Book Image

Cloud Computing Demystified for Aspiring Professionals

By : David Santana
5 (1)
Book Image

Cloud Computing Demystified for Aspiring Professionals

5 (1)
By: David Santana

Overview of this book

If you want to upskill yourself in cloud computing domains to thrive in the IT industry, then you’ve come to the right place. Cloud Computing Demystified for Aspiring Professionals helps you to master cloud computing essentials and important technologies offered by cloud service providers needed to succeed in a cloud-centric job role. This book begins with an overview of transformation from traditional to modern-day cloud computing infrastructure, and various types and models of cloud computing. You’ll learn how to implement secure virtual networks, virtual machines, and data warehouse resources including data lake services used in big data analytics — as well as when to use SQL and NoSQL databases and how to build microservices using multi-cloud Kubernetes services across AWS, Microsoft Azure, and Google Cloud. You'll also get step-by-step demonstrations of infrastructure, platform, and software cloud services and optimization recommendations derived from certified industry experts using hands-on tutorials, self-assessment questions, and real-world case studies. By the end of this book, you'll be ready to successfully implement cloud computing standardized concepts, services, and best practices in your workplace.
Table of Contents (23 chapters)
1
Part 1: The Journey to Cloud Computing
5
Part 2: Implementing Cloud Deployment Models
9
Part 3: Cloud Infrastructure Services in Action
13
Part 4: Administrating Database and Security on the Cloud
18
Part 5: Roadmap for a Successful Journey in Cloud Engineering

Implementing built-in compute security

In this section, you will learn about implementing built-in compute security controls. We will explore one each of the many AWS, Azure, and Google Cloud compute security control services to protect data at rest and improve the overall data recovery process using built-in compute features.

Figure 12.3 – The defense-in-depth compute security layer

Figure 12.3 – The defense-in-depth compute security layer

Cloud computing’s built-in host security features have matured over the years to the point that we can argue that the cloud is more secure than on-premises services. There are numerous real-world examples in which businesses either did not migrate to the cloud or did not use cloud security frameworks and security updates to improve their security posture and those businesses, which shall remain unnamed, were impacted severely. Nevertheless, this can happen to anyone if they do not adhere to and adopt compliance controls and security best practices.

In Table...