Why study at TECH?

Specialize in Cloud Computing through a flexible degree, compatible with your daily responsibilities”

##IMAGE##

The ability to store, process and manage data in the cloud has transformed the way businesses operate, enabling process automation, scalability and cost reduction. These benefits have given impetus to the development of the Cloud and its application in all sectors and organizations, regardless of their size. 

In view of this reality, the profile of the computer scientist is of great importance and in recent years has become one of the most in-demand. A favorable scenario that requires specialized professionals who are up to date with the latest trends. This is the origin of this 24-month Grand Master's Degree in Cloud Computing. 

This is an advanced program that will take the graduate on an intensive academic journey through the programming of Cloud Computing architectures, Native Cloud application programming, and container orchestration with Kubernetes and Docker. This degree also covers topics such as storage in Cloud Azure, integration of cloud services, and transformation of IT infrastructures towards Cloud Computing.

Furthermore, the numerous teaching materials will enable students to learn more about security, governance and cybersecurity in Cloud infrastructures, as well as monitoring and backup in a much more agile way. A unique teaching that reduces the long hours of study and memorization, thanks to the Relearning, method, which is another attraction to take this program. 

In this way, through an eminently online and totally flexible academic option, the computer scientist will obtain the knowledge he/she needs to grow in the technology industry. In order to access the content of this degree program at any time of the day, all you need is an electronic device with an Internet connection. An ideal opportunity for quality training compatible with daily responsibilities.

A unique academic option, whose Relearning system will allow you to learn easily and reduce the long hours of study”

This Advanced master’s degree in Cloud Computing contains the most complete and up-to-date program on the market. The most important features include:

  • The development of practical cases presented by rendering experts
  • The graphic, schematic, and practical contents with which they are created, provide scientific and practical information on the disciplines that are essential for professional practice
  • Practical exercises where self-assessment can be used to improve learning
  • Special emphasis on innovative methodologies in the realization of Cloud Computing Project
  • Theoretical lessons, questions to the expert, debate forums on controversial topics, and individual reflection assignments
  • Content that is accessible from any fixed or portable device with an Internet connection

Do you want to be at the forefront of digital transformation? Enroll now in this Grand Master in Cloud Computing and learn how to create innovative solutions for the companies of the future”

Its teaching staff includes professionals from the Cloud Computing, who bring to this program the experience of their work, as well as recognized specialists from reference societies and prestigious universities.

The multimedia content, developed with the latest educational technology, will provide the professional with situated and contextual learning, i.e., a simulated environment that will provide an immersive learning experience designed to prepare for real-life situations.

This program is designed around Problem-Based Learning, whereby the student must try to solve the different professional practice situations that arise throughout the program. For this purpose, the professional will be assisted by an innovative interactive video system created by renowned and experienced experts.

With this degree you will become an expert in programming cloud architectures with the most widely used technologies, such as Azure, AWS and Google Cloud"

##IMAGE##

You will learn how to deploy containers with Kubernetes and Docker, key technologies for the implementation of cloud solutions"

Syllabus

The syllabus of this program has been designed to provide students with the most current knowledge about Cloud Computing. In order to achieve this goal successfully, TECH provides the graduates with pedagogical tools based on video summaries of each topic, detailed videos, case studies and specialized literature that will allow them to further extend this advanced syllabus. In addition, these materials will be available in the Learning Resources Library 24 hours a day, 7 days a week.

##IMAGE##

Access the Virtual Library of this program 24 hours a day, from any digital device with internet connection”

Module 1. Cloud Programming Azure, AWS and Google Cloud Services

1.1. Cloud Cloud Services and Technologies

1.1.1. Cloud Services and Technologies
1.1.2. Cloud Terminology
1.1.3. Reference Cloud Providers

1.2. Cloud Computing

1.2.1. Cloud Computing
1.2.2. Cloud Computing Ecosystem
1.2.3. Types of Cloud Computing

1.3. Cloud Service Models

1.3.1. IaaS Infrastructure as a Service
1.3.2. SaaS Software as a Service
1.3.3. PaaS Platform as a Service

1.4. Cloud Computing Technologies

1.4.1. Virtualization Systems
1.4.2. Service-Oriented Architecture (SOA)
1.4.3. GRID Computing

1.5. Architecture Cloud Computing

1.5.1. Architecture Cloud Computing
1.5.2. Networks Types in Cloud Computing
1.5.3. Cloud Computing Security

1.6. Public Cloud

1.6.1. Public Cloud
1.6.2. Public Cloud Architecture and Costs
1.6.3. Public Cloud. Typology

1.7. Public Cloud

1.7.1. Public Cloud
1.7.2. Architecture and Costs
1.7.3. Public Cloud. Typology

1.8. Hybrid Cloud

1.8.1. Hybrid Cloud
1.8.2. Architecture and Costs
1.8.3. Hybrid Cloud Typology

1.9. Cloud Providers

1.9.1. Amazon Web Services
1.9.2. Azure
1.9.3. Google

1.10. Cloud Security

1.10.1. Infrastructure Security
1.10.2. Operating System and Network Security
1.10.3. Cloud Risk Mitigation

Module 2. Architecture Programming in Cloud Computing

2.1. Cloud Architecture for a University Network Cloud Provider Selection Practical Example

2.1.1. Cloud Architecture Approach for a University Network According to Cloud Provider
2.1.2. Cloud Architecture Components
2.1.3. Analysis of Cloud Solutions According to Proposed Architecture

2.2. Economic Estimation of the Project for the Creation of a University Network Financing

2.2.1. Cloud Provider Selection
2.2.2. Economical Estimation According to Components
2.2.3. Project Financing

2.3. Estimation of Human Resources of the Project Composition of a Software Team

2.3.1. Composition of the Software Development Team
2.3.2. Roles in a Development Team Typology
2.3.3. Assessment of the Economic Estimation of the Project

2.4. Execution Schedule and Project Documentation

2.4.1. Agile Project Schedule
2.4.2. Project Feasibility Documentation
2.4.3. Documentation to Be Provided for Project Execution

2.5. Legal Implications of a Project

2.5.1. Legal Implications of a Project
2.5.2. Data Protection Policy

2.5.2.1. GDPR General Data Protection Regulation

2.5.3. Responsibility of the Integrating Company

2.6. Design and Creation of a Cloud Blockchain Network for the Proposed Architecture

2.6.1. Blockchain – Hyperledger Fabric
2.6.2. Hyperledger Fabric Basics
2.6.3. Design of an International University Hyperledger Fabric Network

2.7. Proposed Architecture Expansion Approach

2.7.1. Creation of the Proposed Architecture with Blockchain
2.7.2. Proposed Architecture Expansion
2.7.3. Configuration of a High Availability Architecture

2.8. Administration of the Proposed Cloud Architecture

2.8.1. Adding a New Participant to the Initial Proposed Architecture
2.8.2. Administration of the Cloud Architecture
2.8.3. Project Logic Management – Smart Contracts

2.9. Administration and Management of Specific Components in the Proposed Cloud Architecture

2.9.1. Management of Network Certificates
2.9.2. Security Management of Various Components: CouchDB
2.9.3. Blockchain Network Nodes Management

2.10. Modification of an Initial Basic Installation in the Creation of a Blockchain Network

2.10.1. Adding a Node to the Blockchain Network
2.10.2. Addition of Extra Data Persistence
2.10.3. Smart Contracts Management
2.10.4. Addition of a New University to the Existing Network

Module 3. Cloud Azure Storage

3.1. MV Installation in Azure

3.1.1. Creation Commands
3.1.2. Visualization Commands
3.1.3. Modification Commands

3.2. Azure Blobs

3.2.1. Types of Blobs
3.2.2. Container
3.2.3. Azcopy
3.2.4. Reversible Blob Suppression

3.3. Managed Disk and Storage in Azure

3.3.1. Managed Disk
3.3.2. Security/Safety
3.3.3. Cold Storage
3.3.4. Replication

3.3.4.1. Local Redundancy
3.3.4.2. Redundancy in a Zone
3.3.4.3. Geo-Redundant

3.4. Azure Tables, Queues, Files

3.4.1. Tables
3.4.2. Queues
3.4.3. Files

3.5. Azure Encryption and Security

3.5.1. Storage Service Encryption (SSE)
3.5.2. Access Codes

3.5.2.1. Shared Access Signature
3.5.2.2. Container-Level Access Policies
3.5.2.3. Access Signature at Blob Level

3.5.3. Azure AD Authentication

3.6. Azure Virtual Network

3.6.1. Subnetting and Matching
3.6.2. Vnet to Vnet
3.6.3. Private Link
3.6.4. High Availability

3.7. Types of Azure Connections

3.7.1. Azure Application Gateway
3.7.2. Site-to-Site VPN
3.7.3. Point-to-Site VPN
3.7.4. ExpressRoute

3.8. Azure Resources

3.8.1. Blocking Resources
3.8.2. Resource Movement
3.8.3. Removal of Resources

3.9. Azure Backup

3.9.1. Recovery Services
3.9.2. Azure Agent Backup
3.9.3. Azure Backup Server

3.10. Solutions Development

3.10.1. Compression, Deduplication, Replication
3.10.2. Recovery Services
3.10.3. Disaster Recovery Plan

Module 4. Cloud Environments: Security/Safety

4.1. Cloud Environments: Security/Safety

4.1.1. Cloud Environments, Security

4.1.1.1. Cloud Security
4.1.1.2. Security Position

4.2. Cloud Shared Security Management Model

4.2.1. Security Elements Managed by Vendor
4.2.2. Elements Managed by Customer
4.2.3. Security Strategy

4.3. Cloud Prevention Mecanisms

4.3.1. Authentication Management Systems
4.3.2. Authorization Management System Access Policies
4.3.3. Key Management Systems

4.4. Cloud Infrastructure Data Security

4.4.1. Securing Storage Systems:

4.4.1.1. Block
4.4.1.2. Object Storage
4.4.1.3. File Systems

4.4.2. Protection of Database Systems
4.4.3. Securing Data in Transit

4.5. Cloud Infrastructure Protection

4.5.1. Secure Network Design and Implementation
4.5.2. Security in Computing Resources
4.5.3. Tools and Resources for Infrastructure Protection

4.6. Application Risks and Vulnerabilities

4.6.1. Application Development Risks
4.6.2. Critical Safety Risks
4.6.3. Vulnerabilities in Software Development

4.7. Application Defenses against Attacks

4.7.1. Application Development Design
4.7.2. Securitization through Verification and Testing
4.7.3. Secure Programming Practices

