SlideShare a Scribd company logo
1 of 48
CERTIFIED IN CLOUD TECHNOLOGY
ASSOCIATE
DATE : 11th JUNE 2021 (DAY 1)
TRAINER : MR LEO LOURDES
Our Experience
If you’re an EIS contributor & a retrenched of recent times.
Use PERKESO’s funds to upskill & certify yourself to get back out there!
Details:
1. Retrenched with retrenchment letter
2. Train yourself in 1 certification program worth up to RM6,000
Other Benefits by PERKESO
1. Allowance (anywhere between 3 - 6 months) during retrenchment period
2. Career Counselling
3. Placement Programs
• PRINCE2 Foundation
• PRINCE2 Practitioner
• PRINCE2 Agile Practitioner
• ITIL Foundation
• COBIT5 Foundation
• Certification in Artificial Intelligence (Foundation & Intermediate)
• Agile Scrum Master
• Big Data
• Security Essentials
• Cloud Technology Associate
• DevOps Foundation & many more...
Trainer Profile
LEO LOURDES
(MBA IT Management, BoM Hons. HRM)
Implementer of ISO 20000-1:2011
Certified in COBIT® 5
Certified in ISO 9001 Auditor (PECB)
Certified in PRINCE2® in Project Management
Certified in ITIL® Practitioner
Certified in ITIL® Intermediate Certificate in IT Service Operation
Certified in ITIL Information Security based on ISO/IEC 27002
Certified in ITIL for Cloud Computing
Certified in ITIL IT Service Management
Certified in Coaching and Calibration Skills for Call Center
Certified in Delivering Learning / Teaching by City & Guilds, United Kingdom
leo@thinkleosolutions.com
+6016-349 1793
Experience:
Management Representative (MR) ISO 20000-1: 2011
IT Service Management (Incident, Problem, Change) Manager
Security, Compliance & Risk Management
Senior CRM Delivery Analyst
Certified Trainer
Certified IT Auditor & Consultant
Prospect
1. What is expectation of this course certified, gain
knowledge/expertise
2. Why are you taking this program to get a job related to cloud
support
3. What are the 3 things you want to take away from this program
knowledge, know how about cloud support and move forward
with career
1. The Principles of Cloud
Computing
1.1 The Concept of Cloud
Computing
Overview of the Concept of Cloud
Computing
1.1.1 Five Characteristics
• On-demand self-service
• Resource pooling (multi-tenancy)
• Rapid elasticity (flexibility, scalability)
• Measured service (pay-per-use)
• Broad network access ("any time, any place, any
device”)
Cloud Computing:
Some examples
• For everyone:
• Facebook, twitter (social media)
• Wiki’s
• Online games
• Hotmail (webmail)
• Dropbox
• For business:
• CRM
• Backup services
• ERP
• Financial
• Etc…
1.1.2 Four Deployment models
Public, Private, Community and Hybrid Clouds
Private Cloud: just another name for a data
center?
• resides on a private network that runs on (part of) a
data center that is exclusively used by one
organization;
• owned, managed and run by either the organization
itself, a third party or a combination of the two;
• supports the organization’s business objectives in an
economic sound way;
• high security (compliance with legislation and
regulations).
Public Cloud
• Delivery of off-site services over the internet
• Sharing of resources; ‘multi-tenancy’ means a lower
level of security and privacy
• Aimed at a wide audience
• Compelling services like email and social media
• Enables social networking and collaboration
Community Cloud
• A type of shared private cloud
• Delivers services to a specific group of organizations and/or
individuals that share a common goal
• Sharing of data, platforms and applications
• Sharing of capital expenditure for otherwise (too) expensive
facilities
• 24/7 access and support
• Shared service and support contracts
• Economics of scale
Examples: regional or national educational or research institutes,
community centers, etc.
Hybrid Cloud
• A mix of the above models; combining several Private
and Public Cloud solutions from several providers into
one (virtual) IT infrastructure
• Choosing specific services for either Private or Public
Cloud suitability is balancing:
• security
• privacy
• compliance versus price
1.1.3 Cloud Service Models
• Software as a Service (SaaS)
• The customer does not need to worry about the
development and management of applications.
• Platform as a Service (PaaS)
• Not owning a computer platform, but being able to use it
‘on demand’ can save costs in ownership, management and
maintenance.
• Infrastructure as a Service (IaaS)
• Rental of physical or virtual hardware like storage, servers
or internet connectivity.
SaaS
• Key characteristics:
• Software hosted offsite
• Software on demand
• Software package
• No modification of the software
• Plug-in software: external software used with internal
applications (Hybrid Cloud)
• Vendor with advanced technical knowledge
• User entangled with vendor
• Examples: CRM, ERP, Billing and invoicing, Web
Hosting, Etc.
PaaS
• Key characteristics:
• Mostly used for remote application development
• Remote application support
• Platform may have special features
• Low development costs
• Variants
• Environment for software development
• Hosting environment for applications
• Online storage
IaaS
• The background of IaaS can be found in the merger
between IT and Telecom infrastructure and services in the
past decade
• Key characteristics:
• Dynamic scaling
• Desktop virtualization
• Policy-based services
• Examples of IaaS are hosting services supporting e-
commerce, web hosting services that include broadband
connections and storage.
1.2 The evolution toward
Cloud Computing
Overview of the Evolution of Cloud
Computing
1.2.1Historictimeline
• Contributing factors to the existence of the Cloud
• The development of the Internet
• The move from Mainframe computing to the present day
myriad of personal devices with connection to the Internet.
• The development of computer networks
• Time-line
