Introduction to the Program

Specialize in the senior management of technological projects in Cloud Computing and master the management of these solutions until your initiatives achieve the desired recognition” 

##IMAGE##

Cloud Computing has become a fundamental pillar in the digital transformation of companies and organizations around the world, revolutionizing the way they operate and access technology. This field is especially relevant due to its ability to optimize processes, reduce costs and foster innovation through technologies such as the Internet of Things (IoT), Machine Learning and Artificial Intelligence. Senior management in this field is configured a key element to lead successful projects, which is why TECH has designed this complete advanced program, aimed at professionals looking to specialize in this technology and take their skills to the highest level.

With this approach, the program addresses the fundamental concepts of Cloud Computing, from programming cloud architectures to the integration of advanced services. It also dedicates an essential section to container orchestration with tools such as Kubernetes and Docker, guiding the student through the process of designing, implementing and managing scalable and secure technological infrastructures. In addition, the content includes the most up-to-date knowledge in cybersecurity, cloud storage and IT infrastructure transformation, providing added value for both those already in leadership roles and those aspiring to fill these positions in the technology industry.

One of the main advantages of this program is that it is 100% online, without the need for rigid schedules or transfers, allowing students to self-manage their learning. Thanks to this flexibility, they will be able to combine it with their daily responsibilities, adjusting their pace of study to achieve their professional goals in an efficient and practical way, with the support of an updated syllabus and resources designed by experts in the sector.

Driving business value with Cloud Computing depends on effectively managing cloud solutions” 

This Advanced master’s degree in Cloud Computing contains the most complete and up-to-date educational program on the market. Its most notable features are:

  • Practical cases presented by experts in Cloud Computing
  • The graphic, schematic, and practical contents with which they are created, provide scientific and practical information on the disciplines that are essential for professional practice
  • Practical exercises where the self-assessment process can be carried out to improve learning
  • Special emphasis on innovative methodologies in Cloud Computing management
  • Theoretical lessons, questions to the expert, debate forums on controversial topics, and individual reflection assignments
  • Content that is accessible from any fixed or portable device with an Internet connection

The multitude of practical resources in this Cloud Computing program will allow you to consolidate essential industry knowledge” 

It includes in its teaching staff professionals belonging to the field of Cloud Computing, who pour into this program the experience of their work, in addition to recognized specialists from reference companies and prestigious universities.

The multimedia content, developed with the latest educational technology, will provide the professional with situated and contextual learning, i.e., a simulated environment that will provide an immersive learning experience designed to prepare for real-life situations.

This program is designed around Problem-Based Learning, whereby the student must try to solve the different professional practice situations that arise throughout the program. For this purpose, the professional will be assisted by an innovative interactive video system created by renowned and experienced experts.

A 100% online program that will allow you to specialize at any time and from anywhere in the world"

##IMAGE##

TECH offers the most innovative methodology to guarantee effective and up-to-date learning"

Syllabus

The contents that make up this program in Cloud Computing have been developed by a team of experts in technology and Cloud Computing. Thanks to this, the curriculum delves into the main aspects of the design, implementation and administration of Cloud solutions, which will allow graduates to develop scalable, secure and profitable systems. Likewise, the syllabus addresses advanced and updated techniques that drive technological innovation and allow them to face the challenges of the current market. In addition, students will be guided by a specialized faculty that will be available to answer any questions related to the content of this program. 

##IMAGE##

You will boost the development of technological skills in Cloud Computing that will allow users to reach their maximum potential in the professional environment” 

Module 1. Cloud Programming. Azure, AWS and Google Cloud Services

1.1. Cloud. Cloud Services and Technologies

1.1.1. Cloud Services and Technologies
1.1.2. Cloud Terminology
1.1.3. Reference Cloud Providers

1.2. Cloud Computing

1.2.1. Cloud Computing
1.2.2. Cloud Computing Ecosystem
1.2.3. Types of Cloud Computing

1.3. Cloud Service Models

1.3.1. IaaS. Infrastructure as a Service
1.3.2. SaaS. Software as a Service
1.3.3. PaaS. Platform as a Service

1.4. Cloud Computing Technologies

1.4.1. Virtualization Systems
1.4.2. Service-Oriented Architecture (SOA)
1.4.3. GRID Computing

1.5. Cloud Computing Architecture 

1.5.1. Cloud Computing Architecture
1.5.2. Networks Types in Cloud Computing
1.5.3. Cloud Computing Security

1.6. Public Cloud

1.6.1. Public Cloud
1.6.2. Public Cloud Architecture and Costs
1.6.3. Public Cloud. Typology

1.7. Private Cloud

1.7.1. Private Cloud
1.7.2. Architecture and Costs
1.7.3. Private Cloud. Typology

1.8. Hybrid Cloud

1.8.1. Hybrid Cloud
1.8.2. Architecture and Costs
1.8.3. Hybrid Cloud. Typology

1.9. Cloud Providers

1.9.1. Amazon Web Services
1.9.2. Azure
1.9.3. Google

1.10. Cloud Security

1.10.1. Infrastructure Security
1.10.2. Operating System and Network Security
1.10.3. Cloud Risk Mitigation

Module 2. Architecture Programming in Cloud Computing

2.1. Cloud Architecture for a University Network. Cloud Provider Selection. Practical Example

2.1.1. Cloud Architecture Approach for a University Network According to Cloud Provider
2.1.2. Cloud Architecture Components
2.1.3. Analysis of Cloud Solutions According to Proposed Architecture

2.2. Economic Estimation of the Project for the Creation of a University Network. Financing

2.2.1. Cloud Provider Selection
2.2.2. Economical Estimation According to Components
2.2.3. Project Financing

2.3. Estimation of Human Resources of the Project. Composition of a Software Team

2.3.1. Composition of the Software Development Team
2.3.2. Roles in a Development Team. Typology
2.3.3. Assessment of the Economic Estimation of the Project

2.4. Execution Schedule and Project Documentation

2.4.1. Agile Project Schedule
2.4.2. Project Feasibility Documentation
2.4.3. Documentation to Be Provided for Project Execution

2.5. Legal Implications of a Project

2.5.1. Legal Implications of a Project
2.5.2. Data Protection Policy
2.5.2.1. GDPR. General Data Protection Regulation
2.5.3. Responsibility of the Integrating Company

2.6. Design and Creation of a Cloud Blockchain Network for the Proposed Architecture

2.6.1. Blockchain – Hyperledger Fabric
2.6.2. Hyperledger Fabric Basics
2.6.3. Design of an International University Hyperledger Fabric Network

2.7. Proposed Architecture Expansion Approach

2.7.1. Creation of the Proposed Architecture with Blockchain
2.7.2. Proposed Architecture Expansion
2.7.3. Configuration of a High Availability Architecture

2.8. Administration of the Proposed Cloud Architecture

2.8.1. Adding a New Participant to the Initial Proposed Architecture
2.8.2. Administration of the Cloud Architecture
2.8.3. Project Logic Management – Smart Contracts

2.9. Administration and Management of Specific Components in the Proposed Cloud Architecture

2.9.1. Management of Network Certificates
2.9.2. Security Management of Various Components: CouchDB
2.9.3. Blockchain Network Nodes Management

2.10. Modification of an Initial Basic Installation in the Creation of a Blockchain Network

2.10.1. Adding a Node to the Blockchain Network
2.10.2. Addition of Extra Data Persistence
2.10.3. Smart Contracts Management
2.10.4. Addition of a New University to the Existing Network

Module 3. Azure Cloud Storage

3.1. MV Installation in Azure

3.1.1. Creation Commands
3.1.2. Visualization Commands
3.1.3. Modification Commands

3.2. Azure Blobs

3.2.1. Types of Blobs
3.2.2. Container
3.2.3. Azcopy
3.2.4. Reversible Blob Suppression

3.3. Managed Disk and Storage in Azure

3.3.1. Managed Disk
3.3.2. Security
3.3.3. Cold Storage
3.3.4. Replication

3.3.4.1. Local Redundancy
3.3.4.2. Redundancy in a Zone
3.3.4.3. Geo-Redundant

3.4. Azure Tables, Queues, Files

3.4.1. Tables
3.4.2. Queues
3.4.3. Files

3.5. Azure Encryption and Security

3.5.1. Storage Service Encryption (SSE)
3.5.2. Access Codes

3.5.2.1. Shared Access Signature
3.5.2.2. Container-Level Access Policies
3.5.2.3. Access Signature at Blob Level

3.5.3. Azure AD Authentication

3.6. Azure Virtual Network

3.6.1. Subnetting and Matching
3.6.2. Vnet to Vnet
3.6.3. Private Link
3.6.4. High Availability

3.7. Types of Azure Connections

3.7.1. Azure Application Gateway
3.7.2. Site-to-Site VPN
3.7.3. Point-to-Site VPN
3.7.4. ExpressRoute

3.8. Azure Resources

3.8.1. Blocking Resources
3.8.2. Resource Movement
3.8.3. Removal of Resources

3.9. Azure Backup

3.9.1. Recovery Services
3.9.2. Azure Agent Backup
3.9.3. Azure Backup Server

3.10. Solutions Development

3.10.1. Compression, Deduplication, Replication
3.10.2. Recovery Services
3.10.3. Disaster Recovery Plan

Module 4. Cloud Environments. Security

4.1. Cloud Environments. Security

4.1.1. Cloud Environments, Security
4.1.1.1. Cloud Security
4.1.1.2. Security Position

4.2. Cloud Shared Security Management Model

4.2.1. Security Elements Managed by Vendor
4.2.2. Elements Managed by Customer
4.2.3. Security Strategy

4.3. Cloud Prevention Mechanisms

4.3.1. Authentication Management Systems
4.3.2. Authorization Management System. Access Policies
4.3.3. Key Management Systems

4.4. Cloud Infrastructure Data Security

4.4.1. Securing Storage Systems:

4.4.1.1. Block
4.4.1.2. Object Storage
4.4.1.3. File Systems

4.4.2. Protection of Database Systems
4.4.3. Securing Data in Transit

4.5. Cloud Infrastructure Protection

4.5.1. Secure Network Design and Implementation
4.5.2. Security in Computing Resources
4.5.3. Tools and Resources for Infrastructure Protection

4.6. Application Risks and Vulnerabilities

4.6.1. Application Development Risks
4.6.2. Critical Safety Risks
4.6.3. Vulnerabilities in Software Development

4.7. Application Defenses against Attacks

4.7.1. Application Development Design
4.7.2. Securitization through Verification and Testing
4.7.3. Secure Programming Practices

4.8. DevOps Environment Security

4.8.1. Security in Virtualized and Container Environments
4.8.2. Development Security and Operations (DevSecOps)
4.8.3. Best Security Practices in Containerized Production Environments

4.9. Security in Public Clouds

4.9.1. AWS
4.9.2. Azure
4.9.3. Oracle Cloud

4.10. Security Regulations, Governance and Compliance

4.10.1. Security Compliance
4.10.2. Risk Management
4.10.3. Processes in Organizations

Module 5. Container Orchestration: Kubernetes and Docker

5.1. Basis of Application Architectures

5.1.1. Current Application Models
5.1.2. Application Execution Platforms
5.1.3. Container Technologies

5.2. Docker Architecture

5.2.1. Docker Architecture
5.2.2. Docker Architecture Installation
5.2.3. Commands. Local Project

5.3. Docker Architecture. Storage Management

5.3.1. Image and Register Management
5.3.2. Docker Networks
5.3.3. Storage Management

5.4. Advanced Docker Architecture

5.4.1. Docker Compose
5.4.2. Docker in Organization
5.4.3. Docker Adoption Example

5.5. Kubernetes Architecture

5.5.1. Kubernetes Architecture
5.5.2. Kubernetes Deployment Elements
5.5.3. Distributions and Managed Solutions
5.5.4. Installation and Environment

5.6. Kubernetes Architecture: Kubernetes Development

5.6.1. Tools for K8s Development
5.6.2. Imperative vs. Declarative Mode
5.6.3. Application Deployment and Exposure

5.7. Kubernetes in Enterprise Environments

5.7.1. Data Persistence
5.7.2. High Availability, Scaling and Networking
5.7.3. Kubernetes Security
5.7.4. Kubernetes Management and Monitoring

5.8. K8s Distributions

5.8.1. Deployment Environment Comparison
5.8.2. Deployment on GKE, AKS, EKS or OKE
5.8.3. On Premise Deployment

5.9. Rancher and Openshift

5.9.1. Rancher
5.9.2. Openshift
5.9.3. Openshift: Configuration and Application Deployment

5.10. Kubernetes Architecture and Containers. Updates

5.10.1. Open Application Model
5.10.2. Tools for Deployment Management in Kubernetes Environments
5.10.3. References to Other Projects and Trends

Module 6. Cloud-Native Application Programming

6.1. Cloud-Native Technologies

6.1.1. Cloud-Native Technologies
6.1.2. Cloud Native Computing Foundation
6.1.3. Cloud-Native Development Tools

6.2. Cloud-Native Application Architecture

6.2.1. Cloud-Native Application Design
6.2.2. Cloud-Native Architecture Components
6.2.3. Legacy Application Modernization

6.3. Containerization

6.3.1. Container-Oriented Development
6.3.2. Development with Microservices
6.3.3. Tools for Teamwork

6.4. DevOps and Continuous Integration and Deployments

6.4.1. Continuous Integration and Deployments: CI/CD
6.4.2. Tools Ecosystem for CI/CD
6.4.3. Creating a CI/CD Environment

6.5. Observability and Platform Analysis

6.5.1. Cloud-Native Application Observability
6.5.2. Tools for Monitoring, Logging  and Tracing
6.5.3. Implementation of an Observability and Analysis Environment

6.6. Data Management in Cloud-Native Applications

6.6.1. Cloud-Native Database
6.6.2. Data Management Patterns
6.6.3. Technologies to Implement Data Management Patterns

6.7. Communications in Cloud-Native Applications

6.7.1. Synchronous and Asynchronous Communications
6.7.2. Technologies for Synchronous Communications Patterns
6.7.3. Technologies for Asynchronous Communications Patterns

6.8. Resilience, Security and Performance in Cloud-Native Applications

6.8.1. Application Resilience
6.8.2. Secure Development in Cloud-Native Applications
6.8.3. Application Performance and Scalability

6.9. Serverless

6.9.1. Cloud Native Serverless
6.9.2. Serverless Platforms
6.9.3. Use Cases for Serverless Development

6.10. Deployment Platforms

6.10.1. Cloud-Native Development Environments
6.10.2. Orchestration Platforms. Comparison
6.10.3. Infrastructure Automation

Module 7. Cloud Programming. Data Governance

7.1. Data Management

7.1.1. Data Management
7.1.2. Data Handling Ethics

7.2. Data Governance

7.2.1. Classification. Access Control
7.2.2. Data Processing Regulation
7.2.3. Data Governance. Value

7.3. Data Governance. Tools

7.3.1. Lineage
7.3.2. Metadata
7.3.3. Data Catalog. Business Glossary

7.4. User and Processes in Data Governance

7.4.1. Users

7.4.1.1. Roles and Responsibilities

7.4.2. Processes

7.4.2.1. Data Enrichment

7.5. Data Life Cycle in the Enterprise

7.5.1. Data Creation
7.5.2. Data Processing
7.5.3. Data Storage
7.5.4. Data Use
7.5.5. Data Destruction

7.6. Data Quality

7.6.1. Quality in Data Governance
7.6.2. Data Quality in Analytics
7.6.3. Data Quality Techniques

7.7. Data Governance in Transit

7.7.1. Data Governance in Transit

7.7.1.1. Lineage

7.7.2. The Forth Dimension

7.8. Data Protection

7.8.1. Access Levels
7.8.2. Classification
7.8.3. Compliance. Standards

7.9. Data Governance Monitoring and Measurement

7.9.1. Data Governance Monitoring and Measurement
7.9.2. Lineage Monitoring
7.9.3. Data Quality Monitoring

7.10. Data Governance Tools

7.10.1. Talend
7.10.2. Collibra
7.10.3. Computing

Module 8. Real-Time Cloud Programming. Streaming

8.1. Processing and Structuring of Streaming Information

8.1.1. Data Collection, Structuring, Processing, Analysis, and Interpretation Process
8.1.2. Streaming Data Processing Techniques
8.1.3. Streaming Processing
8.1.4. Streaming Processing Use Cases

8.2. Statistics for Understanding Streaming Data Flows

8.2.1. Descriptive Statistics
8.2.2. Probability Calculation
8.2.3. Inference

8.3. Programmng with Python

8.3.1. Typology, Conditionals, Functions and Loops
8.3.2. Numpy, Matplotlib, Dataframes, Csv Files and Json Formats
8.3.3. Sequences: Lists, Loops, Files and Dictionaries
8.3.4. Mutability, Exceptions and Higher-Order Functions

8.4. R Programming

8.4.1. R Programming
8.4.2. Vector and Factors
8.4.3. Matrix and Array
8.4.4. Lists and Data Frame
8.4.5. Functions

8.5. SQL Database for Streaming Data Processing

8.5.1. SQL Databases
8.5.2. Entity-Relationship Model
8.5.3. Relational Model
8.5.4. SQL

8.6. Non-SQL Database for Streaming Data Processing

8.6.1. Non-SQL Databases
8.6.2. MongoDB
8.6.3. MongoDB Architecture
8.6.4. CRUD Operations
8.6.5. Find, Projections, Index Aggregation and Cursors
8.6.6. Data Model

8.7. Data Mining and Predictive Modeling

8.7.1. Multivariate Analysis
8.7.2. Dimension Reduction Techniques
8.7.3. Cluster Analysis
8.7.4. Series

8.8. Machine Learning for Streaming Data Processing

8.8.1. Machine Learning and Advanced Predictive Modeling
8.8.2. Neural Networks
8.8.3. Deep Learning
8.8.4. Bagging and Random Forest
8.8.5. Gradient Boosting
8.8.6. SVM
8.8.7. Assembly Methods

8.9. Streaming Data Processing Technologies

8.9.1. Spark Streaming
8.9.2. Kafka Streaming
8.9.3. Flink Streaming

8.10. Apache Spark Streaming

8.10.1. Apache Spark Streaming
8.10.2. Spark Components
8.10.3. Spark Architecture
8.10.4. RDD
8.10.5. SPARK SQL
8.10.6. Jobs, Stages and Tasks

Module 9. Cloud Integration with Web Services. Technologies and Protocols

9.1. Web Standards and Protocols

9.1.1. Web and Web 2.0
9.1.2. Client-Server Architecture
9.1.3. Communication Protocols and Standards

9.2. Web Services

9.2.1. Web Services
9.2.2. Communication Layers and Mechanisms
9.2.3. Service Architectures

9.3. Service Oriented Architectures

9.3.1. Service Oriented Architecture (SOA)
9.3.2. Web Service Design
9.3.3. SOAP and REST

9.4. SOAP. Service Oriented Architecture

9.4.1. Structure and Message Passing
9.4.2. Web Service Description Language (WSDL)
9.4.3. Client Implementation and SOAP Servers

9.5. REST Architecture

9.5.1. REST Architectures and RESTful Web Services
9.5.2. HTTP Verbs: Semantics and Purposes
9.5.3. Swagger
9.5.4. Client Implementation and REST Servers

9.6. Microservices-Based Architectures

9.6.1. Monolithic Architectural Approach vs. Use of Microservices
9.6.2. Microservices-Based Architectures
9.6.3. Communication Flows with the Use of Microservices

9.7. Invoking APIs from the Client Side

9.7.1. Types of Web Clients
9.7.2. Development Tools for Web Services Processing
9.7.3. Cross-Origin Resources (CORS)

9.8. API Invocation Security

9.8.1. Web Services Security
9.8.2. Authentication and Authorization
9.8.3. Authentication Methods Based on the Degree of Security

9.9. Cloud Provider Application Integration

9.9.1. Cloud Computing Suppliers
9.9.2. Platform Services
9.9.3. Services Oriented to the Implementation/Consumption of Web Services

9.10. Implementation of Bots and Wizards

9.10.1. Use of Bots
9.10.2. Use of the Web Service in Bots
9.10.3. Implementation of Chatbots and Web Assistants

Module 10. Cloud Programming. Project Management and Product Verification

10.1. Waterfall Methodologies

10.1.1. Classification of Methodologies
10.1.2. Waterfall Model. Waterfall
10.1.3. Strength and Weakness
10.1.4. Model Comparison. Waterfall vs. Agile

10.2. Agile Methodology

10.2.1. Agile Methodology
10.2.2. The Agile Manifesto
10.2.3. Use of Agile

10.3. Scrum Methodology

10.3.1. Scrum Methodology

10.3.1.1. Use of Scrum

10.3.2. Scrum Events
10.3.3. Scrum Artifacts
10.3.4. Scrum Guide

10.4. Agile Inception Desk

10.4.1. Agile Inception Desk
10.4.2. Inception Desk Phases

10.5. Impact Mapping Technique

10.5.1. Impact Mapping
10.5.2. Use of Impact Mapping
10.5.3. Impact Mapping Structure

10.6. User Stories

10.6.1. User Stories
10.6.2. Writing User Stories
10.6.3. User Story Hierarchy
10.6.4. Use Story Mapping

10.7. Test Qa Manual

10.7.1. Testing Manual
10.7.2. Validation and Verification. Differences
10.7.3. Manual Tests. Typology
10.7.4. UAT. User Acceptance Testing
10.7.5. UAT and Alpha & Beta Testing
10.7.6. Software Quality

10.8. Automatic Tests

10.8.1. Automatic Tests
10.8.2. Manual Tests vs Automatic
10.8.3. The Impact of the Automatic Test
10.8.4. The Result of Applying Automation
10.8.5. The Quality Wheel

10.9. Functional and Non-Functional Testing

10.9.1. Functional and Non-Functional Testing
10.9.2. Functional Tests

10.9.2.1. Unit Tests
10.9.2.2. Integration Tests
10.9.2.3. Regression Testing
10.9.2.4. Smoke Tests
10.9.2.5. Mono Tests
10.9.2.6. Sanitation Tests

10.9.3. Non-Functional Tests

10.9.3.1. Load Testing
10.9.3.2. Performance Testing
10.9.3.3. Security Tests
10.9.3.4. Configuration Tests
10.9.3.5. Stress Tests

10.10. Verification Methods and Tools

10.10.1. Heat Map
10.10.2. Eye Tracking
10.10.3. Scroll Maps
10.10.4. Movement Maps
10.10.5. Confetti Maps
10.10.6. Test A/B
10.10.7. Blue & Green Deployment Method
10.10.8. Canary Release Method
10.10.9. Tool Selection
10.10.10. Analytical Tools

Module 11. Transformation of IT Infrastructures. Cloud Computing

11.1. Cloud Computing. Cloud Computing Adoption

11.1.1. Computing
11.1.2. Cloud Computing Adoption
11.1.3. Types of Cloud Computing

11.2. Cloud Computing Adoption. Adoption Factors

11.2.1. Adoption Factors of Cloud Infrastructures
11.2.2. Uses and Services
11.2.3. Evolution

11.3. Cloud Computing Infrastructures

11.3.1. Cloud Computing Infrastructures
11.3.2. Types of Infrastructures (IaaS, PaaS, SaaS)
11.3.3. Types of Implementation (Private, Public, Hybrid)
11.3.4. Elements (Hardware, Storage, Network)

11.4. Cloud Computing Infrastructure: Operation

11.4.1. Virtualization
11.4.2. Automation
11.4.3. Management

11.5. Cloud Computing Ecosystem

11.5.1. Observability and Analysis
11.5.2. Procurement
11.5.3. Orchestration and Management
11.5.4. Cloud Platforms

11.6. Services Management in Cloud Infrastructures

11.6.1. Service Orientation
11.6.2. Standard and Ecosystem
11.6.3. Types of Services

11.7. Cloud Infrastructure Management Automation

11.7.1. Ecosystem
11.7.2. DevOps Culture
11.7.3. Infrastructure as Code (Terraform, Ansible, Github, Jenkins)

11.8. Security in Cloud Infrastructures

11.8.1. Ecosystem
11.8.2. DevSecOps Culture
11.8.3. Tools

11.9. Preparation of the Cloud Infrastructure Management Environment

11.9.1. Tools
11.9.2. Preparation of the Environment
11.9.3. First Steps

11.10. Cloud Infrastructures. Future and Evolution

11.10.1. Cloud Infrastructures. Challenges
11.10.2. Evolution of Cloud Infrastructures
11.10.3. Challenges in Security and Compliance

Module 12. Infrastructure as a Service (IaaS)

12.1. Cloud Computing Abstraction Layers and Their Management

12.1.1. The Abstraction. Core Concepts
12.1.2. Services Models
12.1.3. Management of Cloud Services. Benefits

12.2. Construction of Architecture. Core Decisions

12.2.1. HDDC and SDDC. Hypercompetition
12.2.2. Market
12.2.3. Working Model and Professional Profiles Changes

12.2.3.1. Figure of the Cloudbroker

12.3. Digital Transformation and Cloud Infrastructures

12.3.1. Cloud Work Demo
12.3.2. The Role of the Navigator as Tool
12.3.3. New Device Concept
12.3.4. Advanced Architectures and the Role of the CIO

12.4. Agile Management in Cloud Infrastructures

12.4.1. Life Cycle of New Services and Competitiveness
12.4.2. Development Methodology of Apps and Microservices
12.4.3. Relationship between Development and IT Transactions

12.4.3.1. Use of Cloud as Support

12.5. Cloud Computing Resources I. Identity, Storage and Domain Management

12.5.1. Identity and Access Management
12.5.2. Secure Data Storage, Flexible File and Database Storage
12.5.3. Domain Management

12.6. Cloud Computing Resources II. Network, Infrastructure and Monitoring Resources

12.6.1. Private Virtual Network
12.6.2. Cloud Computing Capabilities
12.6.3. Monitoring

12.7. Cloud Computing Resources III. Automation

12.7.1. Serverless Code Execution
12.7.2. Message Queuing
12.7.3. Workflow Services

12.8. Cloud Computing Resources IV. Other Services

12.8.1. Notification Queuing
12.8.2. Streaming Services and Transcoding Technologies
12.8.3. Turnkey Solution to Publish APIs for External and Internal Consumers

12.9. Cloud Computing Resources vs. Data-Centric Services

12.9.1. Data Analytics Platforms and Automation of IT Manual Task
12.9.2. Data Migration
12.9.3. Hybrid Cloud

12.10. LaaS Services Practice Lab

12.10.1. Exercise 1
12.10.2. Exercise 2
12.10.3. Exercise 3

Module 13. Storage and Databases in Cloud Infrastructures

13.1. Cloud Storage Infrastructure

13.1.1. Cloud Storage. Fundamentals
13.1.2. Cloud Storage Advantages
13.1.3. Operation

13.2. Types of Cloud Storage

13.2.1. SaaS
13.2.2. IaaS

13.3. Cloud Storage Use Cases

13.3.1. Data Analysis
13.3.2. Backup and Archiving
13.3.3. Software Development

13.4. Cloud Storage Security

13.4.1. Security in the Transport Layer
13.4.2. Storage Security
13.4.3. Storage Encryption

13.5. Cloud Storage Analysis

13.5.1. Profitability
13.5.2. Agility and Scalability
13.5.3. Administration

13.6. Infrastructure of Cloud Databases

13.6.1. Fundamentals of Databases
13.6.2. Analysis of Databases
13.6.3. Cloud Database Classification

13.7. Types of Cloud Database Infrastructure

13.7.1. Relational Databases
13.7.2. Non-SQL Databases
13.7.3. Datawarehouse Databases

13.8. Cloud Database Infrastructure Use Cases

13.8.1. Data Storage
13.8.2. Data Analysis. IA .ML
13.8.3. Big Data

13.9. Security/Safety of Infrastructure of Cloud Databases

13.9.1. Access Control. ACL, IAM, SG
13.9.2. Data Encryption
13.9.3. Audits

13.10. Migration and Backup of Cloud Database Infrastructure

13.10.1. Database Backups
13.10.2. Database Migration
13.10.3. Database Optimization

Module 14. Network DevOps and Network Architectures in Cloud Infrastructures

14.1. Network DevOps (NetOps)

14.1.1. Network DevOps (NetOps)
14.1.2. NetOps Methodology
14.1.3. NetOps Benefits

14.2. Fundamentals of NetOps

14.2.1. Fundamentals of Networking
14.2.2. OSI TCP/IP Model, CIDR and Subnetting
14.2.3. Main Protocols
14.2.4. HTTP Responses

14.3. Tools and Software for Network DevOps

14.3.1. Network Layer Tools
14.3.2. Application Layer Tools
14.3.3. DNS Tools

14.4. Networking in Cloud Environments: Internal Network Services

14.4.1. Virtual Networks
14.4.2. Subnetworks
14.4.3. Routing Tables
14.4.4. Availability Zones

14.5. Networking in Cloud Environments: Border Network Services

14.5.1. Internet Gateway
14.5.2. NAT Gateway
14.5.3. Load Balancing

14.6. Networking in Cloud Environments: DNS

14.6.1. DNS Fundamentals
14.6.2. DNS Cloud Services
14.6.3. HA / LB via DNS

14.7. Hybrid / Multitenant Network Connectivity

14.7.1. VPN Site to Site
14.7.2. VPC Peering
14.7.3. Transit Gateway/VPC Peering

14.8. Content Delivery Network Services

14.8.1. Content Delivery Services
14.8.2. AWS CLoudFront
14.8.3. Other CDNs

14.9. Security in Cloud Networks

14.9.1. Security Principles in Networks
14.9.2. Protection in Layer 3 and 4
14.9.3. Protection in Layer 7

14.10. Network Monitoring and Auditing

14.10.1. Monitoring and Audit
14.10.2. Flow Logs
14.10.3. Monitorng Service: CloudWatch

Module 15. Government in Cloud Infrastructures

15.1. Compliance in Cloud Environments

15.1.1. Shared Responsibilities Model
15.1.2. Laws, Regulations and Contracts
15.1.3. Audits

15.2. CISO in Cloud Government

15.2.1. Organizational Framework. Figures of the CISO in the Organization
15.2.2. Relationship of CISO with the Data Processing Areas
15.2.3. GRC Strategy against Shadow IT

15.3. Cloud Governance Standard

15.3.1. Previous Assessments
15.3.2. Cloud Service Provider Compliance
15.3.3. Personnel Obligations

15.4. Privacy in Cloud Environments

15.4.1. Consumer and User Relationship with Privacy
15.4.2. Privacy in the Americas, Asia Pacific, Middle East and Africa
15.4.3. Privacy in the European Context

15.5. Approvals and Regulatory Frameworks in Cloud Environments

15.5.1. Approvals and Frameworks in the Americas
15.5.2. Approvals and Frameworks in Asia
15.5.3. Approvals and Frameworks in Europe

15.6. Certifications and Accreditations in Cloud Environments

15.6.1. Americas and Asia Pacific
15.6.2. Europe, Middle East and Africa
15.6.3. Global

15.7.  Laws / Regulations in Cloud Environments

15.7.1. CLOUD Act, HIPAA, IRS 1075
15.7.2. ITAR, SEC Rule 17a-4(f), VPAT/Section
15.7.3. European Regulations

15.8. Cost Control and Billing in Cloud Governance

15.8.1. Pay-Per-Use Models. Costs
15.8.2. Figure of the CFO and FinOps Profiles
15.8.3. Expense Control

15.9. Tools in Cloud Governance

15.9.1. OvalEdge
15.9.2. ManageEngine ADAudit Plus
15.9.3. Erwin Data Governance

15.10. Corporate Governance

15.10.1. Code of Conduct
15.10.2. Whistleblower Channel
15.10.3. Due Diligence

Module 16. Cybersecurity in Cloud Infrastructures

16.1. Risk in Cloud Environments

16.1.1. Cybersecurity Strategies
16.1.2. Risk-Based Approach
16.1.3. Risk Categorization in Cloud Environments

16.2. Security Frameworks in Cloud Environments

16.2.1. Frameworks and Cybersecurity Standards
16.2.2. Technical Cybersecurity Frameworls
16.2.3. Organization Cybersecurity Frameworls

16.3. Threat Modeling in Cloud Environments

16.3.1. Threat Modeling Process
16.3.2. Threat Modeling Phases
16.3.3. STRIDE

16.4. Cybersecurity Data Science at Code Level

16.4.1. Tool Classification
16.4.2. Integrations
16.4.3. Examples of Use

16.5. Cybersecurity Control Integration in Cloud Environments

16.5.1. Security in Processes
16.5.2. Security Controls in the Different Phases
16.5.3. Examples of Integrations

16.6.  ZAP Proxy Tool

16.6.1. ZAP Proxy
16.6.2. ZAP Proxy Features
16.6.3. ZAP Proxy Automation

16.7. Automated Vulnerability Scanning in Cloud Environments

16.7.1. Persistent and Automated Vulnerability Analysis
16.7.2. OpenVAS
16.7.3. Vulnerability Analysis in Cloud Environments

16.8. Firewalls in Cloud Environments

16.8.1. Types of Firewalls
16.8.2. Importance of Firewalls
16.8.3. OnPremise Firewalls and Cloud Firewalls

16.9. Security Transport Layer in Cloud Environments

16.9.1. SSL/TLS and Certificates
16.9.2. SLL Audits
16.9.3. The Automation of Certificates

16.10. SIEM in Cloud Environments

16.10.1. SIEM as a Security Core
16.10.2. Cyberintelligence
16.10.3. Examples of SIEM Systems

Module 17. Service Adoption in Cloud Infrastructures

17.1. Server Settings in the Cloud

17.1.1. Hardware Configuration
17.1.2. Software Configuration
17.1.3. Network and Security Setting

17.2. Cloud Service Setting

17.2.1. Assigning Permissions to My Cloud Server
17.2.2. Setting of Security Rules
17.2.3. Cloud Service Deployment

17.3. Administration of a Cloud Server

17.3.1. Storage Unit Management
17.3.2. Network Management
17.3.3. Security Copy Management

17.4. Persistence

17.4.1. Decoupling Our Cloud Service
17.4.2. Settings of Persistence Service
17.4.3. Integration of the Database with Our Cloud Service

17.5. Autoscaling

17.5.1. Image Generation of Our Server
17.5.2. Creation of Marketing Groups
17.5.3. Definition of Automatic Scaling Rules

17.6. Balancing Services

17.6.1. Balancing Services
17.6.2. Generation of a Load Balancer
17.6.3. Connecting the Load Balancer to Our Cloud Service

17.7. Content Delivery Services

17.7.1. Content Delivery Services
17.7.2. Content Delivery Service Settings
17.7.3. CDN Integration with Our Cloud Service

17.8. Configuration Parameters and Secrets

17.8.1. Configuration Parameter Management Services
17.8.2. Secret Management Services
17.8.3. Integrating Configuration and Secret Services with Our Cloud Service

17.9. Queue Management Services

17.9.1. Decoupling our Application
17.9.2. Queuing Service Configuration
17.9.3. Integrating the Queue with Our Cloud Service

17.10. Notification Services

17.10.1. Cloud Notification Services
17.10.2. Notification Service Configuration
17.10.3. Adding Notifications to Our Cloud Service

Module 18. Virtual Desktop Infrastructure (VDI)

18.1. Virtual Desktop Infrastructure (VDI)

18.1.1. VDI. Operation
18.1.2. Advantages and Disadvantages of VDI
18.1.3. VDI Common Usage Scenarios

18.2. Cloud and Hybrid VDI Architectures

18.2.1. VDI Hybrid Architectures
18.2.2. Cloud VDI Implementation
18.2.3. Cloud VDI Management

18.3. Designing and Planning a VDI Implementation

18.3.1. Selection of Hardware and Software
18.3.2. Network and Storage Infrastructure Design
18.3.3. Deployment and Scaling Planning

18.4. VDI Management

18.4.1. VDI Installation and Configuration
18.4.2. Desktop and Application Image Management
18.4.3. Security and Compliance Management
18.4.4. Availability and Performance Management

18.5. Integration of Applications and Peripherals in the VDI

18.5.1. Enterprise Application Integration
18.5.2. Integration of Peripherals and Devices
18.5.3. VDI Integration with Videoconferencing and Instant Messaging Solutions
18.5.4. VDI Integration with Online Collaboration Platforms

18.6. VDI Optimization and Improvement

18.6.1. Service Quality and Performance Optimization
18.6.2. Improvement of the Efficiency and Scalability
18.6.3. Improvement of Final User Experience

18.7. VDI Lifecycle Management

18.7.1. Hardware and Software Lifecycle Management
18.7.2. Infrastructure Migration and Replacement Management
18.7.3. Support and Maintenance Management

18.8. Safety in VDI: Infrastructure and User Data Protection

18.8.1. VDI Network Security
18.8.2. Protection of Data Stored in the VDI
18.8.3. User Security. Privacy Protection

18.9. VDI Advanced Usage Cases

18.9.1. Using VDI for Secure Remote Access
18.9.2. Using VDI for Specialized Application Virtualization
18.9.3. Using VDI for Mobile Devices Management

18.10. Trends and Future of VDI

18.10.1. New Technologies and Trends in the Field of VDI
18.10.2. Predictions on the Future of VDI
18.10.3. Future Challenges and Opportunities for VD

Module 19. Infrastructure as Code (IAC) Operation

19.1. Infrastructure as Code (IAC)

19.1.1. IaC, Infrastructure as Code
19.1.2. Infrastructure Management. Evolution
19.1.3. Advantages of IaC

19.2. Strategies for IAC Definition

19.2.1. Requirements Analysis
19.2.2. Imperative Definition
19.2.3. Declarative Definition

19.3. IAC Tools

19.3.1. IAC Objectives
19.3.2. Proprietary Tools
19.3.3. Third-Party Tools

19.4. Evolution of Infrastructure as Code

19.4.1. IaC in Kubernetes
19.4.2. Platform as Code
19.4.3. Compliance as Code

19.5. IAC in Devops

19.5.1. Flexible Infrastructures
19.5.2. Continuous Integration
19.5.3. Pipelines as Code

19.6. IAC - VPC - Proprietary Tools

19.6.1. Design of a VPC
19.6.2. Deployment of the Solution
19.6.3. Validation and Analysis

19.7. IAC - Serverless - Proprietary Tools

19.7.1. Design of a Serverless Solution
19.7.2. Deployment of the Solution
19.7.3. Validation and Analysis

19.8. IAC-VPC- Third-Party Tools

19.8.1. Design of a VPC
19.8.2. Deployment of the Solution
19.8.3. Validation and Analysis

19.9. IAC - Serverless- Third-Party Tools

19.9.1. Design of a Serverless Solution
19.9.2. Deployment of the Solution
19.9.3. Validation and Analysis

19.10. IAC - Comparison. Future Trends

19.10.1. Valuation of Proprietary Solutions
19.10.2. Valuation of Third-Party Solutions
19.10.3. Future lines

Module 20. Monitoring and Backup of Cloud Infrastructures

20.1. Monitoring and Backup of Cloud Infrastructures

20.1.1. Benefits of Backup in Clouds
20.1.2. Types of Backup
20.1.3. Benefits of Monitoring in the Cloud
20.1.4. Types of Monitoring

20.2. Availability and Security of Cloud Infrastructure Systems

20.2.1. Main Factors
20.2.2. The Most Demanded Uses and Services
20.2.3. Evolution

20.3. Types of Backup Services in Cloud Infrastructures

20.3.1. Total Backup
20.3.2. Incremental Backup
20.3.3. Differential Backup
20.3.4. Other Types of Backup

20.4. Strategy, Planning and Management of Backups in Cloud Infrastructures

20.4.1. Establishment of Objectives and Scope
20.4.2. Types of Backup Copies
20.4.3. Good Practices

20.5. Continuity Plan in Cloud Infrastructures

20.5.1. Strategy Continuity Plan
20.5.2. Types of Plans
20.5.3. Creating a Continuity Plan

20.6. Monitoring Types in Cloud Infrastructures

20.6.1. Performance Monitoring
20.6.2. Availability Monitoring
20.6.3. Event Monitoring
20.6.4. Log Monitoring
20.6.5. Network Traffic Monitoring

20.7. Monitoring Strategy, Tools and Techniques in Cloud Infrastructures

20.7.1. How to Set Objectives and Scope
20.7.2. Types of Monitoring
20.7.3. Good Practices

20.8. Continuous Improvement in Cloud Infrastructures

20.8.1. Continuous Improvement in the Cloud
20.8.2. Key Performance Metrics (KPIs) in the Cloud
20.8.3. Designing a Continuous Improvement Plan in the Cloud

20.9. Case Studies in Cloud Infrastructures

20.9.1. Backup Case Study
20.9.2. Study Case Monitoring
20.9.3. Learnings and Good Practices

20.10. Case Studies in Cloud Infrastructures

20.10.1. Laboratory 1
20.10.2. Laboratory 2
20.10.3. Laboratory 3

##IMAGE##

This program will enable you to become a professional ready to lead innovative projects in the industry”

Advanced Master's Degree in Cloud Computing

Cloud computing has become a ground-breaking technology that has transformed the way companies manage their technology infrastructure and offer digital services. As a leader in technology education, TECH Global University has developed an Advanced Master's Degree in Cloud Computing program for those professionals looking to update and specialize in this constantly evolving area. Through our postgraduate program, you will gain an in-depth understanding of the concepts, principles and technologies that make up cloud computing, and learn how to implement innovative and scalable cloud solutions that drive digital transformation in organizations.

In our program, you'll gain practical skills in cloud infrastructure design, implementation and management, cloud security, cloud service management, cloud migration, cloud data analytics and more. Our industry expert faculty will guide you in learning best practices and give you the hands-on experience you need through real-world projects and case studies. Get ready to lead the cloud computing revolution with our Advanced Master's Degree in Cloud Computing and transform your career in the world of technology.