St

    orag

    e

    5 Days 2,595 exclusive of V.A.T.

    Course Date/Location Course language German

    07/23-07/27/18 Mnchen07/23-07/27/18 Wien

    11/19-11/23/18 Hamburg03/18-03/22/19 Frankfurt

    Status 04/08/2018 CC02

    Reservation and RegistrationReserve your course at the required date free ofcharge and in a non-binding way! We will reserve aplace for you for the duration of 7 days. You candirectly make this reservation, as well as a bindingcourse booking on our Web site. Alternatively, youcan simply call us under: + 49 06074 4868-0.

    Guaranteed Course DatesYou can find all current course dates directly underthe link: www.experteach-training.com/go/CC02

    Alternativly, you can use the QRcode at the left to open this URL.

    Please check our website for theguaranteed course dates. These

    are indicated via the symbol

    Your Tailor-Made CourseYou want to attend this course, but with contentsthat are customized to your individual demands? Wecreate advanced training programs for your projectwhich fit your requirements precisely.

  • Hamburg

    Frankfurt/Dietzenbach

    MunichVienna

    Breda

    Berlin

    Nuremberg

    Utrecht

    Duesseldorf

    Bonn

    KarlsruheStuttgart

    Ulm

    Zurich

    PartnerTrainingCenter

    ExperTeachTrainingCenter

    Table of ContentsCloud Computing II Cloud Infrastructures and Cloud Security

    11.11.21.2.11.2.21.2.31.2.41.2.51.2.61.2.71.2.81.31.41.51.61.6.11.6.21.71.81.91.9.11.9.21.9.31.9.41.9.51.9.61.10

    22.12.22.32.3.12.3.22.3.32.3.42.3.52.3.62.42.52.5.12.62.72.82.8.12.8.22.8.32.8.42.8.52.92.102.112.122.12.12.12.22.12.32.12.42.132.142.14.1

    33.13.2

    Cloud ComputingSetup of ApplicationsThe Motivation from the Viewpoint of the CustomerBusiness AvailabilityFrom Fixed to Variable CostsAgile InfrastructureTechnologically Always Sate-of-the-ArtHigh Utilization of Resources and Energy EfficiencyHigh Performance, Availability, and Service QualitySecurity and ComplianceCost Reduction and Time SavingsTypical ObjectionsGrowth Market Cloud ComputingVirtualization as an Enabler for Cloud ComputingCloud ComputingService Models of Cloud ComputingVarious Cloud VariantsChallenges of Cloud ComputingSecurity in Cloud ComputingServices from the CloudTypical ServicesAmazon and Salesforce.comPublic Clouds: GoogleSAPMicrosoftIBM Cloud Services and LotusLiveGrid Computing

    Server and Desktop VirtualizationBusiness Requirements Made on ITServer CentralizationServer Virtualization, Consolidation, and AutomationAdvantage: Faster ProvisioningAdvantage: AutomationAdvantage: ConsolidationAdvantage: PoolingAdvantage: High AvailabilityAdvantage: Green ITVMware, KVM, Xen, and Hyper-V in ComparisonServer Virtualization by Means of VMwareDevelopmentThe vSphere Product RangeHyper-V 3.0Fields of Application and BenefitsVirtual NetworksChallenges for Network ConfigurationVMotionDistributed Resource Scheduling (DRS)High Availability (HA) and Fault Tolerance (FT)The Software-Defined Data CenterServer Hardware and SoftwareSpecial Features on the Sectors Network, Server, and MemoryThe Network in the Course of ChangeFabricPathOverlay Transport VirtualizationOTVExample: VCS by BrocadeThe Switch on the ServerVirtual Desktop InfrastructureSecurity in Virtual EnvironmentsCisco Virtual Security GatewayVSG

    Unified Computing SystemUCSThe Server MarketThe Unified Computing System

    3.33.43.4.13.4.23.4.33.4.43.4.53.4.63.4.73.53.63.6.13.6.23.6.33.73.83.93.103.113.123.133.143.14.13.14.23.14.33.14.43.14.53.14.63.14.73.14.83.14.93.14.103.14.113.15

    44.14.1.14.24.2.14.2.24.2.34.34.44.4.14.4.24.4.34.4.44.4.54.4.64.4.74.4.84.54.64.74.84.94.104.114.11.14.11.24.11.34.11.44.12

    The Cisco UCS C SeriesThe Cisco UCS B SeriesChassisPower SuppliesBlade ServerMezzanine AdapterI/O Modules (IOM)Fabric InterconnectUCS ManagerAdded Value of the Unified Computing SystemAll-in SolutionsFlexPodCisco and NetAppVblockEMC VSPEXCisco VXI InfrastructureDesign Scenarios with UCSHP c-Class SeriesIBM BladeCenterDellManagement Server AreaApplication Security in Cloud EnvironmentsThe Term ProxyExplicit ProxiesTransparent ProxiesReverse ProxiesGeneric ProxiesApplication Layer GatewaysWorking ModeLimitationsWeb ProxiesAuthentication at the FirewallThe Server EndThe Client EndMail Relays

    Storage Consolidation and VirtualizationSignificance of the Data Storage UnitDirect Attached StorageNetwork StorageNetwork-Attached StorageStorage Area NetworksNFS, iSCSI, FC, and FCoE in ComparisonStorage Consolidation and Data DeduplicationStorage VirtualizationHost-Based VirtualizationLVMHost-Based VirtualizationStorage Meta-Data ServerServer-Based Storage APIsStorage-System-Based VirtualizationDistributed Modular Array VirtualizationNetwork-Based VirtualizationVirtualization AppliancesDecisive Points in the Selection of Virtualization TechnologiesStorage VirtualizationVendor OverviewFCoE and CompetitorsThe Storage MarketCisco Products and PositioningBrocade Products and PositioningIntroduction to SAN SecurityMyths and AssumptionsIsolated EnvironmentSecurity by ObscurityTapping of Fibre ChannelDelivered SecuritySecurity in the Fabric

    4.12.14.12.24.12.34.12.44.12.54.12.64.12.7

    55.15.25.35.45.55.65.75.85.95.105.10.15.10.25.10.35.10.45.10.55.115.11.15.11.25.11.35.11.45.11.55.11.65.11.75.11.85.11.95.11.105.11.115.11.125.11.135.11.145.11.155.11.16

    66.16.26.36.3.16.3.26.46.56.66.6.16.6.26.76.7.16.7.26.7.36.7.46.7.5

    Security at the Storage UnitAdvanced Security Features in the SANNPIV and NPVUnified Fabric Data CenterBrocade: Virtual FabricsThe Cisco Cloud Story for the SANVSAN Concept

    Modern Data Center DesignClassic Network Virtualization MethodsData Center Network DesignData Center InfrastructureAccess Layer DesignService VirtualizationAggregation Layer DesignData Center Core Layer DesignWDM between Data CentersUnified FabricCurrent ChangesSecurity in the Data CenterManufacturersHPBrocadeCiscoCloud SecurityInfrastructureData Center Edge SecurityData Center Core SecurityThe Technologies in an OverviewProtection of Management Access and Control PlaneProtection of the Data PlaneQuality of ServiceLink Encryption According to IEEE 802.1AE and Cisco TrustSecVirtual Switches: Example of Cisco VDCsMPLS or VRF Lite for Separate NetworksSecurity on the Aggregation LayerData Center ServicesSecurity in the Access AreaIEEE 802.1XDHCP SnoopingDynamic ARP InspectionIP Source Guard

    Management Access to the CloudCloud SecurityOrganizational AspectsPhysical Access ProtectionUser Accounts and PasswordsDefault ParametersCentral User AdministrationInformation on User ActivityAccess via CLIAccess with SNMPSNMPv1 and SNMPv2cSNMP v3Cloud Management ToolsScenario of a Cloud NMS StructureNetwork Management SystemsElement Mangere.g. vCenter Server by VMwareElement ManagerCisco UCS ManagerEnd-to-End Managemente.g. BMC BladeLogic

    ExperTeach GmbHWaldstrae 94 D-63128 Dietzenbach Phone +49 6074 4868-0 Fax +49 6074 4868-109info@experteach.de www.experteach.de

    ExperTeach GmbH, all specifications made are exempted from liability, 04/08/2018

Recommended

View more >