IT Cloud Certification Bundle - ITU Online

IT Cloud Certification Bundle

If you’re looking to dive into the exhilarating, rapidly expanding field of cloud technology and gain certification in it, then this ITU Bundle will be ideal for you. It includes three outstanding cloud certification courses that grant students a vendor-specific and vendor-neutral point of view on clouds.

Included In This Course

Google DevOps Training Series
23 Hrs 3 Min
Videos
169 On-demand Videos
Closed Captions

Closed Captions

Course Topics
25  Topics
Question & Answers
232 Prep Questions
Certificate of Completion

Certificate of Completion

Cloud Technology has exploded in the IT industry in the past few years. The days of hardware and infrastructure are being replaced by virtualization and cloud computing. The emergence of Cloud technology has removed infrastructure as a barrier to rapid scaling of applications. In the past, the need for physical hardware created a substantial need for physical hardware which in turn created a road block for organizations needing to grow their infrastructure dramatically. With this dramatic change the IT industry is rapidly changing, allowing for a new sector of IT to develop at groundbreaking speed. IT pro’s and aspiring IT professionals need a way to showcase their skills in this new arena. This IT University Bundle includes 3 of the most popular cloud certification courses in the marketplace. Students will get both a vendor specific and vendor agnostic perspective on cloud technology and will be able to achieve certification in the most exciting and rapidly growing sector in today’s IT industry. Here are a few of the topics included in this bundle of courses:
  • Fundamental Cloud Concepts
  • Basics of Virtualization
  • Specific Characteristics that Define a Cloud Infrastructure
  • Elasticity, Resiliency and Measured Usage
  • Public Cloud, Private Cloud and Hybrid Cloud
  • Combining Cloud Delivery Models
  • Cloud Service and Cloud Service Consumer Roles
  • (SaaS), (PaaS and (IaaS)

Proudly Display
Your Achievement

Upon completion of your training, you’ll receive a personalized certificate of completion to help validate to others your new skills.
Example Certificate

Cloud Computing Security Knowledge (CCSK) Course Content

Module 1: Architecture

  •    Cloud Security Overview-Part1
  •    Cloud Security Overview-Part2
  •    Cloud Diagrams
  •    Cloud Services

Module 2: Governance and Enterprise Risk

  •    Risk Management
  •    Corporate Governance
  •    Enterprise Risk Management
  •    Risk Management Balance Process Supply Chain Security
  •    ERM Incidents Recommendations-Part1
  •    ERM Incidents Recommendations-Part2
  •    ERM Incidents Recommendations-Part3

Module 3: Legal Issues- Contracts and Electronic

  •    Cloud Legal Issues-Part1
  •    Cloud Legal Issues-Part2
  •    Cloud Legal Issues-Part3

Module 4: Compliance and Audit Management

  •    Audits
  •    Compliance And Audit
  •    Audit Recommendations
  •    Audit Requirements

Module 5: Information Management and Data Security

  •    Information And Security
  •    Storage
  •    Information Governance Classification
  •    Data Security
  •    Protecting Data Moving
  •    Client Database Encryption
  •    PaaS Encryption

Module 6: Interoperability and Portability

  •    Interoperability And Portability
  •    Interoperability Recommendations
  •    Portability Recommendations
  •    Recommendations SAAS

Module 7: Traditional Security, Business Continuity, and Disaster Recovery

  •    Business Continuity And Disaster Recovery
  •    Assessing CSP Security
  •    Equipment Maintenance
  •    Recommendations

Module 8: Data Center Operations

  •    Data Center Operations

Module 9: Incident Response

  •    Incident Response
  •    Testing
  •    IaaS
  •    C.E.R.- Containment, Eradication, And Recovery

Module 10: Application Security

  •    Application Security
  •    Security Testing
  •    Audit Compliance
  •    Security Assurance Recommendations

Module 11: Encryption and Key Management

  •    Encryption And Key Management
  •    Content Aware Encryption
  •    Storage Of Keys

Module 12: Identity, Entitlement, and Access Management

  •    Building Access Control
  •    Intro To Identity
  •    Entitlement Process
  •    Trust With Identity
  •    Recommendations For Identity Management

Module 13: Virtualization

  •    Virtualization
  •    Hypervisor And Virtual Machine
  •    Inter-Virtual Machine Attacks
  •    Virtual Machine Encryption
  •    Virtual Machine Recommendations And Requirements

Module 14: Security as a Service

  •    Security As A Service
  •    Security Offerings
  •    Intrusion Detection Prevention
  •    Business Continuity And Disaster Recovery
  •    European CCSK
  •    Top Security Benefits
  •    European Legal Based Issues

