Your SlideShare is downloading. ×
Presenter manual   cloud computing (specially for summer interns)
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Presenter manual cloud computing (specially for summer interns)

606
views

Published on

Objective of Project Based Industrial Training : …

Objective of Project Based Industrial Training :
To provide state of art, cutting edge customized software solutions to clients of various Industries.
To reduce the gap between the academic learning and Industry experience.
Core and advanced features of each technology, are covered in interactive classroom sessions.
Topic Based Assignments are given to trainees to develop their programming skills.
Hands on Training are imparted on “Live Projects” by industry experts.
Project completion certificate is awarded by “XPERT INFOTECH”
Trainees are helped by our dedicated team of HR executives in finding out suitable job, after completion of the training.

Published in: Education, Technology, Business

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
606
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
5
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Cloud computingSpecially For Summer Interns Effective from: Jan 20121 COURSE OUTLINE FOR | XPERT INFOTECH | Confidential CLOUD COMPUTING
  • 2. 1. Introduction to Cloud Computing  What is Cloud Computing? o Cloud Computing Defined o Cloud Computing Architecture o Cloud Computing Terms  Communication-as-a-Service (CaaS)  Infrastructure-as-a-Service (IaaS)  Monitoring-as-a-Service (MaaS)  Software-as-a-Service (SaaS)  Platform-as-a-Service (PaaS)  Benefits and Limitations of Cloud Computing o Benefits o Limitations o Cloud Computing Case Studies  How Companies Are Using Cloud Computing o Implementing Applications and Services in the Cloud o Using Your Companys Services vs. the Cloud Provider o A Cloud Service Provider Introduced  Cloud Computing Risks and Issues2. Whos Who in Todays Cloud  Cloud Computing Companies  Products and Services Provided by Cloud Computing Companies3. The Business Case for Going to the Cloud  Benefits of Cloud Computing o Operational o Economic o Staffing  Should Your Company Invest in Cloud Computing? o What Should Not be Moved to the Cloud4. The Evolution of Cloud Computing  Early Mainframe Environment o Virtualization in Mainframe Architectures and Operating Systems  LANs and the Cloud  Internet and the Cloud  Web Services, Browsers, and the Cloud  Thin Client  Advances in Networking and Processing Speeds that Led to Cloud Computing o Networking Developments o Increased Processing Speeds 2 COURSE OUTLINE FOR | XPERT INFOTECH | Confidential CLOUD COMPUTING
  • 3.  Managed Service Provider Model to Cloud Computing and Software as a Service (SaaS) o Single Purpose Architectures Migrate to Multipurpose Architectures o Data Center Virtualization  Collaboration o The Cloud as a Reach Extender o The Cloud as a Communication Enabler o The Cloud as an Employee Enabler  Service-Oriented Architecture (SOA) o Evolving from SOA to the Cloud o Capacity: Limited Performance o Availability: Communications Failure and Performance Issues o Security: Newer Security Protocols Provide More Protection  Whats Next in Cloud Computing5. Building Cloud Networks  Designing and Implementing a Data Center-Based Cloud o Using Industry and International Standards o Independent Components o Message Base o Location Independence  Communication Requirements for Cloud Implementation o Public Internet o Private Internet o Routing to the Datacenter o Switching within the Data Center o Bandwidth  Tools Used to Measure Network Performance Using the Protocol Analyzer to Measure Bandwidth Using Ping and Traceroute to Measure Network Performance o Security  SSL  VPN  Overhead  Storage Options for Cloud Computing o Storage Capacity  Data Protection and Partitioning  NAS  SAN  CAS  Redundancy Replication Multisiting  Backup and Recovery  Server Software Environments that Support Cloud Computing o Server Capacity 3 COURSE OUTLINE FOR | XPERT INFOTECH | Confidential CLOUD COMPUTING