4.8. DevOps Environment Security

4.8.1. Security in Virtualized and Container Environments
4.8.2. Security in Development and Operations (DevSecOps)
4.8.3. Best Security Practices in Containerized Production Environments

4.9. Security in Public Clouds

4.9.1. AWS
4.9.2. Azure
4.9.3. Oracle Cloud

4.10. Security Regulations, Governance and Compliance

4.10.1. Security Compliance
4.10.2. Risk Management
4.10.3. Processes in Organizations

Module 5. Container Orchestration: Kubernetes and Docker

5.1. Basis of Application Architectures

5.1.1. Current Application Models
5.1.2. Application Execution Platforms
5.1.3. Container Technologies

5.2. Docker Architecture

5.2.1. Docker Architecture
5.2.2. Docker Architecture Installation
5.2.3. Commands Local Project

5.3. Docker Architecture Storage Management

5.3.1. Image and Register Management
5.3.2. Docker Networks
5.3.3. Storage Management

5.4. Advanced Docker Architecture

5.4.1. Docker Compose
5.4.2. Docker in Organization
5.4.3. Docker Adoption Example

5.5. Kubernetes Architecture

5.5.1. Kubernetes Architecture
5.5.2. Kubernetes Deployment Elements
5.5.3. Distributions and Managed Solutions
5.5.4. Installation and Environment

5.6. Kubernetes Architecture Kubernetes Development

5.6.1. Tools for K8s Development
5.6.2. Imperative vs. Declarative Mode
5.6.3. Application Deployment and Exposure

5.7. Kubernetes in Enterprise Environments

5.7.1. Data Persistence
5.7.2. High Availability, Scaling and Networking
5.7.3. Kubernetes Security
5.7.4. Kubernetes Management and Monitoring

5.8. K8s Distributions

5.8.1. Deployment Environment Comparison
5.8.2. Deployment on GKE, AKS, EKS or OKE
5.8.3. On Premise Deployment

5.9. Rancher and Openshift

5.9.1. Rancher
5.9.2. Openshift
5.9.3. Openshift: Configuration and Application Deployment

5.10. Kubernetes Architecture and Containers Updates

5.10.1. Open Application Model
5.10.2. Tools for Deployment Management in Kubernetes Environments
5.10.3. References to Other Projects and Trends

Module 6. Native Cloud Application Programming

6.1. Cloud Native Technologies

6.1.1. Cloud Native Technologies
6.1.2. Cloud Native Computing Foundation
6.1.3. Cloud-Native Development Tools

6.2. Cloud-Native Application Architecture

6.2.1. Cloud-Native Application Design
6.2.2. Cloud-Native Architecture Components
6.2.3. Legacy Application Modernization

6.3. Containerization

6.3.1. Container-Oriented Development
6.3.2. Development with Microservices
6.3.3. Tools for Teamwork

6.4. DevOps and Continuous Integration and Deployments

6.4.1. Continuous Integration and Deployments: CI/CD
6.4.2. Tools Ecosystem for CI/CD
6.4.3. Creating a CI/CD Environment

6.5. Observability and Platform Analysis

6.5.1. Cloud-Native Application Observability
6.5.2. Tools for Monitoring, Logging  and Tracing
6.5.3. Implementation of an Observability and Analysis Environment

6.6. Data Management in Cloud-Native Applications

6.6.1. Cloud-Native Database
6.6.2. Data Management Patterns
6.6.3. Technologies to Implement Data Management Patterns

6.7. Communications in Cloud-Native Applications

6.7.1. Synchronous and Asynchronous Communications
6.7.2. Technologies for Synchronous Communications Patterns
6.7.3. Technologies for Asynchronous Communications Patterns

6.8. Resilience, Security and Performance in Cloud-Native Applications

6.8.1. Application Resilience
6.8.2. Secure Development in Cloud-Native Applications
6.8.3. Application Performance and Scalability

6.9. Serverless

6.9.1. Cloud Native Serverless
6.9.2. Serverless Platforms
6.9.3. Use Cases for Serverless Development

6.10. Deployment Platforms

6.10.1. Cloud-Native Development Environments
6.10.2. Orquestration Platforms Comparison
6.10.3. Infrastructure Automation

Module 7. Cloud Programming Data Governance

7.1. Data Management

7.1.1. Data Management
7.1.2. Data Handling Ethics

7.2. Data Governance

7.2.1. Classification. Access Control
7.2.2. Data Processing Regulation
7.2.3. Data Governance Value

7.3. Data Governance Data Science

7.3.1. Lineage
7.3.2. Metadata
7.3.3. Data Catalog Business Glossary

7.4. User and Processes in Data Governance

7.4.1. Users

7.4.1.1. Roles and Responsibilities

7.4.2. Processes

7.4.2.1. Data Enrichment

7.5. Data Life Cycle in the Enterprise

7.5.1. Data Creation
7.5.2. Data Processing
7.5.3. Data Storage
7.5.4. Data Use
7.5.5. Data Destruction

7.6. Data Quality

7.6.1. Quality in Data Governance
7.6.2. Data Quality in Analytics
7.6.3. Data Quality Techniques

7.7. Data Governance in Transit

7.7.1. Data Governance in Transit

7.7.1.1. Lineage

7.7.2. The Forth Dimension

7.8. Data Protection

7.8.1. Access Levels
7.8.2. Classification
7.8.3. Compliance Regulations

7.9. Data Governance Monitoring and Measurement

7.9.1. Data Governance Monitoring and Measurement
7.9.2. Lineage Monitoring
7.9.3. Data Quality Monitoring

7.10. Data Governance Tools

7.10.1. Talend
7.10.2. Collibra
7.10.3. IT specialist

Module 8. Real-Time Cloud Programming. Streaming

8.1. Processing and Structuring of Streaming Information

8.1.1. Data Collection, Structuring, Processing, Analysis, and Interpretation Process
8.1.2. Streaming Data Processing Techniques
8.1.3. Streaming Processing
8.1.4. StreamingProcessing Use Cases

8.2. Statistics for Understanding Streaming Data Flows

8.2.1. Descriptive Statistics
8.2.2. Probability Calculation
8.2.3. Inference

8.3. Programmng with Python

8.3.1. Typology, Conditionals, Functions and Loops
8.3.2. Numpy, Matplotlib, Dataframes, Csv Files and Json Formats
8.3.3. Sequences: Lists, Loops, Files and Dictionaries
8.3.4. Mutability, Exceptions and Higher-Order Functions

8.4. R Programming

8.4.1. R Programming
8.4.2. Vector and Factors
8.4.3. Matrix and Array
8.4.4. Lists and Data Frame
8.4.5. Functions

8.5. SQL Database for Streaming Data Processing

8.5.1. SQL Databases
8.5.2. Entity-Relationship Model
8.5.3. Relational Model
8.5.4. SQL

8.6. Non-SQL Database for Streaming Data Processing

8.6.1. Non-SQL Databases
8.6.2. MongoDB
8.6.3. MongoDB Architecture
8.6.4. CRUD Operations
8.6.5. Find, Projections, Index Aggregation and Cursors
8.6.6. Data Model

8.7. Data Mining and Predictive Modeling

8.7.1. Multivariate Analysis
8.7.2. Dimension Reduction Techniques
8.7.3. Cluster Analysis
8.7.4. Sets

8.8. Maching learning for Streaming Data Processing

8.8.1. Maching learning and Advanced Predictive Modeling
8.8.2. Neural Networks
8.8.3. Deep Learning
8.8.4. Bagging and Random Forest
8.8.5. Gradient Bosting
8.8.6. SVM
8.8.7. Assembly Methods

8.9. Streaming Data Processing Technologies

8.9.1. Spark Streaming
8.9.2. Kafka Streaming
8.9.3. Flink Streaming

8.10. Apache Spark Streaming

8.10.1. Apache Spark Streaming
8.10.2. Spark Components
8.10.3. Spark Architecture
8.10.4. RDD
8.10.5. SPARK SQL
8.10.6. Jobs, Stages and  Tasks

Module 9. Cloud Integration with Web Services: Technologies and Protocols

9.1. Web Standards and Protocols

9.1.1. Web and Web 2.0
9.1.2. Client-Server Architecture
9.1.3. Communication Protocols and Standards

9.2. Web Services

9.2.1. Web Services
9.2.2. Communication Layers and Mecanisms
9.2.3. Service Architectures

9.3. Service Oriented Architectures

9.3.1. ServiceOriented Architecture (SOA)
9.3.2. Web Service Design
9.3.3. SOAP and REST

9.4. SOAP Service Oriented Arquitecture

9.4.1. Structure and Message Passing
9.4.2. Web Service Description Language (WSDL)
9.4.3. Client Implementation and SOAP Servers

9.5. REST Architecture

9.5.1. REST Architectures and RESTful Web Services
9.5.2. HTTP Verbs: Semantics and Purposes
9.5.3. Swagger
9.5.4. Client Implementation and REST Servers

9.6. Microservices-Based Architectures

9.6.1. Monolithic Architectural Approach vs. Use of Microservices
9.6.2. Microservices-Based Architectures
9.6.3. Communication Flows with the Use of Microservices

9.7. Invoking APIs from the Client Side

9.7.1. Types of Web Clients
9.7.2. Development Tools for Web Services Processing
9.7.3. Cross-Origin Resources (CORS)

9.8. API Invocation Security

9.8.1. Web Services Security
9.8.2. Authentication and Authorization
9.8.3. Authentication Methods Based on the Degree of Security

9.9. Cloud Provider Application Integration

9.9.1. Cloud Computing Suppliers
9.9.2. Platform Services
9.9.3. Services Oriented to the Implementation/Consumption of Web Services

9.10. Implementation of Bots and Wizards

9.10.1. Use of Bots
9.10.2. Use of the Bots Web Service
9.10.3. Implementation of Chatbots and Web Assistants

Module 10. Cloud Programming Project Management and Product Verification

10.1. Waterfall Methodologies

10.1.1. Classification of Methodologies
10.1.2. Waterfall Model Waterfall
10.1.3. Strength and Weakness
10.1.4. Model Comparison Waterfall vs. AGILE

10.2. Agile Methodology

10.2.1. Agile Methodology
10.2.2. The Agile Manifesto
10.2.3. Use of Agile

10.3. Scrum Methodology

10.3.1. Scrum Methodology

10.3.1.1. Use of Scrum

10.3.2. Scrum Events
10.3.3. Scrum Artifacts
10.3.4. Scrum Guide

10.4. Agile Inception Desk

10.4.1. Agile Inception Desk
10.4.2. Inception Desk Phases

10.5. Impact Mapping Technique

10.5.1. Impact Mapping
10.5.2. Use of Impact Mappig
10.5.3. Impact Mapping Structure

10.6. User Stories

10.6.1. User Stories
10.6.2. Writing User Stories
10.6.3. User Story Hierarchy
10.6.4. Use Story Mapping

10.7. Test Qa Manual

10.7.1. Testing Manual
10.7.2. Validation and Verification Differences
10.7.3. Manual Tests Typology
10.7.4. UAT User Acceptance Testing
10.7.5. UAT and Alpha & Beta Testing
10.7.6. Software Quality