• Mainframe computers and terminals
• Decentralized mini computers with terminals
• Micro computers (PC) connected to a LAN with terminal
emulation
• Client-server architecture
• Any device connected to the internet
Minicomputers
• Easier to purchase
• Smaller
• Cheaper
• First specialized, later multi-
tasking
• Development of LAN
From Microcomputer to PC
• Smaller, smaller, smaller
• Single user > multi user
• Limited memory and storage
> limitless
• Elementary operating
system > multi OS
Local Area Networking
1.2.2 Network and Servers
• Service forms
• Dial up with modem
• Dedicated leased-line
• Uses
• Dedicated terminal
• Access to time sharing
services
• Special services on
intelligent devices:
• Terminal server (remote
access)
• Batch processing (job
entry)
1.2.3 The role of the Internet
• Initial vision: Intergalactic Computer Network
(Licklider, 1963)
• ARPANET (Advanced Research Projects Agency
Network, owned by the US Department of Defense,
1998)
• One protocol: the TCP/IP protocol (1983)
• One global and public network
• Internet services: www, ftp, smtp, http, …
1.2.4 Virtualization
Not NEW!
• Exists since the 1970s in mainframe environments
Example: 1972 IBM VM/370
• Concept of the Cloud: virtualized operating
environment & thin clients; Web-based delivery
• Virtualization is the solution for integration of:
• Internet
• Storage
• Processing power
• Key Features are:
• Multiplies the use of high performance computers
• Puts extra/excess capacity to use
• Multi-tenancy
Six types of virtualization
• Access virtualization (access from any device)
• Application virtualization (platform and operating
system independent)
• Processing virtualization (one system becomes many)
• Network virtualization (enables artificial views of the
network)
• Storage virtualization (enables sharing, concealing,
etc.)
1.2.5 Managed Services in the Cloud
• Advantages:
• Accessibility everywhere
• Shift of focus from IT to core business
• No need for highly trained IT staff
• Key Issues:
• Performance
• Compliance
• Contingency
1.3 Cloud Computing
Architectures
Overview of Cloud Computing
Architectures
1.3.1 Multipurpose Architecture
• Key Characteristics
- Virtualization
- Multi-tiered
- Interoperable layers
- Open standards
Server Virtualization Architectures
• Virtualization as the Operating System
• Virtualization with a host Operating System
Virtualization as the ‘Operating
System’
Hardware
Hypervisor
Virtual Operating Environment
Guest Operating
System
Application
Programs
Guest Operating
System
Application
Programs
Guest Operating
System
Application
Programs
In this type of virtualization the
hypervisor is the separating layer
between guest operating systems and
the hardware.
Virtualization with a Host Operating
System
In this type of virtualization a host operating system is
used as the first tier of access control.
Host Operating System
Hypervisor
Virtualization Layer
Guest Operating
System
Application
Programs
Guest Operating
System
Application
Programs
Guest Operating
System
Application
Programs
Hardware
Tiered Architecture
Multi-tenancy Architecture
• Rationale:
• ‘a large number of users, basically multi-tenants, makes the
cloud platform most efficient in terms of usability of the
application and ‘Do More With Less Resources’. (Rajan,
2011)
• Key element (&issue) is Security
• Security needs to be ensured at all levels of the
infrastructure
• Examples:
• Salesforce.com: a SaaS-based CRM application for various
businesses using common framework and multi-tenancy
model
• Microsoft Dynamics CRM Online offering
• Multi-tenancy IaaS/PaaS offerings from Amazon or IBM or
Microsoft Azure
1.3.2 Service Oriented Architectures
• Service-Oriented Architecture (SOA)
• an architectural style that supports service orientation.
• Service orientation
• a way of thinking in terms of services and service-based
development and the outcomes of services.
• Service
• a logical representation of a repeatable business activity
that has a specified outcome (e.g., check customer credit,
provide weather data, consolidate drilling reports);
• self-contained;
• May be composed of other services;
• a “black box” to consumers of the service.
Source: Cloud working group, The Open Group.
Cloud and SOA
• Question: (Paul Krill)
• ‘Can we build a datacenter infrastructure on SOA
principles?’
• Answer: (Gerry Cuomo)
• ‘Yes, and that's the cloud, so it's a service-oriented
infrastructure,… It's taking that architectural principle of
SOA and applying it to an infrastructure.’
‘The cloud-SOA connection’ (Krill, 2009)
• A service-oriented architecture is basically a collection
of services that communicate with each other.
• Connecting these services in many cases involves Web
services using XML
No Cloud without SOA!
Service Oriented Architecture
Criteria
• In order to implement SOA, the architecture must meet the
following criteria:
• Services that are able to communicate with each other
• A well understood interface
• A message-oriented communication process
1.4 Benefits and limitations of
Cloud Computing
Overview of the Drivers &
Limitations
1.4.1 Main benefits of Cloud
Computing
• Reduced Cost (the pay-per-use, economics of scale)
• Automated (updates, security patches, backups,…)
• On demand (Flexibility + Scalability = Elasticity)
• More Mobility (accessible from any web enabled
device)
• Shared Resources (multi-tenancy)
• Back to core business
• More for less
1.4.2 Cloud Computing Limitations
• Internet access (no internet = no Cloud)
• Security (how do you know?)
• Privacy (what legislation or regulations?)
• Vendor lock-in (staying with a provider to avoid the hassle
of moving to another)
Plus or Minus
• Service Level Agreement
• Do the clauses support your business?
• If so it is a plus!
(customer responsibility; it takes two to tango!)
END

More Related Content

What's hot

Design Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security GuidelinesDesign Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security GuidelinesInductive Automation
 
Earth linkit servicesoverview
Earth linkit servicesoverviewEarth linkit servicesoverview
Earth linkit servicesoverviewscomoore
 
Using ibm mq in managed file transfer environments final
Using ibm mq in managed file transfer environments finalUsing ibm mq in managed file transfer environments final
Using ibm mq in managed file transfer environments finalLeif Davidsen
 
CNIT 123: Ch 13: Network Protection Systems
CNIT 123: Ch 13: Network Protection SystemsCNIT 123: Ch 13: Network Protection Systems
CNIT 123: Ch 13: Network Protection SystemsSam Bowne
 
501 ch 4 securing your network
501 ch 4 securing your network501 ch 4 securing your network
501 ch 4 securing your networkgocybersec
 
Building a Reliable Remote Communication Device with Java ME8 [CON2285]
Building a Reliable Remote Communication Device with Java ME8 [CON2285]Building a Reliable Remote Communication Device with Java ME8 [CON2285]
Building a Reliable Remote Communication Device with Java ME8 [CON2285]Leonardo De Moura Rocha Lima
 
CISSP Prep: Ch 5. Communication and Network Security (Part 2)
CISSP Prep: Ch 5. Communication and Network Security (Part 2)CISSP Prep: Ch 5. Communication and Network Security (Part 2)
CISSP Prep: Ch 5. Communication and Network Security (Part 2)Sam Bowne
 
gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2Anne Starr
 
501 ch 5 securing hosts and data
501 ch 5 securing hosts and data501 ch 5 securing hosts and data
501 ch 5 securing hosts and datagocybersec
 
Bright and Gray areas of Clound Computing
Bright and Gray areas of Clound ComputingBright and Gray areas of Clound Computing
Bright and Gray areas of Clound Computingpallavikhandekar212
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information TransparencyUsman Arshad
 
Industrial Internet
Industrial InternetIndustrial Internet
Industrial InternetAlex Lavell
 
Cloud Computing Virtualization and containers
Cloud Computing Virtualization and containersCloud Computing Virtualization and containers
Cloud Computing Virtualization and containersSelvaraj Kesavan
 
Secure Your AWS Cloud Data by Porticor
Secure Your AWS Cloud Data by PorticorSecure Your AWS Cloud Data by Porticor
Secure Your AWS Cloud Data by PorticorNewvewm
 
FixNix vCISO CyberSecurity Network Security for Covid91
FixNix vCISO CyberSecurity Network Security for Covid91FixNix vCISO CyberSecurity Network Security for Covid91
FixNix vCISO CyberSecurity Network Security for Covid91Shanmugavel Sankaran
 
Track 5 session 2 - st dev con 2016 - security iot best practices
Track 5   session 2 - st dev con 2016 - security iot best practicesTrack 5   session 2 - st dev con 2016 - security iot best practices
Track 5 session 2 - st dev con 2016 - security iot best practicesST_World
 