  • 4.  Virtualization  Clustering  Expansion  Server Functions  Application  Web  Database  Vendor Approaches to Cloud Computing  Role of Open Source Software in Data Center o Cost Reduction vs. Reliability o Open Source Server Software o Open Source Database Software o Open Source Applications Software o Open Source System Management Software o Open Source Load-Balancing Software6. Virtualization  Student Virtualization Architectures o The Hypervisor o Virtualization as the "Operating System" o Virtualization with a Host Operating System  Virtualization Infections on Virtualized Environments o Type 1 Virtualized Environment o Type 2 Virtualized Environment  Virtualization Environments o Microsoft Virtualization o Sun xVM VirtualBox o Linux/UNIX Virtualization o VMware Products  Data Center and Cloud Infrastructure Products  End-User and Desktop Products o IBM Virtualization o Using VMware to see a Virtualized Server Environment7. Federation, Presence, Security, and Privacy in the Cloud  Federation in the Cloud o What It Is o Permissive Federation o Verified Federation o Encrypted Federation o Trusted Federation o Using XMPP in the Federated Environment  Presence in the Cloud o What It Is o Presence Protocols o Leveraging Presence 4 COURSE OUTLINE FOR | XPERT INFOTECH | Confidential CLOUD COMPUTING
  • 5. o Presence Enabled o The Future of Presence o The Interrelation of Identity, Presence, and Location in the Cloud  Identity Management o What It Is o Future of Identity in the Cloud  Privacy and Its Relation to Cloud-Based Information Systems o Personal Information o Privacy-Related Issues o Finding Your Private Information8. Cloud Computing Standards and Best Practices  Open Cloud Consortium o What It Is o Open Cloud Consortium Working Groups  Project Matsu  Project Comet  HPC in the Cloud  The Open Cloud Testbed  The Open Science Data Cloud  Intercloud Testbed  Reporting on an Open Cloud Consortium Working Group  Distributed Management Task Force (DMTF) o What It Is? o DMTK Working Groups Associated with Cloud Computing  Standards for Application Developers o Protocols o Scripting Languages o Content Formatting Standards and Languages  Standards for Security in the Cloud o Confidentiality, Integrity, Availability o Authentication, Authorization, Accountability o Regulations for Privacy o Security Protocols  Establishing a Baseline for Cloud Performance  Best Practices for Selecting a Vendor and Implementing Cloud-Based Applications o Choosing the Right Vendor o Implementing Cloud-Based Applications9. End-User Access to Cloud Computing  Cloud Access Methods Available to End Users o Citrix o Windows Remote Desktop o Vnc o Web Browsers o Server Extensions 5 COURSE OUTLINE FOR | XPERT INFOTECH | Confidential CLOUD COMPUTING
  • 6. o Thin Clients o Smart Phones, Pads, Pods, etc.  Virtual Terminal Security Strengths and Weaknesses o Strengths o Weaknesses10. Mobility and the Cloud  Mobile Operating Systems for Smartphones o iPhone o Android o BlackBerry o Windows Mobile o Ubuntu Mobile Internet Device  Mobile Platform Virtualization o Kernel-Based Virtual Machine o VMware Mobile Virtualization Platform  Collaboration Applications for Mobile Platforms o Text Messaging o iPhone Applications o BlackBerry Applications o Droid ApplicationsNotes: Recommend Practical hours for student except class hours is 90 Hrs. We also provide weekend classes for all courses. After completion of 75% of course, student will go through Live Project Training, Interview Preparation and Recruitment process in Software Industry. 6 COURSE OUTLINE FOR | XPERT INFOTECH | Confidential CLOUD COMPUTING
  • 7. Our Technology Specialization and Certification Courses:7 COURSE OUTLINE FOR | XPERT INFOTECH | Confidential CLOUD COMPUTING
  • 8. KEY FEATURES OF XPERT INFOTECH: KEY FEATURES OF XPERT INFOTECH: Training by Certified and Experienced Trainers. Industrial and Corporate Tie-ups for Live projects for student. Well equipped Computer Lab, Internet and Book Bank facility. Live project based Summer Trainings, Summer Internships and summer programs. 100% placement assistance on every course. Interview Preparation and Technical Events. On Campus Interviews in every month for the placement of students. WI-FI enabled classrooms. 100% Placement Assistance On Campus Interviews 58-61 (Basement), Vashist Park, Pankha Road, New Delhi-46 Ph.: 011-28526572, 65833100, 9990345891 www.xpert-infotech.com Email: info@xpert-infotech.com8 COURSE OUTLINE FOR | XPERT INFOTECH | Confidential CLOUD COMPUTING

×