Day 1 |
Cloud Computing Reference Architecture: An Overview The Conceptual Reference Model
Cloud Consumer
Cloud Provider
Cloud Auditor
Cloud Broker
Cloud Carrier
Scope of Control between Provider and Consumer
Cloud Computing Reference Architecture: Architectural Components Service Deployment
Service Orchestration
Cloud Service Management
Business Support
Provisioning and Configuration
Portability and Interoperability
Security
Cloud Service Model Perspectives
Implications of Cloud Deployment Models
Shared Security Responsibilities
Privacy
Cloud Taxonomy
Security Reference Architecture: Data Analysis Methodology Data Collection
Data Aggregation and Validation
Deriving the Security Responsibilities for the Intermediary Provider and Technical Broker
Mapping Security Components to Security Control Families
Empirical Data Analysis and the Generic Heat Map
Security Reference Architecture: Formal Model Overview of the Formal Model
|
Day 2 |
Security Reference Architecture: Formal Model Overview of the Formal Model
Consumer – Architectural Components Cloud Consumption Management
Business Support
Configuration
Portability and Interoperability
Organizational Support
Cloud Ecosystem Orchestration
Functional Layer
Provider – Architectural Components Cloud Ecosystem Orchestration
Deployment and Service Layer
Resource Abstraction and Control Layer
Physical Resource Layer
Cloud Service Management
Provisioning and Configuration
Portability and Interoperability
Business Support
Broker – Architectural Components Technical Broker
Business Broker
Cloud Ecosystem Orchestration
Service Layers
Service Aggregation
Cloud Service Management
Portability and Interoperability
Provisioning and Configuration
Business Support
Service Intermediation
Service Arbitrage
Carrier – Architectural Components
Auditor – Architectural Components
Security Reference Architecture: A Methodology of Orchestrating a Cloud Ecosystem Orchestration Methodology Overview
Cloud Ecosystem Orchestration Use Case
Step 1 – Categorize the System – Consumer’s Service Description
Step 2 – Identify Security Requirements – a Cloud Solution Analysis
The Security Index System Security Controls Overview Step 3 – Select the Cloud Ecosystem Architecture
Step 4 – Assess Cloud Services
Step 5 – Authorize Cloud Services
Step 6 – Monitor Cloud Services
|
Day 3 |
OpenStack Architecture: Review of OpenStack Architecture Implementations General purpose
Technical considerations
Architecture
Compute focused
Technical considerations
Operational considerations
Architecture
Storage focused
Technical considerations
Operational considerations
Architecture
Network focused
Technical considerations
Operational considerations
Architecture
Multi-site
Technical considerations
Operational considerations
Architecture
OpenStack Architecture: Review of OpenStack Architecture Services Dashboard
Compute
Networking
Storage
Object Storage
Block Storage
Shared services
Identity service
Image service
Telemetry
Higher-level services
Orchestration
Database service
Data processing service
OpenStack Cloud Architectures |
Day 4 |
Installation of OpenStack (single image development environment) Labs
OpenStack Cloud Architectures |
Day 5 |
Labs
|