Search our courses
Training

Cloud Computing is gaining increasing attention within enterprises of all shapes and sizes, but few technologists actually know how to properly scope, design, and construct Cloud solutions. Taking standard software applications, databases, and user interfaces and deploying them in a Cloud environment is a recipe for disaster. Proper scoping, usage modeling, and careful design are all essential to success in the Cloud.

This Cloud Essentials for Architects using OpenStack two day learning course begins with an examination of the Cloud Computing concept, the structure and key characteristics of Clouds, and takes a look under the hood at how they operate. From there, students are introduced to a Cloud Reference Model and explore various aspects of Cloud solution design from discovery throughout the life-cycle of a Cloud solution all the way to retirement. Special attention is given to requirements and Cloud utilization analysis, Cloud solution design strategies, and deployment scenarios.

Upon completion of this course, students will have an understanding of the Cloud Computing environment and practical experience in designing, developing, and deploying Cloud-based solutions. This class consists of 25% hands-on labs in an actual OpenStack Cloud Computing development environment, and 75% lecture and discussion. Students should have some hands-on experience developing software, but the focus of the course is upon architecture and design considerations within the Cloud.

Topics Include:

  • Cloud Reference Model
  • Cloud Risks and Risk Mitigation
  • OpenStack Platform
  • Cloud Design Strategies
  • Security in the Cloud
  • Cloud Governance
  • Cloud SLAs

Cloud Essentials for Architects using OpenStack

Course Code

GTC6

Duration

2 Days

Course Fee

POA

Accreditation

N/A

Target Audience

Enterprise Architects, Solution Architects, Information Technology Architects, Senior Developers and Team Leads

Attendee Requirements

Foundational Knowledge in distributed computing and Web-based architecture.

If you have any questions or doubts as to whether you meet the pre-requisites for this course, or indeed are wondering which course best suits you, please Contact Us to discuss your suitability for course attendance.

 

Expand all

Course Description

Cloud Computing is gaining increasing attention within enterprises of all shapes and sizes, but few technologists actually know how to properly scope, design, and construct Cloud solutions. Taking standard software applications, databases, and user interfaces and deploying them in a Cloud environment is a recipe for disaster. Proper scoping, usage modeling, and careful design are all essential to success in the Cloud.

This Cloud Essentials for Architects using OpenStack two day learning course begins with an examination of the Cloud Computing concept, the structure and key characteristics of Clouds, and takes a look under the hood at how they operate. From there, students are introduced to a Cloud Reference Model and explore various aspects of Cloud solution design from discovery throughout the life-cycle of a Cloud solution all the way to retirement. Special attention is given to requirements and Cloud utilization analysis, Cloud solution design strategies, and deployment scenarios.

Upon completion of this course, students will have an understanding of the Cloud Computing environment and practical experience in designing, developing, and deploying Cloud-based solutions. This class consists of 25% hands-on labs in an actual OpenStack Cloud Computing development environment, and 75% lecture and discussion. Students should have some hands-on experience developing software, but the focus of the course is upon architecture and design considerations within the Cloud.

Topics Include:

  • Cloud Reference Model
  • Cloud Risks and Risk Mitigation
  • OpenStack Platform
  • Cloud Design Strategies
  • Security in the Cloud
  • Cloud Governance
  • Cloud SLAs
Course Outline

CHAPTER 1. DEFINING THE CLOUD

  •     A Bit of History
  •     Wikipedia Entry
  •     Cloud Computing at a Glance
  •     Gartner Research on Cloud
  •     Electrical Power Grid Service Analogy
  •     The NIST Perspective
  •     Five Characteristics
  •     On-demand Self-Service (NIST Characteristic)
  •     Broad Network Access (NIST Characteristic)
  •     Resource Pooling (NIST Characteristic)
  •     Rapid Elasticity (NIST Characteristic)
  •     Measured Service (NIST Characteristic)
  •     The Three Cloud Service Models (NIST)
  •     The Cloud Computing Spectrum: IaaS, PaaS and SaaS
  •     The Four Cloud Deployment Models (NIST)
  •     The NIST Cloud Definition Framework
  •     A Hybrid Cloud Diagram
  •     Cloud Deployment Model Dynamics
  •     Summary

