Transcript
Page 1: Cloud Computing II - · PDF fileCloud Computing II Cloud Infrastructures and Cloud Security Cloud Computing II The course at hand provides an excellent insight into the cloud infrastructures

Cloud Computing IICloud Infrastructures and Cloud Security

Clou

d Co

mpu

ting

II

The course at hand provides an excellent insight into the cloud infrastructures ofmodern data centers. It explains which technologies are used to set up theseinfrastructures and which components have to be implemented to ensure thatthe solution complies with state-of-the-art security requirements. The seminardeals with topics like management and monitoring, as well as with the technicalrequirements to be met by the customer to enter the cloud. The specificimplementation is explained with the help of market-leading products. Thecourse provides the student with a holistic overview and a solid know-howbasis on the topic of cloud infrastructures and shows in a preview how datacenters and cloud architectures will change in the course of the next years.

Course ContentsDriving Forces for the Setup of Cloud InfrastructuresServer and Desktop Virtualization VMware, Microsoft, XEN, KVM, and DockerModern Data Center Design and Technological DevelopmentsFabricPath, SDN, OpenFlow, Cisco ACI, VMware NSX, VXLAN, and NFVVirtual SAN Infrastructures: Brocade and CiscoStorage Development: Object Storage, Software-Defined Storage, and SAN SecuritySoftware-defined Data Center (SDDC) Architecture and Implementation VariantsvCloud Suite and OpenStackInnovative Server and Overall Solutions, as well as Hyper-convergent SystemsCloud Security—Introduction and Setup (ISO 27001, BSI)Security in LAN and SAN, Security of Applications and Databases, VM-to-VM SecurityWeb Access and Web Services in Cloud InfrastructuresDemands Made on the WAN and Possible PitfallsTransition Phase and Possible Pitfalls

E-Book Each participant will receive the comprehensive course documentation of theExperTeach Networking series in German language. The course documentation is alsoavailable as ExperTeach e-book.

Target GroupThe course at hand addresses technicians and pre-sales staff concerned with the setup ofcloud infrastructures and/or cloud security.

Knowledge PrerequisitesThe students should have a basic networking and IT know-how.

Dat

a Ce

nter

&St

orag

e

5 Days € 2,595 exclusive of V.A.T.

Course Date/Location Course language German

07/23-07/27/18 München07/23-07/27/18 Wien

11/19-11/23/18 Hamburg03/18-03/22/19 Frankfurt

Status 04/08/2018 CC02

Reservation and RegistrationReserve your course at the required date free ofcharge and in a non-binding way! We will reserve aplace for you for the duration of 7 days. You candirectly make this reservation, as well as a bindingcourse booking on our Web site. Alternatively, youcan simply call us under: + 49 06074 4868-0.

Guaranteed Course DatesYou can find all current course dates directly underthe link: www.experteach-training.com/go/CC02

Alternativly, you can use the QRcode at the left to open this URL.

Please check our website for theguaranteed course dates. These

are indicated via the symbol

Your Tailor-Made CourseYou want to attend this course, but with contentsthat are customized to your individual demands? Wecreate advanced training programs for your projectwhich fit your requirements precisely.

Page 2: Cloud Computing II - · PDF fileCloud Computing II Cloud Infrastructures and Cloud Security Cloud Computing II The course at hand provides an excellent insight into the cloud infrastructures

Hamburg

Frankfurt/Dietzenbach

MunichVienna

Breda

Berlin

Nuremberg

Utrecht

Duesseldorf

Bonn

KarlsruheStuttgart

Ulm

Zurich

PartnerTrainingCenter

ExperTeachTrainingCenter

Table of ContentsCloud Computing II – Cloud Infrastructures and Cloud Security

11.11.21.2.11.2.21.2.31.2.41.2.51.2.61.2.71.2.81.31.41.51.61.6.11.6.21.71.81.91.9.11.9.21.9.31.9.41.9.51.9.61.10

22.12.22.32.3.12.3.22.3.32.3.42.3.52.3.62.42.52.5.12.62.72.82.8.12.8.22.8.32.8.42.8.52.92.102.112.122.12.12.12.22.12.32.12.42.132.142.14.1

33.13.2

Cloud ComputingSetup of ApplicationsThe Motivation from the Viewpoint of the CustomerBusiness AvailabilityFrom Fixed to Variable CostsAgile InfrastructureTechnologically Always Sate-of-the-ArtHigh Utilization of Resources and Energy EfficiencyHigh Performance, Availability, and Service QualitySecurity and ComplianceCost Reduction and Time SavingsTypical ObjectionsGrowth Market Cloud ComputingVirtualization as an Enabler for Cloud ComputingCloud ComputingService Models of Cloud ComputingVarious Cloud VariantsChallenges of Cloud ComputingSecurity in Cloud ComputingServices from the CloudTypical ServicesAmazon and Salesforce.comPublic Clouds: GoogleSAPMicrosoftIBM Cloud Services and LotusLiveGrid Computing