10.8. Automatic Tests

10.8.1. Automatic Tests
10.8.2. Manual Tests vs Automatic
10.8.3. The Impact of the Automatic Test
10.8.4. The Result of Applying Automation
10.8.5. The Quality Wheel

10.9. Functional and Non-Functional Testing

10.9.1. Functional and Non-Functional Testing
10.9.2. Functional Tests

10.9.2.1. Unit Tests
10.9.2.2. Integration Tests
10.9.2.3. Regression Testing
10.9.2.4. Smoke Tests
10.9.2.5. Mono Tests
10.9.2.6. Sanitation Tests

10.9.3. Non-Functional Tests

10.9.3.1. Load Testing
10.9.3.2. Performance Testing
10.9.3.3. Security Tests
10.9.3.4. Configuration Tests
10.9.3.5. Stress Tests

10.10. Verification Methods and Tools

10.10.1. Heat Map
10.10.2. Eye Tracking
10.10.3. Scroll Maps
10.10.4. Movement Maps
10.10.5. Confetti Maps
10.10.6. Test A/B
10.10.7. Blue & Green Deployment Method
10.10.8. Canary Release Method
10.10.9. Tool Selection
10.10.10. Analytical Tools

Module 11. Transformation of IT Infrastructures Cloud Computing

11.1. Cloud Computing Cloud Computing Adoption

11.1.1. Computing
11.1.2. Cloud Computing Adoption
11.1.3. Types of Cloud Computing

11.2. Cloud Computing Adoption. Adoption Factors

11.2.1. Adoption Factors of Cloud Infrastructures
11.2.2. Uses and Services
11.2.3. Evolution

11.3. Cloud Computing Infrastructures

11.3.1. Cloud Computing Infrastructures
11.3.2. Types of Infrastructures (IaaS, PaaS, SaaS)
11.3.3. Types of Implementation (private, public, hybrid)
11.3.4. Elements (hardware, storage, network)

11.4. Cloud Computing Infrastructure: Operation

11.4.1. Virtualisation
11.4.2. Automation
11.4.3. Management

11.5. Cloud Computing Ecosystem

11.5.1. Observability and Analysis
11.5.2. Procurement
11.5.3. Orchestration and Management
11.5.4. Cloud Platforms

11.6. Services Management in Cloud Infrastructures

11.6.1. Service Orientation
11.6.2. Standard and Ecosystem
11.6.3. Types of Services

11.7. Cloud Infrastructure Management Automation

11.7.1. Ecosystem
11.7.2. DevOps Culture
11.7.3. Infrastructure as Code (Terraform, Ansible, Github, Jenkins)

11.8. Security in Cloud Infrastructures

11.8.1. Ecosystem
11.8.2. DevSecOps Culture
11.8.3. Data Science

11.9. Preparation of the Cloud Infrastructure Management Environment

11.9.1. Data Science
11.9.2. Preparation of the Environment
11.9.3. First Steps

11.10. Cloud Infrastructures Future and Evolution

11.10.1. Cloud Infrastructures Challenges
11.10.2. Evolution of Cloud Infrastructures
11.10.3. Challenges in Security and Complaince

Module 12. Infrastructure as a Service (IaaS)

12.1. Cloud Computing Abstraction Layers and Their Management

12.1.1. Abstraction Core Concepts
12.1.2. Services Models
12.1.3. Management of Cloud Services. Benefits

12.2. Construction of Architecture. Core Decisions

12.2.1. HDDC and SDDC. Hypercompetition
12.2.2. Market
12.2.3. Working Model amd Professional Profiles Changes

12.2.3.1. Cloudbroker Figure

12.3. Digital Transformation and Cloud Infrastructures

12.3.1. Cloud Work Demo
12.3.2. The Role of the Navigator as Tool
12.3.3. New Device Concept
12.3.4. Advanced Architectures and the Role of the CIO

12.4. Agile Management in Cloud Infrastructures

12.4.1. Life Cycle of New Services and Competitiveness
12.4.2. Development Methodology of Apps and Microservices
12.4.3. Relationship between Development and IT Transactions

12.4.3.1. Use of Cloud as Support

12.5. Cloud Computing Resources I. Identity, Storage and Domain Management

12.5.1. Identity and Access Management
12.5.2. Secure Data Storage, Flexible File and Database Storage
12.5.3. Domain Management

12.6. Cloud Computing Resources II. Network, Infrastructure and Monitoring Resources

12.6.1. Private Virtual Network
12.6.2. Cloud Computing Capabilities
12.6.3. Monitoring

12.7. Cloud Computing Resources III. Automation

12.7.1. Serverless Code Execution
12.7.2. Message Queuing
12.7.3. Workflow Services

12.8. Cloud Computing Resources IV. Other Services

12.8.1. Notification Queuing
12.8.2. Streaming  Services and Transcoding Technologies
12.8.3. Turnkey Solution to Publish APIs for External and Internal Consumers