CHAPTER 2. THE CLOUD ENABLERS

  •     The Origin of the Cloud Computing
  •     Virtualization
  •     Hypervisors
  •     Hypervisor Types
  •     Type 1 hypervisors
  •     Type 2 hypervisors
  •     Type 1 vs Type 2 Processing
  •     Paravirtualization
  •     Applying Virtualization to the Cloud
  •     Virtualization Qualities (1/2)
  •     Virtualization Qualities (2/2)
  •     Grid Computing vs Cloud Computing
  •     Myth: Cloud is SaaS
  •     SOA and the Cloud
  •     Summary

CHAPTER 3. CLOUD REFERENCE MODEL

  •     The Need for a Cloud Reference Model
  •     Cloud Reference Model
  •     Cloud Infrastructure
  •     Cloud Infrastructure – Virtual Machines
  •     A Bootable OS Image
  •     Defining a “Compute Unit”
  •     Instance Templates (Flavors)
  •     Launching an Instance in OpenStack
  •     Block Storage for Instances
  •     Cloud Infrastructure – Cloud Object Storage
  •     Additional Data Storage Options
  •     Cloud Multi-Tenancy Model
  •     Common Characteristics of Multi-tenant Applications (1/2)
  •     Common Characteristics of Multi-tenant Applications (2/2)
  •     The PaaS Platform
  •     Google App Engine (GAE) PaaS Overview
  •     GAE’s Stats
  •     Google Cloud Storage
  •     The SaaS Platform
  •     Cloud Service Model Implementations
  •     Google Compute Engine’s Simplified Architecture
  •     Google Cloud Platform
  •     Summary

CHAPTER 4. OPENSTACK

  •     What is OpenStack
  •     OpenStack Main Components/Services
  •     Release History (Since the
  •     Folsom
  •     Release)
  •     Compute (Nova)
  •     Main Compute (Nova) modules/services
  •     Creating OpenStack VM Instances
  •     Image (Glance)
  •     Object Store (Swift)
  •     Components of Swift
  •     Dashboard (Horizon)
  •     Launching a Virtual Instance in Horizon
  •     Block Storage (Cinder)
  •     Identity (Keystone)
  •     Networking (Neutron, formerly Quantum)
  •     OpenStack Networking
  •     Telemetry (Ceilometer)
  •     Orchestration (Heat)
  •     Heat Templates
  •     Pulling It All Together
  •     Building OpenStack Environments
  •     Using Automated Configurators
  •     Managing OpenStack Clouds
  •     Summary

CHAPTER 5. THE CLOUD ECONOMICS

  •     Cloud Value Proposition
  •     Coping with Computing Demand the Traditional Way
  •     Coping with Computing Demand the Cloud Way
  •     Cloud economics
  •     You Can Move Your Cloud Apps Closer to Your Clients!
  •     Be Aware of What You Ask For!
  •     Do Clouds Compute?
  •     Total Cost of Ownership (TCO)
  •     Cloud Infrastructure – Vendor Comparison
  •     Select Expected Benefits
  •     You Still Need …
  •     Financial Management and Tracking
  •     Calculate initial, simple return
  •     Calculate Returns for on-going Usage
  •     How to Practically Estimate Your Cloud Bill?
  •     Shop Around (Within the Same Shop)
  •     Discounted Object Storage: Amazon Glacier
  •     Amazon S3 Cost Monitoring
  •     Google Compute Engine Per-Minute Billing
  •     Summary

CHAPTER 6. CLOUD RISKS AND RISK MITIGATION

  •     Cloud Risks
  •     Failure-As-A-Service in 2009
  •     Service Quality
  •     Malicious Insiders
  •     Shared Technology Vulnerabilities
  •     Data Loss/Leakage
  •     Data Loss / Leakage Causes
  •     Account, Service & Traffic Hijacking
  •     Unknown Risk Profile
  •     Mitigating Cloud Security Risks
  •     Five Mitigation Strategies
  •     Federated ID
  •     Multi-layer Inspection
  •     Centralized Management
  •     Virtual Desktop Protection
  •     Look toward standards
  •     Problem Resolution
  •     Data Back-up
  •     Risks When Supporting Clouds: Provisioning
  •     Liability
  •     Security
  •     Summary

