1 / 6

NTC/300 CLOUD TECHNOLOGIES WEEK 1-5

COMPLETE SOLUTION FOR NTC/300 CLOUD TECHNOLOGIES WEEK 1-5<br>https://theacademicessays.com/downloads/complete-solution-ntc-300-cloud-technologies-week-1-5/<br><br>Week-1:Individual: Basic Cloud Overview<br>You are an IT Consultant working with a retail client. Your consulting team has designed and implemented the cloud for the retail client. Your supervisor has asked you to create a FAQ for this client’s local IT department which details the basics of cloud technology. This FAQ should help the organization’s local IT department understand the recent design and implementation of the cloud for their organization. Your table should be constructed using high-level information.<br>Using Microsoft® Word, create a 2- to 4-page FAQ table on the basics of cloud technology. Include the following:<br>Different service types (private and public)<br>Pros and cons of the different service types<br>Cloud delivery methods<br>Cloud deployment models<br>Format your paper consistent with APA guidelines, to include and not be limited to a cover with the proper formatting, an introduction to the scenario being planned and ensure focus to the specifics in the instructions.<br> <br>Week-2.1:Individual: Virtualization Components<br>As a consultant for an IT company, your retail client is having trouble envisioning components of their proposed cloud environment. Your manager has tasked you with creating a diagram which provides a visual of the different components involved in the virtualization process.<br>Create a 1- to 2-page diagram using Visio® describing the different components involved in the virtualization process, such as virtual machine (VM) images, the hypervisor, and the virtualized infrastructure manager (VIM).<br>Note: You may also use free software, such as LucidChart, instead of Visio®.<br>Format to ensure your name and the date submitted is on the submission, and save as a .PDF.<br> <br>Week-3:Learning Team: Cloud Implementation Proposal, Part II<br>Refer to the Project Overview in Week One.<br>Create a 5-slide Microsoft® PowerPoint® presentation which communicates the changes and/or best practices that must be incorporated within the IT development function. Use speaker notest to add the detail to your bullet talking points in the presentation. The development function is critical, since new systems need to be designed for better security than the legacy systems currently use. Include the following:<br>Tech refresh plan<br>Business goals (e.g., increase productivity, reduce cost)<br>Methods for building upon foundational architectures<br>Server consolidation<br>Economies of scale<br>Cloud infrastructure mechanisms<br>Maintenance of existing applications<br>Videos, audio, photos, diagrams, or graphs as appropriate<br>Speaker notes to illuminate the key points of your plan<br>Audio narration within your presentation<br> <br>Week-3.1:Individual: Cloud Databases<br>You are a new database administrator for a large credit card processing company that is moving toward virtualization. One of your first tasks is to research Database Storage and Cloud Computing in order to create a job aid for new direct reports.<br>Using Microsoft® Word, create a 4-page job aid for new direct reports explaining the following:<br>Types of databases<br>Cloud infrastructure mechanisms<br>Foundational cloud architectures<br>The amount of storage used by your company<br>The potential interfaces used in accessing the data<br>Security technologies for data at rest in the cloud<br> <br>Week-4:Learning Team: Cloud Implementation Proposal, Part III<br>Refer to the Project Overview in Week One.<br>Create a 1-page Communication Plan using Microsoft® Word communicating how the organization can manage the integration of security practices and tools with human behavior. Your audience is the entire company. Include the following:<br>Security strategies every employee can implement<br>The best methods to communicate information on security-related issues<br> <br>Week-4.1:Individual: Cloud Security<br>Your organization has a company newsletter. The lead for this newsletter has asked you to write a high-level, IT-related, engaging article which the entire company will read. Remembering there have been several new hires who recently joined your organization, you decide to write about cyber security.<br>Write a 2-page article using Microsoft® Word for publishing in the company newsletter on cyber security. This article should provide the following:<br>Background on cyber security<br>Security fundamentals in the cloud<br>Recommendations on selecting a security modality<br> <br>Week-5:Learning Team: Cloud Implementation Proposal, Final<br>Refer to the Project Overview in Week One.<br>Your Cloud Implementation Proposal presentation should leadership influence the board of directors to consider company security related issues, review current company practices, and increase the IT security budget along with staffing to meet industry standard practices.<br>Consolidate your assignments from Weeks Two, Three, and Four, incorporating faculty feedback and the new inclusions in Week Two and Week Three into a 20- to 25-slide Microsoft® PowerPoint® presentation. Include the following:<br>From Week Two, Cloud Implementation Proposal project plan detailing all the tasks, as well as a timeline and Learning Team member assignments, including:<br>Start date and end date<br>Owner/Learning Team member for each task<br>Delivery models – A discussion of the delivery models that might be used and why<br>Migration overview – A brief overview of the methods recommended for migrating to cloud services<br>New inclusion:<br>Different risks the company must consider (e.g., regulatory, criminal, and others your team considers noteworthy)<br>Note: You may use examples from current newsworthy cases of IT security failures.<br>From Week Three, changes and/or best practices that must be incorporated within the IT development function. This development function is critical, since new systems need to be designed for better security than the legacy systems currently used, including:<br>Tech refresh plan<br>Business goals (e.g., increase productivity, reduce cost)<br>Methods for building upon foundational architectures<br>Server consolidation<br>Economies of scale<br>Cloud infrastructure mechanisms<br>Maintenance of existing applications<br>New inclusion:<br>Changes and/or best practices that must be incorporated within the IT development function<br>Note: This development function is critical, since new systems need to be designed for better security than the legacy systems currently used.<br>From Week Four, how the organization can manage the integration of security practices and tools with human behavior. Your audience is the entire company. Include:<br>How to make security important to everyone<br>The best methods to communicate information on security related issues<br>Lastly, include:<br>Condensed policy, procedures, and security plan<br>Disaster recovery plan<br>Videos, audio, photos, diagrams, or graphs as appropriate<br>Speaker notes to elaborate on the key points of your plan<br>Audio narration within your presentation<br> <br>Week-5.1:Individual: Process Map<br>Reference your assignments from Week Two, Week Three, and Week Four.<br>Cloud computing is a collection of individual technologies that become one integrated technology for deployment.<br>Create a 3-page process map using Visio® showing the various components of cloud computing and who has responsibility for the implementation and support of the cloud. Additionally, include basic cloud essentials, security, virtualization and databases. Be detailed with the use of text boxes, directional lines and text boxes with overview statements as needed to ensure clarity about your presentation of information.<br>Note: Responsible parties can include vendors, in-house IT, outsourced IT, security team, or hybrid group. You may also use free software, such as LucidChart, instead of Visio®.<br>Format to ensure your name and the date submitted is on the submission, and save as a .PDF.<br><br>