What's hot (19)

Design Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security GuidelinesDesign Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security Guidelines
 
Earth linkit servicesoverview
Earth linkit servicesoverviewEarth linkit servicesoverview
Earth linkit servicesoverview
 
Using ibm mq in managed file transfer environments final
Using ibm mq in managed file transfer environments finalUsing ibm mq in managed file transfer environments final
Using ibm mq in managed file transfer environments final
 
CNIT 123: Ch 13: Network Protection Systems
CNIT 123: Ch 13: Network Protection SystemsCNIT 123: Ch 13: Network Protection Systems
CNIT 123: Ch 13: Network Protection Systems
 
501 ch 4 securing your network
501 ch 4 securing your network501 ch 4 securing your network
501 ch 4 securing your network
 
Building a Reliable Remote Communication Device with Java ME8 [CON2285]
Building a Reliable Remote Communication Device with Java ME8 [CON2285]Building a Reliable Remote Communication Device with Java ME8 [CON2285]
Building a Reliable Remote Communication Device with Java ME8 [CON2285]
 
CISSP Prep: Ch 5. Communication and Network Security (Part 2)
CISSP Prep: Ch 5. Communication and Network Security (Part 2)CISSP Prep: Ch 5. Communication and Network Security (Part 2)
CISSP Prep: Ch 5. Communication and Network Security (Part 2)
 
gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2
 
SHIP Brochure
SHIP BrochureSHIP Brochure
SHIP Brochure
 
501 ch 5 securing hosts and data
501 ch 5 securing hosts and data501 ch 5 securing hosts and data
501 ch 5 securing hosts and data
 
Et software brochure
Et software brochureEt software brochure
Et software brochure
 
Bright and Gray areas of Clound Computing
Bright and Gray areas of Clound ComputingBright and Gray areas of Clound Computing
Bright and Gray areas of Clound Computing
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information Transparency
 
Industrial Internet
Industrial InternetIndustrial Internet
Industrial Internet
 
Cloud Computing Virtualization and containers
Cloud Computing Virtualization and containersCloud Computing Virtualization and containers
Cloud Computing Virtualization and containers
 
Is it an internal affair
Is it an internal affairIs it an internal affair
Is it an internal affair
 
Secure Your AWS Cloud Data by Porticor
Secure Your AWS Cloud Data by PorticorSecure Your AWS Cloud Data by Porticor
Secure Your AWS Cloud Data by Porticor
 
FixNix vCISO CyberSecurity Network Security for Covid91
FixNix vCISO CyberSecurity Network Security for Covid91FixNix vCISO CyberSecurity Network Security for Covid91
FixNix vCISO CyberSecurity Network Security for Covid91
 
Track 5 session 2 - st dev con 2016 - security iot best practices
Track 5   session 2 - st dev con 2016 - security iot best practicesTrack 5   session 2 - st dev con 2016 - security iot best practices
Track 5 session 2 - st dev con 2016 - security iot best practices
 

Similar to gkkCloudtechnologyassociate(cta)day 1

Cloudtechnologyassociatepart 1
Cloudtechnologyassociatepart 1Cloudtechnologyassociatepart 1
Cloudtechnologyassociatepart 1Anne Starr
 
Cloudhnologysstecociat
CloudhnologysstecociatCloudhnologysstecociat
CloudhnologysstecociatAnne Starr
 
Concept of Cloud Computing
Concept of Cloud ComputingConcept of Cloud Computing
Concept of Cloud ComputingAnne Starr
 
Mahika cloud services
Mahika cloud servicesMahika cloud services
Mahika cloud servicesSomnath Sen
 
dtechnClouologyassociatepart2
dtechnClouologyassociatepart2dtechnClouologyassociatepart2
dtechnClouologyassociatepart2Anne Starr
 
Introduction of cloud computing
Introduction of cloud computingIntroduction of cloud computing
Introduction of cloud computingSuman Sharma
 
A Complete Guide Cloud Computing
A Complete Guide Cloud ComputingA Complete Guide Cloud Computing
A Complete Guide Cloud ComputingSripati Mahapatra
 
VTU Open Elective 6th Sem CSE - Module 2 - Cloud Computing
VTU Open Elective 6th Sem CSE - Module 2 - Cloud ComputingVTU Open Elective 6th Sem CSE - Module 2 - Cloud Computing
VTU Open Elective 6th Sem CSE - Module 2 - Cloud ComputingSachin Gowda
 
Serverless microservices
Serverless microservicesServerless microservices
Serverless microservicesLalit Kale
 
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and AuditSukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and AuditSukumar Nayak
 
Gitex journey to the cloud
Gitex journey to the cloudGitex journey to the cloud
Gitex journey to the cloudJorge Sebastiao
 
Unit-I Introduction to Cloud Computing.pptx
Unit-I Introduction to Cloud Computing.pptxUnit-I Introduction to Cloud Computing.pptx
Unit-I Introduction to Cloud Computing.pptxgarkhot123
 
Virtualization and cloud computing
Virtualization and cloud computingVirtualization and cloud computing
Virtualization and cloud computingDeep Gupta
 
在小學有效運用雲端電腦以促進電子學習(第一節筆記)
在小學有效運用雲端電腦以促進電子學習(第一節筆記)在小學有效運用雲端電腦以促進電子學習(第一節筆記)
在小學有效運用雲端電腦以促進電子學習(第一節筆記)Tsz Wing Chu
 
OIT552 Cloud Computing Material
OIT552 Cloud Computing MaterialOIT552 Cloud Computing Material
OIT552 Cloud Computing Materialpkaviya
 

Similar to gkkCloudtechnologyassociate(cta)day 1 (20)

Cloudtechnologyassociatepart 1
Cloudtechnologyassociatepart 1Cloudtechnologyassociatepart 1
Cloudtechnologyassociatepart 1
 
Cloudhnologysstecociat
CloudhnologysstecociatCloudhnologysstecociat
Cloudhnologysstecociat
 
Concept of Cloud Computing
Concept of Cloud ComputingConcept of Cloud Computing
Concept of Cloud Computing
 
Mahika cloud services
Mahika cloud servicesMahika cloud services
Mahika cloud services
 
dtechnClouologyassociatepart2
dtechnClouologyassociatepart2dtechnClouologyassociatepart2
dtechnClouologyassociatepart2
 
Introduction of cloud computing
Introduction of cloud computingIntroduction of cloud computing
Introduction of cloud computing
 
A Complete Guide Cloud Computing
A Complete Guide Cloud ComputingA Complete Guide Cloud Computing
A Complete Guide Cloud Computing
 
VTU Open Elective 6th Sem CSE - Module 2 - Cloud Computing
VTU Open Elective 6th Sem CSE - Module 2 - Cloud ComputingVTU Open Elective 6th Sem CSE - Module 2 - Cloud Computing
VTU Open Elective 6th Sem CSE - Module 2 - Cloud Computing
 
Serverless microservices
Serverless microservicesServerless microservices
Serverless microservices
 
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and AuditSukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
 
Gitex journey to the cloud
Gitex journey to the cloudGitex journey to the cloud
Gitex journey to the cloud
 
Unit-I Introduction to Cloud Computing.pptx
Unit-I Introduction to Cloud Computing.pptxUnit-I Introduction to Cloud Computing.pptx
Unit-I Introduction to Cloud Computing.pptx
 
cloud_ch1.pptx
cloud_ch1.pptxcloud_ch1.pptx
cloud_ch1.pptx
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Virtualization and cloud computing
Virtualization and cloud computingVirtualization and cloud computing
Virtualization and cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
在小學有效運用雲端電腦以促進電子學習(第一節筆記)
在小學有效運用雲端電腦以促進電子學習(第一節筆記)在小學有效運用雲端電腦以促進電子學習(第一節筆記)
在小學有效運用雲端電腦以促進電子學習(第一節筆記)
 
OIT552 Cloud Computing Material
OIT552 Cloud Computing MaterialOIT552 Cloud Computing Material
OIT552 Cloud Computing Material
 
cloudcomputing.pptx
cloudcomputing.pptxcloudcomputing.pptx
cloudcomputing.pptx
 

More from Anne Starr

I01letor20so201leutor2020
I01letor20so201leutor2020I01letor20so201leutor2020
I01letor20so201leutor2020Anne Starr
 
Iso27001leadauditor2020
Iso27001leadauditor2020Iso27001leadauditor2020
Iso27001leadauditor2020Anne Starr
 
Dncybersecurity
DncybersecurityDncybersecurity
DncybersecurityAnne Starr
 
Dancyrityshy 1foundatioieh
Dancyrityshy 1foundatioiehDancyrityshy 1foundatioieh
Dancyrityshy 1foundatioiehAnne Starr
 
2 slides(2ndvariadaystion)
2 slides(2ndvariadaystion)2 slides(2ndvariadaystion)
2 slides(2ndvariadaystion)Anne Starr
 
Awtitioneressentialsdeckscloudprac401-577
Awtitioneressentialsdeckscloudprac401-577Awtitioneressentialsdeckscloudprac401-577
Awtitioneressentialsdeckscloudprac401-577Anne Starr
 
01wslouAsentialsdeck2dpractitioneres-400
01wslouAsentialsdeck2dpractitioneres-40001wslouAsentialsdeck2dpractitioneres-400
01wslouAsentialsdeck2dpractitioneres-400Anne Starr
 
uderessAwscloentialsdeck1-2ion00
uderessAwscloentialsdeck1-2ion00uderessAwscloentialsdeck1-2ion00
uderessAwscloentialsdeck1-2ion00Anne Starr
 
Cmbysantocsddsh
CmbysantocsddshCmbysantocsddsh
CmbysantocsddshAnne Starr
 
Cddmbysantcsosh
CddmbysantcsoshCddmbysantcsosh
CddmbysantcsoshAnne Starr
 
Ccbysantsddosh
Ccbysantsddosh  Ccbysantsddosh
Ccbysantsddosh Anne Starr
 
Ccsdbyhday1santodms
Ccsdbyhday1santodmsCcsdbyhday1santodms
Ccsdbyhday1santodmsAnne Starr
 

More from Anne Starr (20)

I01letor20so201leutor2020
I01letor20so201leutor2020I01letor20so201leutor2020
I01letor20so201leutor2020
 
Iso27001leadauditor2020
Iso27001leadauditor2020Iso27001leadauditor2020
Iso27001leadauditor2020
 
Ccsddm5days
Ccsddm5daysCcsddm5days
Ccsddm5days
 
Dayblic
DayblicDayblic
Dayblic
 
Day1cspbeblic
Day1cspbeblicDay1cspbeblic
Day1cspbeblic
 
Dncybersecurity
DncybersecurityDncybersecurity
Dncybersecurity
 
Dancyrityshy 1foundatioieh
Dancyrityshy 1foundatioiehDancyrityshy 1foundatioieh
Dancyrityshy 1foundatioieh
 
2 slides(2ndvariadaystion)
2 slides(2ndvariadaystion)2 slides(2ndvariadaystion)
2 slides(2ndvariadaystion)
 
Sec4
Sec4Sec4
Sec4
 
Secuntialesse
SecuntialesseSecuntialesse
Secuntialesse
 
Securityic2
Securityic2Securityic2
Securityic2
 
)k
)k)k
)k
 
inte
inteinte
inte
 
Awtitioneressentialsdeckscloudprac401-577
Awtitioneressentialsdeckscloudprac401-577Awtitioneressentialsdeckscloudprac401-577
Awtitioneressentialsdeckscloudprac401-577
 
01wslouAsentialsdeck2dpractitioneres-400
01wslouAsentialsdeck2dpractitioneres-40001wslouAsentialsdeck2dpractitioneres-400
01wslouAsentialsdeck2dpractitioneres-400
 
uderessAwscloentialsdeck1-2ion00
uderessAwscloentialsdeck1-2ion00uderessAwscloentialsdeck1-2ion00
uderessAwscloentialsdeck1-2ion00
 
Cmbysantocsddsh
CmbysantocsddshCmbysantocsddsh
Cmbysantocsddsh
 
Cddmbysantcsosh
CddmbysantcsoshCddmbysantcsosh
Cddmbysantcsosh
 
Ccbysantsddosh
Ccbysantsddosh  Ccbysantsddosh
Ccbysantsddosh
 
Ccsdbyhday1santodms
Ccsdbyhday1santodmsCcsdbyhday1santodms
Ccsdbyhday1santodms
 

Recently uploaded

Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxnelietumpap1
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 

Recently uploaded (20)

Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 

gkkCloudtechnologyassociate(cta)day 1

  • 1. CERTIFIED IN CLOUD TECHNOLOGY ASSOCIATE DATE : 11th JUNE 2021 (DAY 1) TRAINER : MR LEO LOURDES
  • 3. If you’re an EIS contributor & a retrenched of recent times. Use PERKESO’s funds to upskill & certify yourself to get back out there! Details: 1. Retrenched with retrenchment letter 2. Train yourself in 1 certification program worth up to RM6,000 Other Benefits by PERKESO 1. Allowance (anywhere between 3 - 6 months) during retrenchment period 2. Career Counselling 3. Placement Programs • PRINCE2 Foundation • PRINCE2 Practitioner • PRINCE2 Agile Practitioner • ITIL Foundation • COBIT5 Foundation • Certification in Artificial Intelligence (Foundation & Intermediate) • Agile Scrum Master • Big Data • Security Essentials • Cloud Technology Associate • DevOps Foundation & many more...
  • 4. Trainer Profile LEO LOURDES (MBA IT Management, BoM Hons. HRM) Implementer of ISO 20000-1:2011 Certified in COBIT® 5 Certified in ISO 9001 Auditor (PECB) Certified in PRINCE2® in Project Management Certified in ITIL® Practitioner Certified in ITIL® Intermediate Certificate in IT Service Operation Certified in ITIL Information Security based on ISO/IEC 27002 Certified in ITIL for Cloud Computing Certified in ITIL IT Service Management Certified in Coaching and Calibration Skills for Call Center Certified in Delivering Learning / Teaching by City & Guilds, United Kingdom leo@thinkleosolutions.com +6016-349 1793 Experience: Management Representative (MR) ISO 20000-1: 2011 IT Service Management (Incident, Problem, Change) Manager Security, Compliance & Risk Management Senior CRM Delivery Analyst Certified Trainer Certified IT Auditor & Consultant
  • 5. Prospect 1. What is expectation of this course certified, gain knowledge/expertise 2. Why are you taking this program to get a job related to cloud support 3. What are the 3 things you want to take away from this program knowledge, know how about cloud support and move forward with career
  • 6. 1. The Principles of Cloud Computing
  • 7. 1.1 The Concept of Cloud Computing
  • 8. Overview of the Concept of Cloud Computing
  • 9. 1.1.1 Five Characteristics • On-demand self-service • Resource pooling (multi-tenancy) • Rapid elasticity (flexibility, scalability) • Measured service (pay-per-use) • Broad network access ("any time, any place, any device”)
  • 10. Cloud Computing: Some examples • For everyone: • Facebook, twitter (social media) • Wiki’s • Online games • Hotmail (webmail) • Dropbox • For business: • CRM • Backup services • ERP • Financial • Etc…
  • 11. 1.1.2 Four Deployment models Public, Private, Community and Hybrid Clouds
  • 12. Private Cloud: just another name for a data center? • resides on a private network that runs on (part of) a data center that is exclusively used by one organization; • owned, managed and run by either the organization itself, a third party or a combination of the two; • supports the organization’s business objectives in an economic sound way; • high security (compliance with legislation and regulations).
  • 13. Public Cloud • Delivery of off-site services over the internet • Sharing of resources; ‘multi-tenancy’ means a lower level of security and privacy • Aimed at a wide audience • Compelling services like email and social media • Enables social networking and collaboration
  • 14. Community Cloud • A type of shared private cloud • Delivers services to a specific group of organizations and/or individuals that share a common goal • Sharing of data, platforms and applications • Sharing of capital expenditure for otherwise (too) expensive facilities • 24/7 access and support • Shared service and support contracts • Economics of scale Examples: regional or national educational or research institutes, community centers, etc.
  • 15. Hybrid Cloud • A mix of the above models; combining several Private and Public Cloud solutions from several providers into one (virtual) IT infrastructure • Choosing specific services for either Private or Public Cloud suitability is balancing: • security • privacy • compliance versus price
  • 16. 1.1.3 Cloud Service Models • Software as a Service (SaaS) • The customer does not need to worry about the development and management of applications. • Platform as a Service (PaaS) • Not owning a computer platform, but being able to use it ‘on demand’ can save costs in ownership, management and maintenance. • Infrastructure as a Service (IaaS) • Rental of physical or virtual hardware like storage, servers or internet connectivity.
  • 17. SaaS • Key characteristics: • Software hosted offsite • Software on demand • Software package • No modification of the software • Plug-in software: external software used with internal applications (Hybrid Cloud) • Vendor with advanced technical knowledge • User entangled with vendor • Examples: CRM, ERP, Billing and invoicing, Web Hosting, Etc.
  • 18. PaaS • Key characteristics: • Mostly used for remote application development • Remote application support • Platform may have special features • Low development costs • Variants • Environment for software development • Hosting environment for applications • Online storage
  • 19. IaaS • The background of IaaS can be found in the merger between IT and Telecom infrastructure and services in the past decade • Key characteristics: • Dynamic scaling • Desktop virtualization • Policy-based services • Examples of IaaS are hosting services supporting e- commerce, web hosting services that include broadband connections and storage.
  • 20. 1.2 The evolution toward Cloud Computing
  • 21. Overview of the Evolution of Cloud Computing
  • 22. 1.2.1Historictimeline • Contributing factors to the existence of the Cloud • The development of the Internet • The move from Mainframe computing to the present day myriad of personal devices with connection to the Internet. • The development of computer networks • Time-line • Mainframe computers and terminals • Decentralized mini computers with terminals • Micro computers (PC) connected to a LAN with terminal emulation • Client-server architecture • Any device connected to the internet
  • 23. Minicomputers • Easier to purchase • Smaller • Cheaper • First specialized, later multi- tasking • Development of LAN
  • 24. From Microcomputer to PC • Smaller, smaller, smaller • Single user > multi user • Limited memory and storage > limitless • Elementary operating system > multi OS
  • 26. 1.2.2 Network and Servers • Service forms • Dial up with modem • Dedicated leased-line • Uses • Dedicated terminal • Access to time sharing services • Special services on intelligent devices: • Terminal server (remote access) • Batch processing (job entry)
  • 27. 1.2.3 The role of the Internet • Initial vision: Intergalactic Computer Network (Licklider, 1963) • ARPANET (Advanced Research Projects Agency Network, owned by the US Department of Defense, 1998) • One protocol: the TCP/IP protocol (1983) • One global and public network • Internet services: www, ftp, smtp, http, …
  • 28. 1.2.4 Virtualization Not NEW! • Exists since the 1970s in mainframe environments Example: 1972 IBM VM/370
  • 29. • Concept of the Cloud: virtualized operating environment & thin clients; Web-based delivery • Virtualization is the solution for integration of: • Internet • Storage • Processing power • Key Features are: • Multiplies the use of high performance computers • Puts extra/excess capacity to use • Multi-tenancy
  • 30. Six types of virtualization • Access virtualization (access from any device) • Application virtualization (platform and operating system independent) • Processing virtualization (one system becomes many) • Network virtualization (enables artificial views of the network) • Storage virtualization (enables sharing, concealing, etc.)
  • 31. 1.2.5 Managed Services in the Cloud
  • 32. • Advantages: • Accessibility everywhere • Shift of focus from IT to core business • No need for highly trained IT staff • Key Issues: • Performance • Compliance • Contingency
  • 34. Overview of Cloud Computing Architectures
  • 35. 1.3.1 Multipurpose Architecture • Key Characteristics - Virtualization - Multi-tiered - Interoperable layers - Open standards
  • 36. Server Virtualization Architectures • Virtualization as the Operating System • Virtualization with a host Operating System
  • 37. Virtualization as the ‘Operating System’ Hardware Hypervisor Virtual Operating Environment Guest Operating System Application Programs Guest Operating System Application Programs Guest Operating System Application Programs In this type of virtualization the hypervisor is the separating layer between guest operating systems and the hardware.
  • 38. Virtualization with a Host Operating System In this type of virtualization a host operating system is used as the first tier of access control. Host Operating System Hypervisor Virtualization Layer Guest Operating System Application Programs Guest Operating System Application Programs Guest Operating System Application Programs Hardware
  • 40. Multi-tenancy Architecture • Rationale: • ‘a large number of users, basically multi-tenants, makes the cloud platform most efficient in terms of usability of the application and ‘Do More With Less Resources’. (Rajan, 2011) • Key element (&issue) is Security • Security needs to be ensured at all levels of the infrastructure • Examples: • Salesforce.com: a SaaS-based CRM application for various businesses using common framework and multi-tenancy model • Microsoft Dynamics CRM Online offering • Multi-tenancy IaaS/PaaS offerings from Amazon or IBM or Microsoft Azure
  • 41. 1.3.2 Service Oriented Architectures • Service-Oriented Architecture (SOA) • an architectural style that supports service orientation. • Service orientation • a way of thinking in terms of services and service-based development and the outcomes of services. • Service • a logical representation of a repeatable business activity that has a specified outcome (e.g., check customer credit, provide weather data, consolidate drilling reports); • self-contained; • May be composed of other services; • a “black box” to consumers of the service. Source: Cloud working group, The Open Group.
  • 42. Cloud and SOA • Question: (Paul Krill) • ‘Can we build a datacenter infrastructure on SOA principles?’ • Answer: (Gerry Cuomo) • ‘Yes, and that's the cloud, so it's a service-oriented infrastructure,… It's taking that architectural principle of SOA and applying it to an infrastructure.’ ‘The cloud-SOA connection’ (Krill, 2009) • A service-oriented architecture is basically a collection of services that communicate with each other. • Connecting these services in many cases involves Web services using XML No Cloud without SOA!
  • 43. Service Oriented Architecture Criteria • In order to implement SOA, the architecture must meet the following criteria: • Services that are able to communicate with each other • A well understood interface • A message-oriented communication process
  • 44. 1.4 Benefits and limitations of Cloud Computing
  • 45. Overview of the Drivers & Limitations
  • 46. 1.4.1 Main benefits of Cloud Computing • Reduced Cost (the pay-per-use, economics of scale) • Automated (updates, security patches, backups,…) • On demand (Flexibility + Scalability = Elasticity) • More Mobility (accessible from any web enabled device) • Shared Resources (multi-tenancy) • Back to core business • More for less
  • 47. 1.4.2 Cloud Computing Limitations • Internet access (no internet = no Cloud) • Security (how do you know?) • Privacy (what legislation or regulations?) • Vendor lock-in (staying with a provider to avoid the hassle of moving to another) Plus or Minus • Service Level Agreement • Do the clauses support your business? • If so it is a plus! (customer responsibility; it takes two to tango!)
  • 48. END