Cloud Essentials for Architects using OpenStack Training in Kenosha

Enroll in or hire us to teach our Cloud Essentials for Architects using OpenStack class in Kenosha, Wisconsin by calling us @303.377.6176. Like all HSG classes, Cloud Essentials for Architects using OpenStack may be offered either onsite or via instructor led virtual training. Consider looking at our public training schedule to see if it is scheduled: Public Training Classes
Provided there are enough attendees, Cloud Essentials for Architects using OpenStack may be taught at one of our local training facilities.
We offer private customized training for groups of 3 or more attendees.

Course Description

 
This two day class begins with an examination of the Cloud Computing concept, the structure and key characteristics of Clouds, and takes a look under the hood at how they operate. From there, students are introduced to a Cloud Reference Model and explore various aspects of Cloud solution design from discovery throughout the lifecycle of a Cloud solution all the way to retirement. Special attention is given to requirements and Cloud utilization analysis, Cloud solution design strategies, and deployment scenarios. Upon completion of this course, students will have an understanding of the Cloud Computing environment and practical experience in designing, developing, and deploying Cloud-based solutions. This class consists of 25% hands-on labs in an actual OpenStack Cloud Computing development environment, and 75% lecture and discussion. Students should have some hands-on experience developing software, but the focus of the course is upon architecture and design considerations within the Cloud.
Course Length: 2 Days
Course Tuition: $1090 (US)

Prerequisites

Foundational Knowledge in distributed computing and Web-based architecture

Course Outline

 
Chapter 1. Defining the Cloud
 
A Bit of History
Wikipedia Entry
Cloud Computing at a Glance
Gartner Research on Cloud
Electrical Power Grid Service Analogy
The NIST Perspective
Five Characteristics
On-demand Self-Service (NIST Characteristic)
Broad Network Access (NIST Characteristic)
Resource Pooling (NIST Characteristic)
Rapid Elasticity (NIST Characteristic)
Measured Service (NIST Characteristic)
The Three Cloud Service Models (NIST)
The Cloud Computing Spectrum: IaaS, PaaS and SaaS
The Four Cloud Deployment Models (NIST)
The NIST Cloud Definition Framework
A Hybrid Cloud Diagram
Cloud Deployment Model Dynamics
Summary
 
Chapter 2. The Cloud Enablers
 
The Origin of the Cloud Computing
Virtualization
Hypervisors
Hypervisor Types
Type 1 hypervisors
Type 2 hypervisors
Type 1 vs Type 2 Processing
Paravirtualization
Applying Virtualization to the Cloud
Virtualization Qualities (1/2)
Virtualization Qualities (2/2)
Grid Computing vs Cloud Computing
Myth: Cloud is SaaS
SOA and the Cloud
Summary
 
Chapter 3. Cloud Reference Model
 
The Need for a Cloud Reference Model
Cloud Reference Model
Cloud Infrastructure
Cloud Infrastructure - Virtual Machines
A Bootable OS Image
Defining a "Compute Unit"
Instance Templates (Flavors)
Launching an Instance in OpenStack
Block Storage for Instances
Cloud Infrastructure - Cloud Object Storage
Additional Data Storage Options
Cloud Multi-Tenancy Model
Common Characteristics of Multi-tenant Applications (1/2)
Common Characteristics of Multi-tenant Applications (2/2)
The PaaS Platform
Google App Engine (GAE) PaaS Overview
GAE's Stats
Google Cloud Storage
The SaaS Platform
Cloud Service Model Implementations
Google Compute Engine's Simplified Architecture
Google Cloud Platform
Summary
 
Chapter 4. OpenStack
 
What is OpenStack
OpenStack Main Components/Services
Release History (Since the
Folsom
Release)
Compute (Nova)
Main Compute (Nova) modules/services
Creating OpenStack VM Instances
Image (Glance)
Object Store (Swift)
Components of Swift
Dashboard (Horizon)
Launching a Virtual Instance in Horizon
Block Storage (Cinder)
Identity (Keystone)
Networking (Neutron, formerly Quantum)
OpenStack Networking
Telemetry (Ceilometer)
Orchestration (Heat)
Heat Templates
Pulling It All Together
Building OpenStack Environments
Using Automated Configurators
Managing OpenStack Clouds
Summary
 
Chapter 5. The Cloud Economics
 
Cloud Value Proposition
Coping with Computing Demand the Traditional Way
Coping with Computing Demand the Cloud Way
Cloud economics
You Can Move Your Cloud Apps Closer to Your Clients!
Be Aware of What You Ask For!
Do Clouds Compute?
Total Cost of Ownership (TCO)
Cloud Infrastructure – Vendor Comparison
Select Expected Benefits
You Still Need …
Financial Management and Tracking
Calculate initial, simple return
Calculate Returns for on-going Usage
How to Practically Estimate Your Cloud Bill?
Shop Around (Within the Same Shop)
Discounted Object Storage: Amazon Glacier
Amazon S3 Cost Monitoring
Google Compute Engine Per-Minute Billing
Summary
 
Chapter 6. Cloud Risks and Risk Mitigation
 
Cloud Risks
Failure-As-A-Service in 2009
Service Quality
Malicious Insiders
Shared Technology Vulnerabilities
Data Loss/Leakage
Data Loss / Leakage Causes
Account, Service & Traffic Hijacking
Unknown Risk Profile
Mitigating Cloud Security Risks
Five Mitigation Strategies
Federated ID
Multi-layer Inspection
Centralized Management
Virtual Desktop Protection
Look toward standards
Problem Resolution
Data Back-up
Risks When Supporting Clouds: Provisioning
Liability
Security
Summary
 
Chapter 7. Cloud Security
 
The Heartbleed OpenSSL Bug
A Notable Breach (a Spear-phishing Attack Example)
Cloud Vendor Security Certifications
Google Compute Engine Data Security
Cloud Access Security Features
Security of Cloud Vendor Networks
Insecure Interfaces
Top Threats for Cloud Computing
The Common Cloud Security Concerns
Authorization and Data Access Constraints
Cloud Security Domains
The CIAs of Security
Access Control: Physical Security
Access Control: Authentication & Authorization
Federated Identity Management
Access Control: Auditing
Identity Management
AWS Identity and Access Management Service
Security in the Google Cloud
GAE Cloud Security Module
Application Security
Application Multi-Layer Security Design
Access Control List Extensions
Information and Data Security
Data-at-rest Security
Amazon S3 Security
Amazon S3 Security (Cont.)
Network Security
Operational Security
DevOps Security Concerns
Summary
 
Chapter 8. Cloud Services
 
Defining Cloud Services
User-Cloud Interaction
Cloud Service Characteristics
The Typical Cloud Services
Application Services
Messaging Application Service
Email Application Service
Cache Application Service
Specialized Application Services
AWS Analytics Systems
Google App Engine (GAE) MapReduce Service
Use Cases for MapReduce Jobs
Integration Platform as a Service (IPaaS)
Storage Services
Object Storage
Archive Storage
Relational Storage
NoSQL Storage
Some AWS Storage Services
Data Warehouses in the Cloud
Cloud Utility Services
Scalability and HA of Your Applications in the Cloud
The Auto-scaling Service
Monitoring Services
Configuring Instance Health Check in AWS
Amazon Web Services Integration Diagram
Google App Engine (GAE) Services Integration Diagram
Microsoft Azure Services
Comparing Cloud Service Stacks
Summary
 
Chapter 9. Adopting Your Very Own Cloud
 
What Drives Cloud Adoption?
What May Go to the Cloud?
Capacity Planning
Critical Run-time and Storage Parameters
The Cloud Adoption Stages (Example)
Getting to the Cloud (Example Road Map)
Pre-Cloud Stages
Cloud Stages
Cloud Stages (Cont'd)
Cloud Adoption Steps
Identify your business drivers (Step #1)
Get Educated (Step #2)
Get Educated (Things to Avoid ... )
Articulate a Value Proposition (Step #3)
Define one or more scenarios (Step #4)
Produce a Road Map (Step #5)
Gain Stakeholder Buy-in (Step #6)
Establish Governance (Step #7)
Invest in Infrastructure (Step #8)
Cloud Pilot (Step #9)
Scoping the Pilot Project
Pilot Project Scope (Cont’d)
Enterprise Roll-out (Step #10)
Start Small and Grow Incrementally
Amazon WS Technical Lessons When Moving To the Cloud
Hype Cycle and Technology Adoption Model
Summary
 
Chapter 10. OpenStack Security
 
OpenStack Cloud Perimeter Security
System Perimeter Security
OpenStack Virtual Instance Security
OpenStack Security Considerations
Linux Kernel-Based Firewall
OpenStack Security Groups
Nova Client Security Group Commands
Nova REST API for Security Group Administration
Nova Security Command Examples
Identity Management with Keystone
Keystone Command-line
Example of a Keystone Command
Keystone REST API
Example of Keystone RESTful Request
Summary
 
Chapter 11. Cloud Design Strategies
 
Implications of Vendor Lock-In
Dealing with Vendor-specific Service API
Know Your Cloud Application's Needs
Data Physics
Cloud Design Strategies
Designing for Scalability
Designing for Cloud Availability
Designing for Failure
Designing for Cloud Security
Designing for Cloud Security - OWASP 10
Designing for Cloud Security - OWASP 10 (Cont'd)
Designing for Cloud Security – Multi-Factor Security
Stepping Across Site Silos
Stepping Across Site Silos – the SAML Protocol
Stepping Across Site Silos – t
he OpenID Protocol
SAML vs OpenID
History of OAuth
Stepping Across Site Silos – OAuth
Selecting the Right Storage
(Cont'd)
Designing for Cloud Management
Designing for Cloud Maintainability
Other Considerations
Designing for Cloud Service Reuse
Designing for Cloud Service Reuse (Cont'd)
Designing for Cloud Agility
Designing for Cloud Usability
Additional Usability Considerations
Summary
 
Chapter 12. Cloud SLAs
 
What is an SLA?
Two SLA Management Phases
Some SLA Parameters
The Importance of Cloud SLAs
Amazon Storage SLAs
Understanding your SLA
Example of Google Infrastructure Failure Rates
Assess Consequences for Your Business
Characteristics of a Service Quality Metric
Service Quality Metrics
SLA Monitoring Components
Summary

Course Directory [training on all levels]

Upcoming Classes
Gain insight and ideas from students with different perspectives and experiences.

Interesting Reads Take a class with us and receive a book of your choosing for 50% off MSRP.