12.9. Cloud V Computing Resources. Data-Centric Services

12.9.1. Data Analytics Platforms and Automation of IT Manual Task
12.9.2. Data Migration
12.9.3. Hybrid Cloud

12.10. LaaS Services Practice Lab

12.10.1. Exercise 1
12.10.2. Exercise 2
12.10.3. Exercise 3

Module 13. Storage and Databases in Cloud Infrastructures

13.1. Cloud Storage Infraestucture

13.1.1. Cloud Storage Fundamentals
13.1.2. Cloud Storage Advantages
13.1.3. Operation

13.2. Types of Cloud Storage

13.2.1. SaaS
13.2.2. IaaS

13.3. Cloud Storage Use Cases

13.3.1. Data Analysis
13.3.2. Backup and Archiving
13.3.3. Software Development

13.4. Cloud Storage Security

13.4.1. Security in the Transport Layer
13.4.2. Storage Security
13.4.3. Storage Encryption

13.5. Cloud Storage Analysis

13.5.1. Profitability
13.5.2. Agility and Scalability
13.5.3. Administration

13.6. Infrastructure of Cloud Database

13.6.1. Fundamentals of Databases
13.6.2. Analysis of Databases
13.6.3. Cloud Database Classification

13.7. Infrastructure of Cloud Database

13.7.1. Relational Databases
13.7.2. NO-SQL Databases
13.7.3. OnCloud Databases

13.8. The use cases of Infrastructure of Cloud Database

13.8.1. Data Storage
13.8.2. Data Analysis. IA.ML
13.8.3. Big Data

13.9. Safety Infrastructure of Cloud Database

13.9.1. Access Control ACL, IAM, SG
13.9.2. Data Encryption
13.9.3. Audits

13.10. Infrastructure of Cloud Database

13.10.1. Backups of Databases
13.10.2. Migration of Databases
13.10.3. Optimization of Databases

Module 14. Network DevOps and Network Architectures in Cloud infrastructures

14.1. Network DevOps (NetOps)

14.1.1. Network DevOps (NetOps)
14.1.2. NetOps Methodology
14.1.3. NetOps Benefits

14.2. Network DevOps Fundamentals

14.2.1. Networking Fundadamentals
14.2.2. OSI TCP/IP Model, CIDR and Subnetting
14.2.3. Main Protocols
14.2.4. HTTP Responses

14.3. Tools and software for Network DevOps

14.3.1. Network Layer Tools
14.3.2. Tools in Application Layer
14.3.3. DNS Tools

14.4. Networking in Cloud Environments: Internal Network Services

14.4.1. VLAN Virtual Networks
14.4.2. Subnetworks
14.4.3. Routing Tables
14.4.4. Availability Zones

14.5. Networking in Cloud Environments: Border Network Services

14.5.1. Internet Gateway
14.5.2. NAT Gateway
14.5.3. Load Balancing

14.6. Networking in Cloud Environments: DNS

14.6.1. DNS Fundamentals
14.6.2. Cloud DNS Services
14.6.3. HA / LB via DNS

14.7. Hybrid / Multitenant Network Connectivity

14.7.1. VPN Site to Site
14.7.2. VPC Peering
14.7.3. Transit Gateway / VPC Peering

14.8. Content Delivery Network Services

14.8.1. Content Delivery Services
14.8.2. AWS CLoudFront
14.8.3. Others CDNs

14.9. Security in Cloud Networks

14.9.1. Security Principles in Networks
14.9.2. Layer 3 and 4 Protection
14.9.3. Layer 7 Protection

14.10. Network Monitoring and Auditing

14.10.1. Monitoring and Auditing
14.10.2. Flow Logs
14.10.3. Monitoring Services: CloudWatch

Module 15. Government in Cloud Infrastructures

15.1. Compliance with in Cloud Environments

15.1.1. Shared Responsibilities Model
15.1.2. Laws, Regulations and Contracts
15.1.3. Audits

15.2. The CISO in Cloud Governance

15.2.1. Organizational Framework. Figures of the CISO in the Organisation
15.2.2. Relationship of the CISO with data processing areas
15.2.3. GRC Strategy against Shadow IT

15.3. Cloud Governance Standard

15.3.1. Previous Assessments
15.3.2. Cloud Service Provider Compliance
15.3.3. Personnel Obligations

15.4. Privacy in Cloud Environments

15.4.1. Consumer and User Relationship with Privacy
15.4.2. Privacy in the Americas, Asia Pacific, Middle East and Africa
15.4.3. Privacy in the European context

15.5. Approvals and regulatory frameworks in Cloud Environments

15.5.1. American Approvals and Frameworks 
15.5.2. Asian Approvals and Frameworks 
15.5.3. Approvals and Frameworks  in Europe

15.6. Certifications and accreditations in Cloud Environments

15.6.1. America and Asia Pacific
15.6.2. Europe, Middle East and Africa
15.6.3. Global

15.7.  Laws / Regulations in Cloud Environments

15.7.1. CLOUD Act,  HIPAA, IRS 1075
15.7.2. ITAR, SEC Rule 17a-4(f), VPAT/Section 508
15.7.3. European Regulation

15.8. Cost control and billing in Cloud Governance

15.8.1. Pay-Per-Use Models Costs
15.8.2. CFO Figure and FinOps Profiles
15.8.3. Expense Control 

15.9. Tools in Cloud Governance

15.9.1. OvalEdge
15.9.2. ManageEngine ADAudit Plus
15.9.3. Erwin Data Governance

15.10. Corporate Governance

15.10.1. Code of Conduct
15.10.2. Complaints Channel
15.10.3. Due Diligence

Module 16. Cybersecurity in Cloud Infrastructures

16.1. Risk in Cloud Environments

16.1.1. Cybersecurity Strategies
16.1.2. Risk-Based Approach
16.1.3. Categorization of risks in Cloud environments

16.2. Security Frameworks in Cloud Environments

16.2.1. Cybersecurity Frameworks and Standards
16.2.2. Technical Cybersecurity Frameworks
16.2.3. Organizational Cybersecurity Frameworks

16.3. Threats Modeling in Cloud Environments

16.3.1. Threat Modeling Process
16.3.2. Phases of Threat Management
16.3.3. STRIDE

16.4. Cybersecurity Data Science at Code Level

16.4.1. Classification of tools
16.4.2. Integrations
16.4.3. Examples of use

16.5. Cybersecurity Controls Integrations in Cloud Environments

16.5.1. Security in Processes
16.5.2. Safety Controls in the Different Phases
16.5.3. Examples of Integrations

16.6.  ZAP Proxy Tool

16.6.1. ZAP Proxy
16.6.2. ZAP Proxy Features
16.6.3. ZAP Proxy Automation

16.7. Automated Vulnerability Scanning in Cloud Environments

16.7.1. Persistent and Automated Vulnerability Scanning
16.7.2. OpenVAS
16.7.3. Vulnerability Analysis in Cloud Environments

16.8. Firewalls in Cloud Environments

16.8.1. Types of Firewalls
16.8.2. Importance of Indicators
16.8.3. OnPremise firewalls and Cloud firewalls

16.9. Security Transport in Cloud Environments

16.9.1. SSL/TLS and Certificates
16.9.2. SSL Audits
16.9.3. The Automation for Certificates

16.10. SIEM in Cloud Environments

16.10.1. SIEM as a Security Core
16.10.2. Cyberintelligence
16.10.3. Examples of SIEM Systems

Module 17. Services Adoption in Cloud Infrastructures

17.1. SIEM as a Security Core

17.1.1. Hardware Configuration
17.1.2. Software Configuration
17.1.3. Network and Security/Safety Configuration

17.2. Cloud Service Configuration

17.2.1. Assigning Permissions to my Cloud Server
17.2.2. Security Configuration
17.2.3. Deployment of a Cloud Service

17.3. Administration of a Cloud Server

17.3.1. Management of Storage Units
17.3.2. Network Management
17.3.3. Security Copies Management

7.4. Persistence

17.4.1. Decoupling our Cloud Service
17.4.2. Configuration of Persistence Service
17.4.3. BB.DD Integration with our CloudService

17.5. Auto Scaling

17.5.1. Image Generation of our Server
17.5.2. Creation of Marketing Groups
17.5.3. Definition of Automatic Scaling Rules

17.6. Balancing Services

17.6.1. Emergency Services
17.6.2. Generation of a Load Balancer
17.6.3. Connection of the Balancer to our Cloud Service

17.7. Content Delivery Services

17.7.1. Content Delivery Services
17.7.2. Content Delivery Service Configuration
17.7.3. CDN Integration with our Cloud Service

17.8. Configuration Parameters and Secrets

17.8.1. Configuration Parameter Management Services
17.8.2. Secrets Management Services
17.8.3. Integrating Configuration and Secrecy Services with our Cloud Service

17.9. Queues Management Services

17.9.1.  Decoupling our Application
17.9.2. Settings of Emergency Services
17.9.3. Integrating the Queue with our Cloud Service

17.10. Notification Queuing

17.10.1. Notification Services in the Cloud
17.10.2. Settings of Notification Services
17.10.3. Notifications Added to our Cloud Service

Module 18. Virtual Desktop Infrastructure (VDI)

18.1. Virtual Desktop Infrastructure (VDI)

18.1.1. The VDI. Operation
18.1.2. Advantages and Disadvantages of VDI
18.1.3. Common VDI Usage Scenarios

18.2. Hybrid and Cloud VDI Architectures

18.2.1. Hybrid VDI Architectures
18.2.2. Cloud-Based Implementation
18.2.3. Clouds VDI Management

18.3. Design and Planning of a VDI Implementation

18.3.1. Hardware and Software Selection
18.3.2. Network and Storage Infrastructure Design
18.3.3. Implementation Planning and Scaling

18.4. VDI Management

18.4.1. VDI Set-up and Configuration
18.4.2. Desktop Image and Application Management
18.4.3. Safety and compliance management
18.4.4. Availability and Performance Management

18.5. Integration of Applications and Peripherals in the VDI

18.5.1. Enterprise Application Integration
18.5.2. Integration of Peripherals and Devices
18.5.3. VDI Integration with Video Conferencing and Instant Messaging Solutions
18.5.4. VDI Integration with Online Collaboration Platforms

18.6. Optimization and Improvement of VDI

18.6.1. Optimization of Quality Service and Performance
18.6.2. Improved and scalability Efficiency
18.6.3. Improve User Experience Final Assessment

18.7. VDI Life Cycle Management

18.7.1. Hardware and Software Life Cycle Management
18.7.2. Infrastructure Migration and Replacement Management
18.7.3. Support and Maintenance Management