CHAPTER 7. CLOUD SECURITY

  •     The Heartbleed OpenSSL Bug
  •     A Notable Breach (a Spear-phishing Attack Example)
  •     Cloud Vendor Security Certifications
  •     Google Compute Engine Data Security
  •     Cloud Access Security Features
  •     Security of Cloud Vendor Networks
  •     Insecure Interfaces
  •     Top Threats for Cloud Computing
  •     The Common Cloud Security Concerns
  •     Authorization and Data Access Constraints
  •     Cloud Security Domains
  •     The CIAs of Security
  •     Access Control: Physical Security
  •     Access Control: Authentication & Authorization
  •     Federated Identity Management
  •     Access Control: Auditing
  •     Identity Management
  •     AWS Identity and Access Management Service
  •     Security in the Google Cloud
  •     GAE Cloud Security Module
  •     Application Security
  •     Application Multi-Layer Security Design
  •     Access Control List Extensions
  •     Information and Data Security
  •     Data-at-rest Security
  •     Amazon S3 Security
  •     Amazon S3 Security (Cont.)
  •     Network Security
  •     Operational Security
  •     DevOps Security Concerns
  •     Summary

CHAPTER 8. CLOUD SERVICES

  •     Defining Cloud Services
  •     User-Cloud Interaction
  •     Cloud Service Characteristics
  •     The Typical Cloud Services
  •     Application Services
  •     Messaging Application Service
  •     Email Application Service
  •     Cache Application Service
  •     Specialized Application Services
  •     AWS Analytics Systems
  •     Google App Engine (GAE) MapReduce Service
  •     Use Cases for MapReduce Jobs
  •     Integration Platform as a Service (IPaaS)
  •     Storage Services
  •     Object Storage
  •     Archive Storage
  •     Relational Storage
  •     NoSQL Storage
  •     Some AWS Storage Services
  •     Data Warehouses in the Cloud
  •     Cloud Utility Services
  •     Scalability and HA of Your Applications in the Cloud
  •     The Auto-scaling Service
  •     Monitoring Services
  •     Configuring Instance Health Check in AWS
  •     Amazon Web Services Integration Diagram
  •     Google App Engine (GAE) Services Integration Diagram
  •     Microsoft Azure Services
  •     Comparing Cloud Service Stacks
  •     Summary

CHAPTER 9. ADOPTING YOUR VERY OWN CLOUD

  •     What Drives Cloud Adoption?
  •     What May Go to the Cloud?
  •     Capacity Planning
  •     Critical Run-time and Storage Parameters
  •     The Cloud Adoption Stages (Example)
  •     Getting to the Cloud (Example Road Map)
  •     Pre-Cloud Stages
  •     Cloud Stages
  •     Cloud Stages (Cont’d)
  •     Cloud Adoption Steps
  •     Identify your business drivers (Step #1)
  •     Get Educated (Step #2)
  •     Get Educated (Things to Avoid … )
  •     Articulate a Value Proposition (Step #3)
  •     Define one or more scenarios (Step #4)
  •     Produce a Road Map (Step #5)
  •     Gain Stakeholder Buy-in (Step #6)
  •     Establish Governance (Step #7)
  •     Invest in Infrastructure (Step #8)
  •     Cloud Pilot (Step #9)
  •     Scoping the Pilot Project
  •     Pilot Project Scope (Cont’d)
  •     Enterprise Roll-out (Step #10)
  •     Start Small and Grow Incrementally
  •     Amazon WS Technical Lessons When Moving To the Cloud
  •     Hype Cycle and Technology Adoption Model
  •     Summary

CHAPTER 10. OPENSTACK SECURITY

  •     OpenStack Cloud Perimeter Security
  •     System Perimeter Security
  •     OpenStack Virtual Instance Security
  •     OpenStack Security Considerations
  •     Linux Kernel-Based Firewall
  •     OpenStack Security Groups
  •     Nova Client Security Group Commands
  •     Nova REST API for Security Group Administration
  •     Nova Security Command Examples
  •     Identity Management with Keystone
  •     Keystone Command-line
  •     Example of a Keystone Command
  •     Keystone REST API
  •     Example of Keystone RESTful Request
  •     Summary

CHAPTER 11. CLOUD DESIGN STRATEGIES

  •     Implications of Vendor Lock-In
  •     Dealing with Vendor-specific Service API
  •     Know Your Cloud Application’s Needs
  •     Data Physics
  •     Cloud Design Strategies
  •     Designing for Scalability
  •     Designing for Cloud Availability
  •     Designing for Failure
  •     Designing for Cloud Security
  •     Designing for Cloud Security – OWASP 10
  •     Designing for Cloud Security – OWASP 10 (Cont’d)
  •     Designing for Cloud Security – Multi-Factor Security
  •     Stepping Across Site Silos
  •     Stepping Across Site Silos – the SAML Protocol
  •     Stepping Across Site Silos – t
  •     he OpenID Protocol
  •     SAML vs OpenID
  •     History of OAuth
  •     Stepping Across Site Silos – OAuth
  •     Selecting the Right Storage
  •     (Cont’d)
  •     Designing for Cloud Management
  •     Designing for Cloud Maintainability
  •     Other Considerations
  •     Designing for Cloud Service Reuse
  •     Designing for Cloud Service Reuse (Cont’d)
  •     Designing for Cloud Agility
  •     Designing for Cloud Usability
  •     Additional Usability Considerations
  •     Summary

