-
Cloud services provide users on-demand access to a shared pool of customizable computing resources, such as network devices, servers, storage, and applications, which may be supplied and released quickly. The usage of 'The Cloud' as a way of storing and distributing data and services is becoming increasingly common as our reliance on mobile devices to access digital services and content rises. It's probable that you've used these technologies to do things like backing up photos on your phone.
-
Cloud-based services are much more than simply storage; they provide businesses and people more flexibility in how IT meets their needs, allowing them to downsize, increase, or diversify their IT usage while lowering the complexity and expense of changing current processes and systems.
-
COVERED-
Reasons why a business would want a cloud service:
Recovery and Backup
Reduced Costs
Flexibility
Scalability
PROS AND CONS OF VIRTUALISATION IN COMPUTING -
Evolution Of Cloud computing
Distributed Computing
Mainframe Computing
Cluster Computing
etc. -
COVERED-
Reasons why a business would want a cloud service:
PROS AND CONS OF VIRTUALISATION IN COMPUTING -
PuTTY - PuTTY is a terminal emulator, serial console, and network file transfer tool that is free and open-source. SCP, SSH, Telnet, rlogin, and raw socket connections are among the network protocols it supports. It also has the ability to connect to a serial port. There is no recognised meaning behind the name "PuTTY."
Cisco Packet tracer (LAN) -
PuTTY is a terminal emulator, serial console, and network file transfer tool that is free and open-source. SCP, SSH, Telnet, rlogin, and raw socket connections are among the network protocols it supports. It also has the ability to connect to a serial port. You may use HyperTerminal to reset the modem or send configuration and diagnostic commands to the modem. These features might assist you in determining if the modem and PC are interacting properly.
-
Cisco Packet Tracer -
Configuring SSH on a cisco router and switch
Understanding different protocols used for different ports -
Last lesson:
Cisco Packet Tracer -
Configuring SSH on a cisco router and switch
Understanding different protocols used for different ports
This lesson:
Creating and configuring remote access VPN -
Cloud CCSK course Introduction
6 Modules Module 1
Domain 1 / Cloud Computing Concepts and architecture
Module 2
Domain 6 / Management plane and business continuity
Domain 7 / Infrastructure security
Domain 8 / Virtualization and Containers -
Module 3:
Managing cloud and security risk
Domain 2 / Governance and enterprise risk management
CCSK Module introduction -
Cloud Assignment one
Task A - An explanation of how IT is currently deployed in the company and how it meets its aims and needs