Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Â
Cloud Clinique Enterprise IT Certification Program - Module Matrix
1. Enterprise IT Certification
Program
Dr Shiyghan Emmanuel Navti
Enterprise IT Consultant & Trainer
email: shiyghan@techequityltd.com
web: http://techequityltd.com & http://cloudclinique.com
2. We Improve
Service
Delivery
We are Global
Technology
Leaders
Our Program is
Vendor
Neutral
We Enable
Professional
Development
We Accelerate
Best Practice
Adoption
Our Program is
Certification
Based
3. Enterprise Foundation Technologies
Enterprise IT Architecture
Module 3 Enterprise Service Management
Enterprise Risk Management
Module 1
Module 2
Module 4
Module 5 Enterprise Security
4. Enterprise
Security
Risk
Management
Service
Management
IT
Architecture
Foundation
Technology
Benefits & Challenges
Storage types and Tiering
Optimizing Storage Networks
NAS and SAN Usage
Migration Options
Storage Design
Devices and Protocols
Deployment Topologies
Configuration Options
Management Options
Virtualization
Network Performance
Network Security
Benefits & Challenges
Administration
Provisioning
Storage
Networking
Compute
Bare Metal
Security
Foundation Technologies
and Components
Internet
Intranet
Extranets
Web Services
Administration Tools
Networking Tools
Storage Systems and
Storage Networks
Virtualization and
Multitenancy
Network Infrastructure
and Management
Define and adopt storage
systems and storage
networking best practices
Explore and select the right
network infrastructure based
on network infrastructure
best practices
Understand how to create a
path to a flexible IT
infrastructure using
virtualization
Understand the basic
technologies, capabilities and
tools used to deliver
enterprise IT services
Discussion Topics
Certification Programs
Cloud+ Cloud+ Cloud+
Certified Cloud Professional
Certified Cloud Architect
Cloud Essentials
Cloud+
Certified Cloud Professional
Certified Cloud Architect
5. I/O Performance
Data Redundancy
Bandwidth
Scalability
Redundancy
Maintenance
Administration
Resource Pooling
Data Redundancy
Bandwidth
Scalability
Redundancy
Maintenance
Administration
Virtualization
Data Security
Resource Isolation
Monitoring
Availability
Multitenancy
Multii-device Access
Administration
Service Delivery and
Deployment Models
Cloud Concepts
Characteristics & Roles
Benefits
Capabilities & Skills
Hosting Options
Cloud Deployment Models
Cloud Service Models
Infrastructure
Architecture
Platform Systems &
Mechanisms
Platform
Architecture
Explore proven best practices
architectures for delivering
elastic and resilient cloud
infrastructure.
In-depth discussion on best
practices architectures for
delivering an elastic and
resilient cloud platform.
Understand key technology
systems capabilities that
enable the delivery of a cloud
platform infrastructure.
Understand characteristics,
roles and benefits. Explore
various models for delivering
and deploying cloud services.
Discussion Topics
Certification Programs
Cloud+
Certified Cloud Architect
Cloud+
Certified Cloud Architect
Cloud Essentials
Cloud+
Certified Cloud Professional
Cloud Essentials
Cloud+
Certified Cloud Professional
Certificate for Cloud Security
Knowledge
Enterprise
Security
Risk
Management
Service
Management
IT
Architecture
Foundation
Technology
6. Roles & Responsibilities
Documentation
Provider Assessment
Mission Critical Systems
System Redundancy
Disaster Recovery Planning
Skills and Tools
Processes, Stages & Goals
Information Security
Documentation
Roles and Responsibilities
Strategy Development
Provider Assessment
Testing & Monitoring
SLA and Contracting
Provider Selection
Compliance & Regulation
Facilities & Equipment
Virtualization
Resiliency
Physical Security
Human Security
Maintenance
Service Delivery
Compute Resources
Provider Viability
Service Contract
Information Management
Monitoring
Cost Management
Pricing Metrics
Service Level Agreements
Business Continuity &
Disaster Recovery
Datacenter
Operations
Change Management &
Incident Response
Understand business
continuity and disaster
recovery planning processes
and capabilities.
Guidelines for incident
response, lifecycle, change,
capacity and configuration
management
Explore key datacenter
operation, maintenance and
secure datacenter design best
practices.
Explore best practices for
assessing provider viability,
defining quality of services and
managing contracts.
Discussion Topics
Certification Programs
Cloud+
Certificate for Cloud Security
Knowledge
Cloud+
Certificate for Cloud Security
Knowledge
Certified Cloud Professional
Certificate for Cloud Security
Knowledge
Cloud Essentials
Cloud+
Certified Cloud Professional
Certificate for Cloud Security
Knowledge
Enterprise
Security
Risk
Management
Service
Management
IT
Architecture
Foundation
Technology
7. Benefits
Application
Platform
Infrastructure
Security
APIs
Migration
Network
Availability & Performance
Security
Compliance
Configuration
Cloud Considerations
Documentation
Implementation
Data & Cloud
Provider Assessment
Contract Structure
Roles & Responsibilities
Regulation
Enforcement
Governance & Enterprise
Risk Management
Facets of Risk
Management Framework
3rd Party Provider
IT & Physical Infrastructure
Compliance & Legal
Cloud Business Model
Information Security
Interoperability and
Portability
Legal, Compliance and
Audit Management
Testing and
Troubleshooting
Define the need for
interoperability and
portability, and best practices
for avoiding vendor lock-in.
Explore strategies for testing
in a cloud environment, and
best practices for ensuring
the cloud is fit for purpose.
Explore compliance, audit,
regulation, data management
and provider contracting best
practices.
Understand risks in the cloud,
define compromise risks,
vulnerabilities and risk
management practices.
Discussion Topics
Certification Programs
Certificate for Cloud Security
Knowledge
Cloud+
Certificate for Cloud Security
Knowledge
Certificate for Cloud Security
Knowledge
Enterprise
Security
Risk
Management
Service
Management
IT
Architecture
Foundation
Technology
8. Authentication &
Authorization Management
Hardening Best Practices
Large Scale Systems
Provisioning Automation
Provider Selection
Application Security
Multi-tenancy
Responsibilities & Liabilities
Personnel On-boarding
Policies and Procedures
Contract Negotiation
IT and Physical Controls
Audit and Compliance
Data Management
Security as a Service
Operational Practices
Encryption Alternatives
Key Management & Storage
Encryption as a Service
Hardware Encryption
Data Loss Prevention
Intrusion Prevention
Audit and Compliance
Identity, Entitlement and
Access Management
Identity Federation
Governance
Application Design
Building Trust
Management & Administration
Cloud Business Model
Entitlement Process
Secure Platform
Management
Encryption and Key
Management
Secure IT
Operations
Explore best practices for
securing cloud infrastructure
components, platform
services and applications.
Understand key roles,
responsibilities and liabilities,
and best practices for building
trust.
Understand data protection
compliance requirements and
guidelines for encryption and
key management.
Understand Identity,
Entitlement and Access
Management (IdEA) patterns
and best practice.
Discussion Topics
Certification Programs
Certificate for Cloud Security
Knowledge
Certificate for Cloud Security
Knowledge
Certificate for Cloud Security
Knowledge
Certificate for Cloud Security
Knowledge
Enterprise
Security
Risk
Management
Service
Management
IT
Architecture
Foundation
Technology
9. Founder, Tech Equity Ltd & CloudClinique.com
Africa Cloud Credentials Council Ambassador
IBM Europe Cloud Technical Sales Leader (2012/13)
Certified Cloud Trainer
Certified Cloud Architect
Certified Cloud Professional
PhD Computational Modeling
MSc. Computational Modeling and Finite Elements in
Engineering Mechanics
BEng. Structural Engineering with Architecture
Lead Consultant & Trainer
Dr Shiyghan Emmanuel Navti
http://vizualize.me/shiyghan
IBM Africa Expansion Strategy Leader (2009/10/11)
10. Enterprise IT Workshop
at Mozambique Stock
Exchange, Nov 2014!
CEO Remarks “…I would like to express that the training achieved the
objectives and we hope we can continue in contact…”
11. 1. Security risk perceptions
2. Limited skill and understanding
3. Weak legal & regulatory framework
4. Incompatibility with current infrastructure
5. Risk of vendor lock-in
6. Data access concerns
7. Inability to quantify value
8. Fear of change
9. Cost concerns
10. Technology complexity
Partner with Tech Equity to overcome Enterprise Technology adoption
concerns that limit opportunity
12. Tech Equity is committed to supporting Enterprise IT adoption in Africa