DylanOkoth
Download Presentation

NTC/300 CLOUD TECHNOLOGIES WEEK 1-5

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. COMPLETE SOLUTION FOR NTC/300 CLOUD TECHNOLOGIES WEEK 1-5 https://theacademicessays.com/downloads/complete-solution-ntc-300-cloud- technologies-week-1-5/ Week-1:Individual: Basic Cloud Overview You are an IT Consultant working with a retail client. Your consulting team has designed and implemented the cloud for the retail client. Your supervisor has asked you to create a FAQ for this client’s local IT department which details the basics of cloud technology. This FAQ should help the organization’s local IT department understand the recent design and implementation of the cloud for their organization. Your table should be constructed using high-level information. Using Microsoft® Word, create a 2- to 4-page FAQ table on the basics of cloud technology. Include the following: Different service types (private and public) Pros and cons of the different service types Cloud delivery methods Cloud deployment models Format your paper consistent with APA guidelines, to include and not be limited to a cover with the proper formatting, an introduction to the scenario being planned and ensure focus to the specifics in the instructions. Week-2.1:Individual: Virtualization Components As a consultant for an IT company, your retail client is having trouble envisioning components of their proposed cloud environment. Your manager has tasked you

  2. with creating a diagram which provides a visual of the different components involved in the virtualization process. Create a 1- to 2-page diagram using Visio® describing the different components involved in the virtualization process, such as virtual machine (VM) images, the hypervisor, and the virtualized infrastructure manager (VIM). Note: You may also use free software, such as LucidChart, instead of Visio®. Format to ensure your name and the date submitted is on the submission, and save as a .PDF. Week-3:Learning Team: Cloud Implementation Proposal, Part II Refer to the Project Overview in Week One. Create a 5-slide Microsoft® PowerPoint® presentation which communicates the changes and/or best practices that must be incorporated within the IT development function. Use speaker notest to add the detail to your bullet talking points in the presentation. The development function is critical, since new systems need to be designed for better security than the legacy systems currently use. Include the following: Tech refresh plan Business goals (e.g., increase productivity, reduce cost) Methods for building upon foundational architectures Server consolidation Economies of scale Cloud infrastructure mechanisms Maintenance of existing applications Videos, audio, photos, diagrams, or graphs as appropriate Speaker notes to illuminate the key points of your plan Audio narration within your presentation

  3. Week-3.1:Individual: Cloud Databases You are a new database administrator for a large credit card processing company that is moving toward virtualization. One of your first tasks is to research Database Storage and Cloud Computing in order to create a job aid for new direct reports. Using Microsoft® Word, create a 4-page job aid for new direct reports explaining the following: Types of databases Cloud infrastructure mechanisms Foundational cloud architectures The amount of storage used by your company The potential interfaces used in accessing the data Security technologies for data at rest in the cloud Week-4:Learning Team: Cloud Implementation Proposal, Part III Refer to the Project Overview in Week One. Create a 1-page Communication Plan using Microsoft® Word communicating how the organization can manage the integration of security practices and tools with human behavior. Your audience is the entire company. Include the following: Security strategies every employee can implement The best methods to communicate information on security-related issues Week-4.1:Individual: Cloud Security Your organization has a company newsletter. The lead for this newsletter has asked you to write a high-level, IT-related, engaging article which the entire company will read. Remembering there have been several new hires who recently joined your organization, you decide to write about cyber security.

  4. Write a 2-page article using Microsoft® Word for publishing in the company newsletter on cyber security. This article should provide the following: Background on cyber security Security fundamentals in the cloud Recommendations on selecting a security modality Week-5:Learning Team: Cloud Implementation Proposal, Final Refer to the Project Overview in Week One. Your Cloud Implementation Proposal presentation should leadership influence the board of directors to consider company security related issues, review current company practices, and increase the IT security budget along with staffing to meet industry standard practices. Consolidate your assignments from Weeks Two, Three, and Four, incorporating faculty feedback and the new inclusions in Week Two and Week Three into a 20- to 25-slide Microsoft® PowerPoint® presentation. Include the following: From Week Two, Cloud Implementation Proposal project plan detailing all the tasks, as well as a timeline and Learning Team member assignments, including: Start date and end date Owner/Learning Team member for each task Delivery models – A discussion of the delivery models that might be used and why Migration overview – A brief overview of the methods recommended for migrating to cloud services New inclusion: Different risks the company must consider (e.g., regulatory, criminal, and others your team considers noteworthy) Note: You may use examples from current newsworthy cases of IT security failures.

  5. From Week Three, changes and/or best practices that must be incorporated within the IT development function. This development function is critical, since new systems need to be designed for better security than the legacy systems currently used, including: Tech refresh plan Business goals (e.g., increase productivity, reduce cost) Methods for building upon foundational architectures Server consolidation Economies of scale Cloud infrastructure mechanisms Maintenance of existing applications New inclusion: Changes and/or best practices that must be incorporated within the IT development function Note: This development function is critical, since new systems need to be designed for better security than the legacy systems currently used. From Week Four, how the organization can manage the integration of security practices and tools with human behavior. Your audience is the entire company. Include: How to make security important to everyone The best methods to communicate information on security related issues Lastly, include: Condensed policy, procedures, and security plan Disaster recovery plan Videos, audio, photos, diagrams, or graphs as appropriate Speaker notes to elaborate on the key points of your plan Audio narration within your presentation

  6. Week-5.1:Individual: Process Map Reference your assignments from Week Two, Week Three, and Week Four. Cloud computing is a collection of individual technologies that become one integrated technology for deployment. Create a 3-page process map using Visio® showing the various components of cloud computing and who has responsibility for the implementation and support of the cloud. Additionally, include basic cloud essentials, security, virtualization and databases. Be detailed with the use of text boxes, directional lines and text boxes with overview statements as needed to ensure clarity about your presentation of information. Note: Responsible parties can include vendors, in-house IT, outsourced IT, security team, or hybrid group. You may also use free software, such as LucidChart, instead of Visio®. Format to ensure your name and the date submitted is on the submission, and save as a .PDF.

More Related