Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Microsoft

Safeguard cloud resources

Microsoft via Microsoft Learn

Overview

  • Module 1: Cloud Admin course from Dr. Majd Sakr at Carnegie Mellon University. Monitoring how your cloud resources are performing is crucial to building reliable cloud applications. This module covers what monitoring is, why you need to do it, and how you can about monitoring your resources.
  • In this module you will:

    • Explain the main argument in favor of continual and consistent monitoring and oversight in cloud-based IT systems
    • Describe the three types of quantitative measurements that play a role in monitoring
    • Understand the mechanics of monitoring platforms that utilize agents to collect and report back information
    • Understand the mechanics of monitoring platforms that rely upon pre-existing sources of information such as service logs to analyze performance
    • Understand the metrics that are the most beneficial to monitoring
    • Learn how measurements are used to judge performance levels
    • Describe the justification for problem ticketing
    • Describe what KPIs are and how they differ from metrics
    • Discuss the concept of “everyday remediation”

    This content is provided in partnership with Dr. Majd Sakr and Carnegie Mellon University.

  • Module 2: Cloud Admin course from Dr. Majd Sakr at Carnegie Mellon University. Keeping your cloud secure means more than just adding permissions to resources. Learn about what cloud security means, including threats, cryptography, and regulation.
  • In this module you will:

    • Understand the importance of risk assessment in implementing cloud security
    • Understand how cloud customers and cloud service providers share responsibility for security
    • List some of the prominent threats to cloud security
    • Understand the role that cryptography plays in securing data
    • Understand the difference between symmetric encryption and asymmetric encryption
    • Understand how public key cryptography facilitates the secure exchange of data
    • Explain the concept of multilayered data security and why it is necessary
    • Explain some of the services offered by data-security platforms and the integrated security services offered by cloud service providers

    In Partnership with Dr. Majd Sakr and Carnegie Mellon University.

  • Module 3: Cloud Admin course from Dr. Majd Sakr at Carnegie Mellon University. What do you do when something goes wrong with your resources on the cloud? How do you prepare for such an issue? Learn about disaster backup and recovery with this module.
  • In this module you will:

    • Understand the meaning of “fault tolerance”
    • List reactive techniques used to achieve fault tolerance in cloud platforms
    • List proactive techniques used to achieve fault tolerance in cloud platforms
    • Understand the backup services offered by leading cloud service providers
    • Understand the role that backup services play in disaster response and recovery
    • Explain the difference between backup services and disaster-recovery services
    • List the service-level objectives that drive disaster-recovery planning
    • List the disaster-recovery services offered by leading cloud service providers
    • Explain what resilience is and how it is measured
    • Explain how resilience contributes to business continuity

    In Partnership with Dr. Majd Sakr and Carnegie Mellon University.

Syllabus

  • Module 1: Monitor cloud resources
    • Introduction
    • Why monitor
    • Monitoring platforms
    • Metrics, indicators, and correlations
    • Remediation planning
    • Summary
  • Module 2: Cloud security
    • Introduction
    • Cloud security responsibilities
    • Threats to cloud security
    • Encryption
    • Data security in the cloud
    • Summary
  • Module 3: Disaster recovery and backup
    • Introduction
    • Failures and fault tolerance
    • Backup services
    • Disaster recovery services
    • Resilience in design and policy
    • Summary

Reviews

Start your review of Safeguard cloud resources

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.