Online Project Certificate in Multi Cloud Network Architecture (AWS, GCP, Azure)
Learn Multi Cloud Network Architecture and gain technical design expertise in AWS, GCP and Azure Cloud Network Services.
On Premise and Public Cloud Network Service Integration to Support, Cybersecurity and Vulnerability Management projects for Security Scanning and hosting third party Vulnerability Scanning solutions
AWS, Azure and GCP Cloud Network Integration for creating Machine Learning, Data Mining, Security Scanning, Artificial Intelligence Data assets for Threat Intelligence
Hybrid AWS, GCP, Azure Cloud Integration between IaaS, PaaS, and SaaS integration across third party, on premise and legacy network environments
Migration of legacy infrastructure across, GCP, AWS and Azure Cloud Infrastructure
AWS, GCP and Azure Container Scanning of Cloud Infrastructure, Application and Data Asset within on premise environment to identify Security Vulnerabilities
Deployment of Security Testing Tools such as Checkmarx, Tenable IO, Nessus, Aquasec, Netsparker etc within a Multi Cloud environment to perform, Mobile, Infrastructure, Application Security Testing
Cloud Security Native Scanning of On premise AWS, GCP, Azure Container Registries to identify CVE Vulnerabilities and develop Threat Intelligence and Risk Scoring
Are you experiencing any of the following blockers in your Architecture career ?
Our project based training can help address all of the above blockers and fast track your learning and design capabilities and help you get your design documentations over the fence.
AWS, GCP, Azure Networking Fundamentals with particular emphasis on the following domains:
Technical Mastery of AWS, Azure, GCP Foundational Networking Concepts
GCP Network Architecture comprising of VPCs, High availability, failover, and disaster recovery strategies, DNS strategy (e.g., on-premises, Cloud DNS), Security and data exfiltration requirements,Load balancing Hybrid connectivity, Container networking, IAM roles, SaaS, PaaS, and IaaS services, Microsegmentation for security purposes (e.g., using metadata, tags, service accounts)
Designing GCP Virtual Private Cloud (VPC) instances, considerations include, IP address management and bring your own IP (BYOIP) Standalone vs. Shared VPC, Multiple vs. single, Regional vs. multi-regional, VPC Network Peering, Firewalls (e.g., service account-based, tag-based) Custom routes. Using managed services (e.g., Cloud SQL, Memorystore).
Designing GCP hybrid and multi-cloud network, considerations include ; Dedicated Interconnect vs. Partner Interconnect, Multi-cloud connectivity , Direct Peering, IPsec VPN, Failover and disaster recovery strategy, Regional vs. global VPC routing mode, Accessing multiple VPCs from on-premises locations (e.g., Shared VPC, multi-VPC peering topologies), Bandwidth and constraints provided by hybrid connectivity solutions, Accessing Google Services/APIs privately from on-premises locations, IP address management across on-premises locations and cloud, DNS peering and forwarding
Designing Google Kubernetes Engine clusters, considerations include ; VPC-native clusters using alias IPs , Clusters with Shared VPC , Creating Kubernetes Network Policies, Private clusters and private control plane endpoints, Adding authorized networks for cluster control plane endpoints
GCP Designing firewall rules, considerations include; Target network tags and service accounts, Rule priority, Network protocols, Ingress and egress rules, Firewall rule logging, Firewall Insights, Hierarchical firewalls
GCP Designing VPC Service Controls, considerations include: Creating and configuring access levels and service perimeters, VPC accessible services, Perimeter bridges, Audit logging, Dry run mode
Designing GCP load balancing, considerations include, Backend services and network endpoint groups (NEGs), Firewall rules to allow traffic and health checks to backend services, Health checks for backend services and target instance groups, Configuring backends and backend services with balancing methods, session affinity, and capacity scaling/scaler, TCP and SSL proxy load balancers, Load balancers (e.g., External TCP/UDP Network Load Balancing, Internal TCP/UDP Load Balancing, External HTTP(S) Load Balancing, Internal HTTP(S) Load Balancing), Protocol forwarding, Accommodating workload increases using autoscaling vs. manual scaling
Designing GCP Cloud Armor policies, considerations include: Security policies, Web application firewall (WAF) rules (e.g., SQL injection, cross-site scripting, remote file inclusion), Attaching security policies to load balancer backends
Designing GCP Hybrid Cloud Services, considerations include Hybrid Connectivity, Cloud CDN, Cloud DNS, Cloud NAT, and Multi Packet Network Inspection Services, and Managing, monitoring, and optimizing network operations
Gain Technical Mastery in AWS, GCP, Azure Networking Services
Designing AWS Networking Services considerations include ,API Gateway, App Mesh, Client VPN, AWS Cloud Map ,Amazon CloudFront ,AWS Direct Connect, Elastic Load Balancing, Global Accelerator, PrivateLink, Amazon Route 53 , AWS Site-to-Site VPN, AWS Transit Gateway. Amazon VPC
Designing AWS Serverless Services, considerations include: EventBridge (Amazon CloudWatch Events,Fargate, Lambda, Amazon Simple Notification Service (Amazon SNS),Amazon Simple Queue Service (Amazon SQS)Amazon Simple Storage Service (Amazon S3)
Design Security, identity, and compliance services considerations include: Firewall Manager, Identity and Access Management (IAM) Network Firewall, Resource Access Manager (AWS RAM, Shield, WAF
Designing AWS Container Services, considerations include, Elastic Container Registry (Amazon ECR), Elastic Container Service (ECS), Elastic Kubernetes Service (EKS), Fargate
Designing Azure Security Services, considerations include Firewall, Network Security Groups, Application Firewall, Private Link and Endpoints, Service Endpoints and monitor Networks
Designing Azure routing services, considerations include Secure and Monitor, Networks, Private Access to Azure services,
Designing Azure Network Services, considerations include site to site VPN, point to site VPN, Express Route, Virtual Networks, cross V=Net Connectivity, Virtual WAN, Virtual Networking Routing, Application Gateway, Front Door, Virtual Network NAT, and Load Balancer
Corporate employees will be able to bring the following direct benefit realizations to Cyber Security and Vulnerability Management related IT projects
Develop Solutions Designs for AWS, GCP and Azure Cloud Transformation Projects
Hands on experience in completing Solution Design Documents with AWS, GCP, Azure Network Designs
Technical Subject Matter Expertise in AWS, Azure and GCP Networking Technologies
Practical experience and understanding of developing Hybrid and On Premise Cloud Network Integration Designs
Provide Guidance to Testing, Cloud Development on implementation and deployment of Azure, GCP and AWS Networking Solutions
Multi Faceted Cloud Solution Expertise on AWS, GCP and Azure Cloud Services
Technical Mastery in AWS, GCP and Azure Networking Foundational Concepts
Establish Architecture Roadmap for Cybersecurity and Vulnerability Management projects for deployment of AWS, GCP and Azure Paas, IaaS and SaaS services
This is a project based online training programme that is aimed for experienced Architects who want to develop multi faceted expertise towards Cybersecurity and Vulnerability Management projects in a AWS Cloud Environment.
Award Certification
1.2 Virtual Machines in the Cloud
1.3 GCP Cloud Containers
2.0 Designing, Planning GCP Network
2.1 Designing Network Architecture
2.2 Designing VPC
2.3 Designing Hybrid Network
2.4 Designing Hybrid Network
2.5 Designing Container IP Addressing for GKE
3.0 Configuring VPC Networks
3.1 Configuring Static and Dynamic Routing with Cloud Router
3.2 Configuring VPC Peering
3.3 Configuring Shared VPC
Unit 3.4 NAT in GCP
4.0 Configuring Load Balancing
4.1 Configuring Cloud Content Delivery
Unit 5.0 Configuring Interconnect
Unit 5.1 Configuring Site to Site IPSec VPN
Unit 5.2 Cloud Router Configuration
6.0 Configuring Identity and Access Management (IAM)
6.1 Configuring Cloud Armour Security Policies
6.2 Configuring Third Party Software Device (NGFW) insertion into VPC
6.3 Implementing Routes and Firewall Rules in Multi NIC Environment
You study this course online at your own self pace and decide if you want to pursue it part time or full time.
You have up to 6 months to finish this course
You have up to 2 months to complete the project Work and the Slide Deck submission
Yes we have a 7 days course refund policy
The course materials consist of Online Course Notes, Supporting Videos and Audio files.
Yes you can reach out to trainers directly
Not at the moment,
Either Video or Audio recordings can be of at least minimum 5 mins and up to 30 mins
No, you only submit one.
We are a CPD Supplier so our course quality aligns to all relevant AWS best practices and Industry standards.
We are based in the UK
yes
Yes
They are marked as either as a pass or a fail. Our trainers are working IT contractors in the UK Banking sector and will judge your project submissions based on Detailed Designs of the Architecture Modells, Quality and Integrity of the Solution Designs in the Solution Design Document. Guidance will be provided how to complete this critical path document.