Server and Desktop VirtualizationBusiness Requirements Made on ITServer CentralizationServer Virtualization, Consolidation, and AutomationAdvantage: Faster ProvisioningAdvantage: AutomationAdvantage: ConsolidationAdvantage: PoolingAdvantage: High AvailabilityAdvantage: Green ITVMware, KVM, Xen, and Hyper-V in ComparisonServer Virtualization by Means of VMwareDevelopmentThe vSphere Product RangeHyper-V 3.0Fields of Application and BenefitsVirtual NetworksChallenges for Network ConfigurationVMotionDistributed Resource Scheduling (DRS)High Availability (HA) and Fault Tolerance (FT)The Software-Defined Data CenterServer Hardware and SoftwareSpecial Features on the Sectors Network, Server, and MemoryThe Network in the Course of ChangeFabricPathOverlay Transport Virtualization—OTVExample: VCS by BrocadeThe Switch on the ServerVirtual Desktop InfrastructureSecurity in Virtual EnvironmentsCisco Virtual Security Gateway—VSG

Unified Computing System—UCSThe Server MarketThe Unified Computing System

3.33.43.4.13.4.23.4.33.4.43.4.53.4.63.4.73.53.63.6.13.6.23.6.33.73.83.93.103.113.123.133.143.14.13.14.23.14.33.14.43.14.53.14.63.14.73.14.83.14.93.14.103.14.113.15

44.14.1.14.24.2.14.2.24.2.34.34.44.4.14.4.24.4.34.4.44.4.54.4.64.4.74.4.84.54.64.74.84.94.104.114.11.14.11.24.11.34.11.44.12

The Cisco UCS C SeriesThe Cisco UCS B SeriesChassisPower SuppliesBlade ServerMezzanine AdapterI/O Modules (IOM)Fabric InterconnectUCS ManagerAdded Value of the Unified Computing SystemAll-in SolutionsFlexPod—Cisco and NetAppVblockEMC VSPEXCisco VXI InfrastructureDesign Scenarios with UCSHP c-Class SeriesIBM BladeCenterDellManagement Server AreaApplication Security in Cloud EnvironmentsThe Term ProxyExplicit ProxiesTransparent ProxiesReverse ProxiesGeneric ProxiesApplication Layer GatewaysWorking ModeLimitationsWeb ProxiesAuthentication at the FirewallThe Server EndThe Client EndMail Relays

Storage Consolidation and VirtualizationSignificance of the Data Storage UnitDirect Attached StorageNetwork StorageNetwork-Attached StorageStorage Area NetworksNFS, iSCSI, FC, and FCoE in ComparisonStorage Consolidation and Data DeduplicationStorage VirtualizationHost-Based Virtualization—LVMHost-Based Virtualization—Storage Meta-Data ServerServer-Based Storage APIsStorage-System-Based VirtualizationDistributed Modular Array VirtualizationNetwork-Based VirtualizationVirtualization AppliancesDecisive Points in the Selection of Virtualization TechnologiesStorage Virtualization—Vendor OverviewFCoE and CompetitorsThe Storage MarketCisco Products and PositioningBrocade Products and PositioningIntroduction to SAN SecurityMyths and AssumptionsIsolated EnvironmentSecurity by ObscurityTapping of Fibre ChannelDelivered SecuritySecurity in the Fabric

4.12.14.12.24.12.34.12.44.12.54.12.64.12.7

55.15.25.35.45.55.65.75.85.95.105.10.15.10.25.10.35.10.45.10.55.115.11.15.11.25.11.35.11.45.11.55.11.65.11.75.11.85.11.95.11.105.11.115.11.125.11.135.11.145.11.155.11.16

66.16.26.36.3.16.3.26.46.56.66.6.16.6.26.76.7.16.7.26.7.36.7.46.7.5

Security at the Storage UnitAdvanced Security Features in the SANNPIV and NPVUnified Fabric Data CenterBrocade: Virtual FabricsThe Cisco Cloud Story for the SANVSAN Concept

Modern Data Center DesignClassic Network Virtualization MethodsData Center Network DesignData Center InfrastructureAccess Layer DesignService VirtualizationAggregation Layer DesignData Center Core Layer DesignWDM between Data CentersUnified FabricCurrent ChangesSecurity in the Data CenterManufacturersHPBrocadeCiscoCloud Security—InfrastructureData Center Edge SecurityData Center Core SecurityThe Technologies in an OverviewProtection of Management Access and Control PlaneProtection of the Data PlaneQuality of ServiceLink Encryption According to IEEE 802.1AE and Cisco TrustSecVirtual Switches: Example of Cisco VDCsMPLS or VRF Lite for Separate NetworksSecurity on the Aggregation LayerData Center ServicesSecurity in the Access AreaIEEE 802.1XDHCP SnoopingDynamic ARP InspectionIP Source Guard

Management Access to the CloudCloud Security—Organizational AspectsPhysical Access ProtectionUser Accounts and PasswordsDefault ParametersCentral User AdministrationInformation on User ActivityAccess via CLIAccess with SNMPSNMPv1 and SNMPv2cSNMP v3Cloud Management ToolsScenario of a Cloud NMS StructureNetwork Management SystemsElement Manger—e.g. vCenter Server by VMwareElement Manager—Cisco UCS ManagerEnd-to-End Management—e.g. BMC BladeLogic

ExperTeach GmbHWaldstraße 94 • D-63128 Dietzenbach • Phone +49 6074 4868-0 • Fax +49 6074 [email protected] • www.experteach.de

© ExperTeach GmbH, all specifications made are exempted from liability, 04/08/2018


Recommended