18.8. Cloud Security Infrastructure and User Data Protection

18.8.1. Security in the the VDI Networks
18.8.2. Protection of Data Stored in the VDI
18.8.3. User Safety    Protection of Privacy on the Internet

18.9. Advanced VDI Use Cases

18.9.1. Using VDI for Secure Remote Access
18.9.2. Using VDI for Virtualization of Specialized Applications
18.9.3. Using VDI for Mobile Device Management

18.10. Trends and Future of VDI

18.10.1. New Technologies and trends in VDI Fields
18.10.2. Predictions on the Future of VDI
18.10.3. Future Challenges and Opportunities for DV

Module 19. Infrastructure Operation-as-Code (IAC)

19.1. Infrastructure as-Code, IAC

19.1.1. IaC, Infrastructure as Code
19.1.2. Infrastructure Management. Evolution
19.1.3. Advantages of the IaC

19.2. Strategies for TSI Definition

19.2.1. Requirements Analysis
19.2.2. Imperative Definition
19.2.3. Definition of Statement

19.3. IAC Tools

19.3.1. Objectives of the Educational and Vocational Guidance Plan
19.3.2. Proprietary Tools
19.3.3. Third-party Tools

19.4. Evolution of Infrastructure as a Codes

19.4.1. IaC on Kubernetes
19.4.2. Platform as Code
19.4.3. Compliance as Code

19.5. IAC in Devops

19.5.1. Flexible Infrastructures
19.5.2. Continuous Integration
19.5.3. Pipeline as code

19.6. IAC - VPC - Proprietary Tools 

19.6.1. Design of a VPC
19.6.2. Solution Uniqueness
19.6.3. Validation and Analysis 

19.7. IAC - Serverless - Proprietary Tools

19.7.1. Design of a Serverless Solution
19.7.2. Solution Uniqueness
19.7.3. Validation and Analysis 

19.8. IAC - VPC - Third Party Tools

19.8.1. Design of a VPC
19.8.2. Solution Uniqueness
19.8.3. Validation and Analysis 

19.9. IAC -  Serverless - Third Party Tools

19.9.1. Design of a Serverless Solution
19.9.2. Solution Uniqueness
19.9.3. Validation and Analysis 

19.10. IAC Comparison Future Trends

19.10.1. Assessment of Proprietary Solutions
19.10.2. Assessment of Third-Party Solutions
19.10.3. Future lines

Module 20. Monitoring and Backup of Cloud Infrastructures

20.1. Monitoring and Backup of Cloud Infrastructures

20.1.1. Benefits of Backup in Clouds
20.1.2. Backup Types
20.1.3. Benefits of Monitoring in Clouds
20.1.4. Types of Monitoring

20.2. Availability and Security of systems in Cloud Infrastructures

20.2.1. Main Factors
20.2.2. Most Demanded Uses and Services
20.2.3. Evolution

20.3. Types of backup services in Cloud Infrastructures

20.3.1. Total Backup 
20.3.2. Backup increase
20.3.3. Differential Backup
20.3.4. Other Types of Backup

20.4. Strategy, Planning and Management of  Cloud Infrastructure Backups

20.4.1. Establishment of Objectives and Scope
20.4.2. Backup copy type
20.4.3. Good Practices

20.5. Cloud Infrastructure Continuity Flat

20.5.1. Strategy Continuity Plan
20.5.2. Types of Plans
20.5.3. Creating a Continuity Plan

20.6. Monitoring Types in Cloud Infrastructures

20.6.1. Performance Monitoring
20.6.2. Availability Monitoring 
20.6.3. Event Monitoring
20.6.4. Log Monitoring
20.6.5. Network Traffic Monitoring

20.7. Strategy, Tools and Techniques for Monitoring  Cloud Infrastructures

20.7.1. How to set objectives and scope
20.7.2. Types of Monitoring
20.7.3. Good Practices

20.8. Continuous Improvement in Cloud Infrastructures

20.8.1. Continuous Improvement in Operations
20.8.2. Key performance metrics (KPIs) in the cloud
20.8.3. Designing a continuous improvement plan in the cloud

20.9. Studies Cases in Cloud Infrastructures

20.9.1. Study Case Backup
20.9.2. Study Case Monitoring
20.9.3. Difficulties and Good Practices

20.10. Cloud Infrastructure Case Studies

20.10.1. Laboratory 1
20.10.2. Laboratory 2
20.10.3. Laboratory 3

##IMAGE##

A program that offers you a practical approach through the numerous case studies in Cloud Infrastructures”

Advanced Master's Degree in Cloud Computing

Cloud computing has become a disruptive technology that has transformed the way companies manage their technology infrastructure and offer digital services. As a leader in technology education, TECH Global University has developed a Advanced Master's Degree in Cloud Computing program for those professionals looking to update and specialize in this constantly evolving area. Through our postgraduate degree, you will gain an in-depth understanding of the concepts, principles and technologies that make up cloud computing, and learn how to implement innovative and scalable cloud solutions that drive digital transformation in organizations.

In our postgraduate certificate, you'll gain practical skills in cloud infrastructure design, implementation and management, cloud security, cloud service management, cloud migration, cloud data analytics and more. Our industry expert faculty will guide you in learning best practices and give you the hands-on experience you need through real-world projects and case studies. Get ready to lead the cloud computing revolution with our Advanced Master's Degree in Cloud Computing and transform your career in the world of technology.