CHAPTER 12. CLOUD SLAS

  •     What is an SLA?
  •     Two SLA Management Phases
  •     Some SLA Parameters
  •     The Importance of Cloud SLAs
  •     Amazon Storage SLAs
  •     Understanding your SLA
  •     Example of Google Infrastructure Failure Rates
  •     Assess Consequences for Your Business
  •     Characteristics of a Service Quality Metric
  •     Service Quality Metrics
  •     SLA Monitoring Components
  •     Summary
Learning Path

There are a number of options of suitable follow-on courses, depending on your business needs. Please Contact Us for further details.

Ways to Attend
  • Attend a public course, check our schedule
  • Private onsite Team training also available

Private Team Training is available for this course

We deliver this course either on or off-site in various regions around the world, and can customise your delivery to suit your exact business needs. Talk to us about how we can fine-tune a course to suit your team's current skillset and ultimate learning objectives.

Private Team Training | Contact us

Technical ICT learning & mentoring services

Private Team Training

Our instructors are specialist consultants with vast real world experience and expertise allowing them to design and deliver client-focused courses for your organisation.

Learn more about our Private Team Training

What Our Clients Say

"Absolutely fantastic training. Thoroughly enjoyed it thanks to our highly enthusiastic tutor.  It wouldn't be an understatement to say that it was the best professional training that I have ever received."

 

Customised Linux with Networking

Live Online -  February 2022

 

"The course content was very good. When needed, the Instructor was extending the content of the course with hints and tips to help us understand different topics that were covered in the course."

 

Kubernetes Administration Certification - GTLFK

Live Online June 2021

 

 

 

“The course was held at the highest possible standards, the instructor was excellent, well prepared, well informed, and clearly an SME. Top marks.”

 

Professional Cloud Service Manager - GTC13

Live Online December 2021

 

“Very engaging and practical course so hope to be able to put the learning into practice.”

 

Being Agile in Business - GTBAB

Live Online September 2021

 

“Great instructor, who encouraged active participation. The breakout groups and exercises kept the group engaged and the content relevant to our own products”.

 

Site Reliability Engineering Foundation - GTDSRE

Live Online January 2022

 

 

 

"Intelligence is the ability to avoid doing work, yet
getting the work done"

Linus Torvalds, creator of Linux and GIT

Technical ICT learning & mentoring services

About GuruTeam

GuruTeam is a high-level ICT Learning, Mentoring and Consultancy services company. We specialise in delivering instructor-led on and off-site training in Blockchain, Linux, Cloud, Big Data, DevOps, Kubernetes, Agile, Software & Web Development technologies. View our Testimonials

Download our eBrochure
Our Accreditation Partners
  •  
  •  
  •  

 

Upcoming Courses

Kubernetes Administration

11th - 14th March 2024

26th - 29th March 2024

Live Online

 

This Kubernetes Administration Certification training course is suitable for anyone who wants to learn the skills necessary to build and administer a Kubernetes cluster

Learn More

RUST

11th - 14th March 2024

26th - 29th March 2024

 Live Online

This course will help you understand what Rust applications look like, how to write Rust applications properly, and how to get the most out of the language and its libraries.

Learn More

Introduction to Python 3 

19th - 21st March 2024

9th - 11th April 2024

7th - 9th May 2024

   4th - 6th June 2024

 

Live Online

This Introduction to Python 3 training course is designed for anyone who needs to learn how to write programs in Python or support/modify existing programs.

 

Learn More

 GO LANG TRAINING

11th - 14th March 2024

26th - 29th March 2024

 

Live Online        

 

This Go language programming training course will help you understand how Go works, and immediately be more productive. If you are building a team using Go, this will be a great opportunity to get your team on the same page and speaking the same language. Innovative lab exercises and code samples are provided to reinforce skills and quickly master the topics.

Learn More

Newsletter

Stay up to date, receive updates on scheduled dates, new courses, offers, and events.

Subscribe to our Newsletter