CompTIA Cloud Overview Course Content

Domain 1 - Characteristics of Cloud Services from a Business Perspect

  •    Overview
  •    History
  •    The Three Delivery Model Architecture
  •    SaaS
  •    Justification For Cloud
  •    Confidentiality And Availability
  •    Concepts From NIST
  •    On Demand Self-Service
  •    Broad Network Access
  •    Resource Pooling
  •    Measured Service
  •    Service Models
  •    Terms Of Service
  •    Recommendations

Domain 2 - Cloud Computing and Business Value

  •    Reasons For Cloud-Agility-Part1
  •    Reasons For Cloud-Agility-Part2
  •    New Business Opportunities

Domain 3 - Technical Perspectives/Cloud Types

  •    Technical Perspectives Cloud Types
  •    Sources
  •    Security Risk
  •    Technical Risk And Solutions

Domain 4 - Steps to Successful Adoption of Cloud

  •    Steps To Adopting Cloud-Part1
  •    Steps To Adopting Cloud-Part2
  •    Steps To Adopting Cloud-Part3

Domain 5 - Impact and Changes of Cloud Computing on IT Service Management

  •    Information Security Management System-Part1
  •    Information Security Management System-Part2

Domain 6 - Risks and Consequences of Cloud Computing

  •    Information Management And Security-Part1
  •    Information Management And Security-Part2
  •    The Data Security LifeCycle
  •    Governance
  •    Data Loss Prevention-Part1
  •    Data Loss Prevention-Part2
  •    Protecting Data
  •    Risk Management-Part1
  •    Risk Management-Part2
  •    Risk Management-Part3
  •    Risk Management-Part4
  •    Risk Management-Part5
  •    Recommendations-Part1
  •    Recommendations-Part2
  •    IT Governance
  •    Audit
  •    Recommendations For Audit-Part1
  •    Recommendations For Audit-Part2

EXIN Cloud Computing Course Content

Module 1: The principles of CC

  •    EXIN Overview-Part 1
  •    EXIN Overview-Part 2
  •    EXIN Overview 2-Part 1
  •    EXIN Overview 2-Part 2
  •    The Basics
  •    History Of Cloud
  •    Delivery Model Architectures
  •    Software As A Service
  •    Justification For Cloud Computing
  •    Confidentiality And Availability
  •    Concepts From NIST
  •    Important Characteristics
  •    Broad Network Access
  •    Resource Pooling
  •    Measured Service
  •    Service Models
  •    Terms Of Service
  •    Recommendations
  •    Virtualization
  •    Virtualization Concepts
  •    Inter-Virtual Machine Attacks
  •    Virtual Machine Encryption
  •    Recommendations
  •    Service Models
  •    Business Process
  •    Outsourcing
  •    Software As A Service-Part 1
  •    Software As A Service-Part 2
  •    Risks And Recommendations
  •    Platform As A Service
  •    PaaS Considerations
  •    PaaS Issues
  •    Infrastructure As A Service
  •    Scope Of Control
  •    IaaS Benefits
  •    IaaS Issues And Concerns
  •    IaaS Recommendations
  •    Services Oriented Architecture
  •    Web Services
  •    Infrastructure On Demand
  •    Why Cloud
  •    Collaborative Working
  •    New Business Opportunities

Module 2: Implementing and Managing CC

  •    Implementing And Managing Cloud Computing

Module 3: Using the Cloud

  •    Relevent Technologies In Cloud
  •    Storage Devices-Part 1
  •    Storage Devices-Part 2
  •    Application Programming Interfaces
  •    Traditional Software Model
  •    Impact Of Cloud On Users
  •    Providing Cloud Services
  •    Developing Added Services-Part 1
  •    Developing Added Services-Part 2
  •    Using Cloud Services

Module 4: Security and Compliance

  •    Threats And Controls
  •    Malicious Insiders
  •    Insiders Remediation

Module 5: Evaluation of CC

  •    Why Cloud
  •    Resource Scaling
  •    Quality
  •    Thin Clients
  •    Buying Cloud Services
  •    Pay As You Go Vs Ownership
  •    Establishing Requirements
  •    Contract Terms

EXIN Cloud Computing Course Content

Module 1: The principles of CC

  •    EXIN Overview-Part 1
  •    EXIN Overview-Part 2
  •    EXIN Overview 2-Part 1
  •    EXIN Overview 2-Part 2
  •    The Basics
  •    History Of Cloud
  •    Delivery Model Architectures
  •    Software As A Service
  •    Justification For Cloud Computing
  •    Confidentiality And Availability
  •    Concepts From NIST
  •    Important Characteristics
  •    Broad Network Access
  •    Resource Pooling
  •    Measured Service
  •    Service Models
  •    Terms Of Service
  •    Recommendations
  •    Virtualization
  •    Virtualization Concepts
  •    Inter-Virtual Machine Attacks
  •    Virtual Machine Encryption
  •    Recommendations
  •    Service Models
  •    Business Process
  •    Outsourcing
  •    Software As A Service-Part 1
  •    Software As A Service-Part 2
  •    Risks And Recommendations
  •    Platform As A Service
  •    PaaS Considerations
  •    PaaS Issues
  •    Infrastructure As A Service
  •    Scope Of Control
  •    IaaS Benefits
  •    IaaS Issues And Concerns
  •    IaaS Recommendations
  •    Services Oriented Architecture
  •    Web Services
  •    Infrastructure On Demand
  •    Why Cloud
  •    Collaborative Working
  •    New Business Opportunities

Module 2: Implementing and Managing CC

  •    Implementing And Managing Cloud Computing

Module 3: Using the Cloud

  •    Relevent Technologies In Cloud
  •    Storage Devices-Part 1
  •    Storage Devices-Part 2
  •    Application Programming Interfaces
  •    Traditional Software Model
  •    Impact Of Cloud On Users
  •    Providing Cloud Services
  •    Developing Added Services-Part 1
  •    Developing Added Services-Part 2
  •    Using Cloud Services

Module 4: Security and Compliance

  •    Threats And Controls
  •    Malicious Insiders
  •    Insiders Remediation

Module 5: Evaluation of CC

  •    Why Cloud
  •    Resource Scaling
  •    Quality
  •    Thin Clients
  •    Buying Cloud Services
  •    Pay As You Go Vs Ownership
  •    Establishing Requirements
  •    Contract Terms

EXIN Cloud Computing Course Content

Module 1: The principles of CC

  •    EXIN Overview-Part 1
  •    EXIN Overview-Part 2
  •    EXIN Overview 2-Part 1
  •    EXIN Overview 2-Part 2
  •    The Basics
  •    History Of Cloud
  •    Delivery Model Architectures
  •    Software As A Service
  •    Justification For Cloud Computing
  •    Confidentiality And Availability
  •    Concepts From NIST
  •    Important Characteristics
  •    Broad Network Access
  •    Resource Pooling
  •    Measured Service
  •    Service Models
  •    Terms Of Service
  •    Recommendations
  •    Virtualization
  •    Virtualization Concepts
  •    Inter-Virtual Machine Attacks
  •    Virtual Machine Encryption
  •    Recommendations
  •    Service Models
  •    Business Process
  •    Outsourcing
  •    Software As A Service-Part 1
  •    Software As A Service-Part 2
  •    Risks And Recommendations
  •    Platform As A Service
  •    PaaS Considerations
  •    PaaS Issues
  •    Infrastructure As A Service
  •    Scope Of Control
  •    IaaS Benefits
  •    IaaS Issues And Concerns
  •    IaaS Recommendations
  •    Services Oriented Architecture
  •    Web Services
  •    Infrastructure On Demand
  •    Why Cloud
  •    Collaborative Working
  •    New Business Opportunities

Module 2: Implementing and Managing CC

  •    Implementing And Managing Cloud Computing

Module 3: Using the Cloud

  •    Relevent Technologies In Cloud
  •    Storage Devices-Part 1
  •    Storage Devices-Part 2
  •    Application Programming Interfaces
  •    Traditional Software Model
  •    Impact Of Cloud On Users
  •    Providing Cloud Services
  •    Developing Added Services-Part 1
  •    Developing Added Services-Part 2
  •    Using Cloud Services

Module 4: Security and Compliance

  •    Threats And Controls
  •    Malicious Insiders
  •    Insiders Remediation

Module 5: Evaluation of CC

  •    Why Cloud
  •    Resource Scaling
  •    Quality
  •    Thin Clients
  •    Buying Cloud Services
  •    Pay As You Go Vs Ownership
  •    Establishing Requirements
  •    Contract Terms
Add a review
Currently, we are not accepting new reviews
4.8
Based on 81 reviews
1-5 of 81 reviews
  1. SJ

    good

  2. AA
  3. K
  4. BO
  5. A

    Smooth delivery and easy access to LMS. Good to see that the LMS offers progress tracking. Would be great if badges were offered on completion of courses to share via Credly to future employers.

Your Training Instructor

Dean Bushmiller

Dean Bushmiller

Lead Instructor for Expanding Security

Dean has had fun for the past 20 years learning and teaching everything he can in technology and security. His consulting experience in accounting systems, inventory control, migrations, and patch management has breathed life into his 12 years in the class room. Dean is a courseware developer who specializes in CISSP and security training. He is the lead instructor for Expanding Security and teaches online as his main job. As a non-military person, he is a proud recipient of six mission coins.

default-course image

Subscribe To All-Access
Lock In $16.99 / Month Forever

Gain access to this training and all our other courses with our cost-effective monthly subscription. No obligations. Cancel anytime.

$49.99 $16.99 Monthly

OR

$49.00

today Only: 1-Year For $79.00!

Get 1-year full access to every course, over 2,600 hours of focused IT training, 20,000+ practice questions at an incredible price of only $79.00

Learn CompTIA, Cisco, Microsoft, AI, Project Management & More...