SOLUTION AVAILABLE AT: http://libraay.com/downloads/ntc-300-cloud-technologies-week-1-5/
Problem:
Week-1:Individual: Basic Cloud Overview
You are an IT Consultant working with a retail client. Your consulting team has designed and implemented the cloud for the retail client. Your supervisor has asked you to create a FAQ for this client’s local IT department which details the basics of cloud technology. This FAQ should help the organization’s local IT department understand the recent design and implementation of the cloud for their organization. Your table should be constructed using high-level information.
Using Microsoft® Word, create a 2- to 4-page FAQ table on the basics of cloud technology. Include the following:
Different service types (private and public)
Pros and cons of the different service types
Cloud delivery methods
Cloud deployment models
Format your paper consistent with APA guidelines, to include and not be limited to a cover with the proper formatting, an introduction to the scenario being planned and ensure focus to the specifics in the instructions.
Week-2.1:Individual: Virtualization Components
As a consultant for an IT company, your retail client is having trouble envisioning components of their proposed cloud environment. Your manager has tasked you with creating a diagram which provides a visual of the different components involved in the virtualization process.
Create a 1- to 2-page diagram using Visio® describing the different components involved in the virtualization process, such as virtual machine (VM) images, the hypervisor, and the virtualized infrastructure manager (VIM).
Note: You may also use free software, such as LucidChart, instead of Visio®.
Format to ensure your name and the date submitted is on the submission, and save as a .PDF.
Week-3:Learning Team: Cloud Implementation Proposal, Part II
Refer to the Project Overview in Week One.
Create a 5-slide Microsoft® PowerPoint® presentation which communicates the changes and/or best practices that must be incorporated within the IT development function. Use speaker notest to add the detail to your bullet talking points in the presentation. The development function is critical, since new systems need to be designed for better security than the legacy systems currently use. Include the following:
Tech refresh plan
Business goals (e.g., increase productivity, reduce cost)
Methods for building upon foundational architectures
Server consolidation
Economies of scale
Cloud infrastructure mechanisms
Maintenance of existing applications
Videos, audio, photos, diagrams, or graphs as appropriate
Speaker notes to illuminate the key points of your plan
Audio narration within your presentation
Week-3.1:Individual: Cloud Databases
You are a new database administrator for a large credit card processing company that is moving toward virtualization. One of your first tasks is to research Database Storage and Cloud Computing in order to create a job aid for new direct reports.
Using Microsoft® Word, create a 4-page job aid for new direct reports explaining the following:
Types of databases
Cloud infrastructure mechanisms
Foundational cloud architectures
The amount of storage used by your company
The potential interfaces used in accessing the data
Security technologies for data at rest in the cloud
Week-4:Learning Team: Cloud Implementation Proposal, Part III
Refer to the Project Overview in Week One.
Create a 1-page Communication Plan using Microsoft® Word communicating how the organization can manage the integration of security practices and tools with human behavior. Your audience is the entire company. Include the following:
Security strategies every employee can implement
The best methods to communicate information on security-related issues
Week-4.1:Individual: Cloud Security
Your organization has a company newsletter. The lead for this newsletter has asked you to write a high-level, IT-related, engaging article which the entire company will read. Remembering there have been several new hires who recently joined your organization, you decide to write about cyber security.
Write a 2-page article using Microsoft® Word for publishing in the company newsletter on cyber security. This article should provide the following:
Background on cyber security
Security fundamentals in the cloud
Recommendations on selecting a security modality
Week-5:Learning Team: Cloud Implementation Proposal, Final
Refer to the Project Overview in Week One.
Your Cloud Implementation Proposal presentation should leadership influence the board of directors to consider company security related issues, review current company practices, and increase the IT security budget along with staffing to meet industry standard practices.
Consolidate your assignments from Weeks Two, Three, and Four, incorporating faculty feedback and the new inclusions in Week Two and Week Three into a 20- to 25-slide Microsoft® PowerPoint® presentation. Include the following:
From Week Two, Cloud Implementation Proposal project plan detailing all the tasks, as well as a timeline and Learning Team member assignments, including:
Start date and end date
Owner/Learning Team member for each task
Delivery models – A discussion of the delivery models that might be used and why
Migration overview – A brief overview of the methods recommended for migrating to cloud services
New inclusion:
Different risks the company must consider (e.g., regulatory, criminal, and others your team considers noteworthy)
Note: You may use examples from current newsworthy cases of IT security failures.
From Week Three, changes and/or best practices that must be incorporated within the IT development function. This development function is critical, since new systems need to be designed for better security than the legacy systems currently used, including:
Tech refresh plan
Business goals (e.g., increase productivity, reduce cost)
Methods for building upon foundational architectures
Server consolidation
Economies of scale
Cloud infrastructure mechanisms
Maintenance of existing applications
New inclusion:
Changes and/or best practices that must be incorporated within the IT development function
Note: This development function is critical, since new systems need to be designed for better security than the legacy systems currently used.
From Week Four, how the organization can manage the integration of security practices and tools with human behavior. Your audience is the entire company. Include:
How to make security important to everyone
The best methods to communicate information on security related issues
Lastly, include:
Condensed policy, procedures, and security plan
Disaster recovery plan
Videos, audio, photos, diagrams, or graphs as appropriate
Speaker notes to elaborate on the key points of your plan
Audio narration within your presentation
Week-5.1:Individual: Process Map
Reference your assignments from Week Two, Week Three, and Week Four.
Cloud computing is a collection of individual technologies that become one integrated technology for deployment.
Create a 3-page process map using Visio® showing the various components of cloud computing and who has responsibility for the implementation and support of the cloud. Additionally, include basic cloud essentials, security, virtualization and databases. Be detailed with the use of text boxes, directional lines and text boxes with overview statements as needed to ensure clarity about your presentation of information.
Note: Responsible parties can include vendors, in-house IT, outsourced IT, security team, or hybrid group. You may also use free software, such as LucidChart, instead of Visio®.
Format to ensure your name and the date submitted is on the submission, and save as a .PDF.
SOLUTION AVAILABLE AT: http://libraay.com/downloads/ntc-300-cloud-technologies-week-1-5/