Objective of Project Based Industrial Training :
To provide state of art, cutting edge customized software solutions to clients of various Industries.
To reduce the gap between the academic learning and Industry experience.
Core and advanced features of each technology, are covered in interactive classroom sessions.
Topic Based Assignments are given to trainees to develop their programming skills.
Hands on Training are imparted on “Live Projects” by industry experts.
Project completion certificate is awarded by “XPERT INFOTECH”
Trainees are helped by our dedicated team of HR executives in finding out suitable job, after completion of the training.
Presenter manual cloud computing (specially for summer interns)
1. Cloud computing
Specially For Summer Interns
Effective from: Jan 2012
1 COURSE OUTLINE FOR | XPERT INFOTECH | Confidential
CLOUD COMPUTING
2. 1. Introduction to Cloud Computing
What is Cloud Computing?
o Cloud Computing Defined
o Cloud Computing Architecture
o Cloud Computing Terms
Communication-as-a-Service (CaaS)
Infrastructure-as-a-Service (IaaS)
Monitoring-as-a-Service (MaaS)
Software-as-a-Service (SaaS)
Platform-as-a-Service (PaaS)
Benefits and Limitations of Cloud Computing
o Benefits
o Limitations
o Cloud Computing Case Studies
How Companies Are Using Cloud Computing
o Implementing Applications and Services in the Cloud
o Using Your Company's Services vs. the Cloud Provider
o A Cloud Service Provider Introduced
Cloud Computing Risks and Issues
2. Who's Who in Today's Cloud
Cloud Computing Companies
Products and Services Provided by Cloud Computing Companies
3. The Business Case for Going to the Cloud
Benefits of Cloud Computing
o Operational
o Economic
o Staffing
Should Your Company Invest in Cloud Computing?
o What Should Not be Moved to the Cloud
4. The Evolution of Cloud Computing
Early Mainframe Environment
o Virtualization in Mainframe Architectures and Operating Systems
LANs and the Cloud
Internet and the Cloud
Web Services, Browsers, and the Cloud
Thin Client
Advances in Networking and Processing Speeds that Led to Cloud Computing
o Networking Developments
o Increased Processing Speeds
2 COURSE OUTLINE FOR | XPERT INFOTECH | Confidential
CLOUD COMPUTING
3. Managed Service Provider Model to Cloud Computing and Software as a Service
(SaaS)
o Single Purpose Architectures Migrate to Multipurpose Architectures
o Data Center Virtualization
Collaboration
o The Cloud as a Reach Extender
o The Cloud as a Communication Enabler
o The Cloud as an Employee Enabler
Service-Oriented Architecture (SOA)
o Evolving from SOA to the Cloud
o Capacity: Limited Performance
o Availability: Communications Failure and Performance Issues
o Security: Newer Security Protocols Provide More Protection
What's Next in Cloud Computing
5. Building Cloud Networks
Designing and Implementing a Data Center-Based Cloud
o Using Industry and International Standards
o Independent Components
o Message Base
o Location Independence
Communication Requirements for Cloud Implementation
o Public Internet
o Private Internet
o Routing to the Datacenter
o Switching within the Data Center
o Bandwidth
Tools Used to Measure Network Performance
Using the Protocol Analyzer to Measure Bandwidth
Using Ping and Traceroute to Measure Network Performance
o Security
SSL
VPN
Overhead
Storage Options for Cloud Computing
o Storage Capacity
Data Protection and Partitioning
NAS
SAN
CAS
Redundancy
Replication
Multisiting
Backup and Recovery
Server Software Environments that Support Cloud Computing
o Server Capacity
3 COURSE OUTLINE FOR | XPERT INFOTECH | Confidential
CLOUD COMPUTING
4. Virtualization
Clustering
Expansion
Server Functions
Application
Web
Database
Vendor Approaches to Cloud Computing
Role of Open Source Software in Data Center
o Cost Reduction vs. Reliability
o Open Source Server Software
o Open Source Database Software
o Open Source Applications Software
o Open Source System Management Software
o Open Source Load-Balancing Software
6. Virtualization
Student Virtualization Architectures
o The Hypervisor
o Virtualization as the "Operating System"
o Virtualization with a Host Operating System
Virtualization Infections on Virtualized Environments
o Type 1 Virtualized Environment
o Type 2 Virtualized Environment
Virtualization Environments
o Microsoft Virtualization
o Sun xVM VirtualBox
o Linux/UNIX Virtualization
o VMware Products
Data Center and Cloud Infrastructure Products
End-User and Desktop Products
o IBM Virtualization
o Using VMware to see a Virtualized Server Environment
7. Federation, Presence, Security, and Privacy in the Cloud
Federation in the Cloud
o What It Is
o Permissive Federation
o Verified Federation
o Encrypted Federation
o Trusted Federation
o Using XMPP in the Federated Environment
Presence in the Cloud
o What It Is
o Presence Protocols
o Leveraging Presence
4 COURSE OUTLINE FOR | XPERT INFOTECH | Confidential
CLOUD COMPUTING
5. o Presence Enabled
o The Future of Presence
o The Interrelation of Identity, Presence, and Location in the Cloud
Identity Management
o What It Is
o Future of Identity in the Cloud
Privacy and Its Relation to Cloud-Based Information Systems
o Personal Information
o Privacy-Related Issues
o Finding Your Private Information
8. Cloud Computing Standards and Best Practices
Open Cloud Consortium
o What It Is
o Open Cloud Consortium Working Groups
Project Matsu
Project Comet
HPC in the Cloud
The Open Cloud Testbed
The Open Science Data Cloud
Intercloud Testbed
Reporting on an Open Cloud Consortium Working Group
Distributed Management Task Force (DMTF)
o What It Is?
o DMTK Working Groups Associated with Cloud Computing
Standards for Application Developers
o Protocols
o Scripting Languages
o Content Formatting Standards and Languages
Standards for Security in the Cloud
o Confidentiality, Integrity, Availability
o Authentication, Authorization, Accountability
o Regulations for Privacy
o Security Protocols
Establishing a Baseline for Cloud Performance
Best Practices for Selecting a Vendor and Implementing Cloud-Based Applications
o Choosing the Right Vendor
o Implementing Cloud-Based Applications
9. End-User Access to Cloud Computing
Cloud Access Methods Available to End Users
o Citrix
o Windows Remote Desktop
o Vnc
o Web Browsers
o Server Extensions
5 COURSE OUTLINE FOR | XPERT INFOTECH | Confidential
CLOUD COMPUTING
6. o Thin Clients
o Smart Phones, Pads, Pods, etc.
Virtual Terminal Security Strengths and Weaknesses
o Strengths
o Weaknesses
10. Mobility and the Cloud
Mobile Operating Systems for Smartphones
o iPhone
o Android
o BlackBerry
o Windows Mobile
o Ubuntu Mobile Internet Device
Mobile Platform Virtualization
o Kernel-Based Virtual Machine
o VMware Mobile Virtualization Platform
Collaboration Applications for Mobile Platforms
o Text Messaging
o iPhone Applications
o BlackBerry Applications
o Droid Applications
Notes:
Recommend Practical hours for student except class hours is 90 Hrs.
We also provide weekend classes for all courses.
After completion of 75% of course, student will go through Live Project
Training, Interview Preparation and Recruitment process in Software
Industry.
6 COURSE OUTLINE FOR | XPERT INFOTECH | Confidential
CLOUD COMPUTING
7. Our Technology Specialization and Certification Courses:
7 COURSE OUTLINE FOR | XPERT INFOTECH | Confidential
CLOUD COMPUTING
8. KEY FEATURES OF XPERT INFOTECH:
KEY FEATURES OF XPERT INFOTECH:
Training by Certified and Experienced Trainers.
Industrial and Corporate Tie-ups for Live projects for student.
Well equipped Computer Lab, Internet and Book Bank facility.
Live project based Summer Trainings, Summer Internships and
summer programs.
100% placement assistance on every course.
Interview Preparation and Technical Events.
On Campus Interviews in every month for the placement of students.
WI-FI enabled classrooms. 100% Placement
Assistance
On Campus
Interviews
58-61 (Basement), Vashist Park, Pankha Road,
New Delhi-46
Ph.: 011-28526572, 65833100, 9990345891
www.xpert-infotech.com
Email: info@xpert-infotech.com
8 COURSE OUTLINE FOR | XPERT INFOTECH | Confidential
CLOUD COMPUTING