Visit the Text Version of the Merit web site
Merit Network

Search:

Merit Network



Like us on Facebook
Follow Merit Network on Twitter
Follow us on LinkedIn
RSS Information
Subscribe to our email lists



Merit Community Supporters



Course Outline for Cloud Computing Essentials

  • What is Cloud Computing?
    • Cloud Computing Defined
    • Cloud Computing Architecture
    • Cloud Computing Terms
      • Communication-as-a-Service (CaaS)
      • Infrastructure-as-a-Service (IaaS)
      • Monitoring-as-a-Service (MaaS)
      • Software-as-a-Service (SaaS)
      • Platform-as-a-Service (PaaS)
  • Benefits and Limitations of Cloud Computing
    • Benefits
    • Limitations
    • Cloud Computing Case Studies
  • How Companies Are Using Cloud Computing
    • Implementing Applications and Services in the Cloud
    • Using Your Company's Services vs. the Cloud Provider
    • A Cloud Service Provider Introduced
  • Cloud Computing Risks and Issues
2. Who's Who in Today's Cloud
  • Cloud Computing Companies
  • Products and Services Provided by Cloud Computing Companies
3. The Business Case for Going to the Cloud
  • Benefits of Cloud Computing
    • Operational
    • Economic
    • Staffing
  • Should Your Company Invest in Cloud Computing?
    • What Should Not be Moved to the Cloud
4. The Evolution of Cloud Computing
  • Early Mainframe Environment
    • Virtualization in Mainframe Architectures and Operating Systems
  • LANs and the Cloud
  • Internet and the Cloud
  • Web Services, Browsers, and the Cloud
  • Thin Client
  • Advances in Networking and Processing Speeds that Led to Cloud Computing
    • Networking Developments
    • Increased Processing Speeds
  • Managed Service Provider Model to Cloud Computing and Software as a Service (SaaS)
    • Single Purpose Architectures Migrate to Multipurpose Architectures
    • Data Center Virtualization
  • Collaboration
    • The Cloud as a Reach Extender
    • The Cloud as a Communication Enabler
    • The Cloud as an Employee Enabler
  • Service-Oriented Architecture (SOA)
    • Evolving from SOA to the Cloud
    • Capacity: Limited Performance
    • Availability: Communications Failure and Performance Issues
    • Security: Newer Security Protocols Provide More Protection
  • What's Next in Cloud Computing
5. Building Cloud Networks
  • Designing and Implementing a Data Center-Based Cloud
    • Using Industry and International Standards
    • Independent Components
    • Message Base
    • Location Independence
  • Communication Requirements for Cloud Implementation
    • Public Internet
    • Private Internet
    • Routing to the Datacenter
    • Switching within the Data Center
    • Bandwidth
      • Tools Used to Measure Network Performance
        • Using the Protocol Analyzer to Measure Bandwidth
        • Using Ping and Traceroute to Measure Network Performance
    • Security
      • SSL
      • VPN
      • Overhead
  • Storage Options for Cloud Computing
    • Storage Capacity
      • Data Protection and Partitioning
      • NAS
      • SAN
      • CAS
      • Redundancy
        • Replication
        • Multisiting
      • Backup and Recovery
  • Server Software Environments that Support Cloud Computing
    • Server Capacity
      • Virtualization
      • Clustering
      • Expansion
      • Server Functions
      • Application
      • Web
      • Database
  • Vendor Approaches to Cloud Computing
  • Role of Open Source Software in Data Center
    • Cost Reduction vs. Reliability
    • Open Source Server Software
    • Open Source Database Software
    • Open Source Applications Software
    • Open Source System Management Software
    • Open Source Load-Balancing Software
6. Virtualization
  • Student Virtualization Architectures
    • The Hypervisor
    • Virtualization as the "Operating System"
    • Virtualization with a Host Operating System
  • Virtualization Infections on Virtualized Environments
    • Type 1 Virtualized Environment
    • Type 2 Virtualized Environment
  • Virtualization Environments
    • Microsoft Virtualization
    • Sun xVM VirtualBox
    • Linux/UNIX Virtualization
    • VMware Products
      • Data Center and Cloud Infrastructure Products
      • End-User and Desktop Products
    • IBM Virtualization
    • Using VMware to see a Virtualized Server Environment
7. Federation, Presence, Security, and Privacy in the Cloud
  • Federation in the Cloud
    • What It Is
    • Permissive Federation
    • Verified Federation
    • Encrypted Federation
    • Trusted Federation
    • Using XMPP in the Federated Environment
  • Presence in the Cloud
    • What It Is
    • Presence Protocols
    • Leveraging Presence
    • Presence Enabled
    • The Future of Presence
    • The Interrelation of Identity, Presence, and Location in the Cloud
  • Identity Management
    • What It Is
    • Future of Identity in the Cloud
  • Privacy and Its Relation to Cloud-Based Information Systems
    • Personal Information
    • Privacy-Related Issues
    • Finding Your Private Information
8. Cloud Computing Standards and Best Practices
  • Open Cloud Consortium
    • What It Is
    • Open Cloud Consortium Working Groups
      • Project Matsu
      • Project Comet
      • HPC in the Cloud
      • The Open Cloud Testbed
      • The Open Science Data Cloud
      • Intercloud Testbed
      • Reporting on an Open Cloud Consortium Working Group
  • Distributed Management Task Force (DMTF)
    • What It Is?
    • DMTK Working Groups Associated with Cloud Computing
  • Standards for Application Developers
    • Protocols
    • Scripting Languages
    • Content Formatting Standards and Languages
  • Standards for Security in the Cloud
    • Confidentiality, Integrity, Availability
    • Authentication, Authorization, Accountability
    • Regulations for Privacy
    • Security Protocols
  • Establishing a Baseline for Cloud Performance
  • Best Practices for Selecting a Vendor and Implementing Cloud-Based Applications
    • Choosing the Right Vendor
    • Implementing Cloud-Based Applications
9. End-User Access to Cloud Computing
  • Cloud Access Methods Available to End Users
    • Citrix
    • Windows Remote Desktop
    • Vnc
    • Web Browsers
    • Server Extensions
    • Thin Clients
    • Smart Phones, Pads, Pods, etc.
  • Virtual Terminal Security Strengths and Weaknesses
    • Strengths
    • Weaknesses
10. Mobility and the Cloud
  • Mobile Operating Systems for Smartphones
    • iPhone
    • Android
    • BlackBerry
    • Windows Mobile
    • Ubuntu Mobile Internet Device
  • Mobile Platform Virtualization
    • Kernel-Based Virtual Machine
    • VMware Mobile Virtualization Platform
  • Collaboration Applications for Mobile Platforms
    • Text Messaging
    • iPhone Applications
    • BlackBerry Applications
    • Droid Applications




Back to the main Cloud Computing Essentials course page.




 

Print This
Email This
Tweet This

Font Size
Default Font Size
Larger Font Size
Largest Font Size





Membership | Services | Events | Research & Cybersecurity | News | About Merit
Contact Us | Directions to Merit | Site Map | Merit Network Home


Copyright © 2014 Merit Network, Inc.
1000 Oakbrook Drive, Suite 200, Ann Arbor, Michigan 48104-6794
Phone: (734) 527-5700    Fax: (734) 527-5790    E-mail: