0% found this document useful (0 votes)
8 views2 pages

Cloud Computing and Security

Uploaded by

jeewanb99
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views2 pages

Cloud Computing and Security

Uploaded by

jeewanb99
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

CLOUD COMPUTING AND SECURITY

Credit: 4

Course Objectives:

The main objectives of this course is focus on the real world goals for services provided
by cloud computing and security, the constrains on cloud computing infrastructure,
specification of cloud system structure and implementation of specifications, the
evolution of cloud computing over time and across computing arena and also concerned
with the processes, methods, and tools for development of cloud infrastructure.

1. Cloud Computing Overview (8 Hrs)


History of Cloud Computing, features of cloud computing, cloud services requirements,
cloud and dynamic infrastructure, challenges of cloud computing

2. Cloud Computing Architectures and Service models (10 Hrs)


Cloud computing Characteristics, Cloud reference model -platform as service, software
as a service, infrastructure as service, Cloud deployment models -Public clouds, private
clouds, Community cloud, hybrid clouds, Cloud design and implementation using SOA,
security, trust and privacy

3. Cloud management (6 Hrs)


Resiliency, visioning, asset Management, cloud governance, Cloud data Center and
recovery

4. Cloud Virtualization technology (8 Hrs)


Virtualization defined, virtualization benefits, server virtualization, hypervisor
management software, virtual infrastructure requirements

5. Cloud Programming Models (8 Hrs)


Thread programming, Task programming, Map-reduce programming,

6. Cloud security (8 Hrs)

Cloud Security challenges and Risks, Software-as-a-Service Security, Security


Monitoring, Security Architecture Design, Data Security, Application Security, Virtual
Machine Security, Identity Management and Access Control

7. Cloud platforms, applications and Case Studies (12 Hrs)

Web services, app Engine, azure Platform, Aneka, open challenges, scientific
applications and business and consumer applications , energy efficiency in cloud, cloud
mobility, market oriented cloud computing
References
1. Cloud Computing, Dr. Kumar Saurabh
2. Mastering Cloud Computing: Raj Kumar Buyya, Christian Vecchiola, S. Thamarai
Selvi
3. Cloud Computing and SOA Convergence in your enterprise, David S. Linthicum
4. Cloud Computing Bible, Barrie Sosinsky

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy