Cloud Computing for Enterprises

Dr. Jeff Tjiputra, USMx

Understand cloud computing technologies and how they can increase business productivity and effectiveness.

Organizations are increasingly moving their critical information and assets to the cloud. Understand the technology, best practices, and economics of cloud computing, and the rewards and risks of this rush to the cloud.

In this course, part of the Cloud Computing MicroMasters program, you will learn the essentials of cloud computing, including Infrastructure As A Service (IaaS), Platform As A Service (PaaS), Software As A Service (SaaS), and other "X as a service" platforms.

You will explore how the cloud can support businesses by increasing productivity and effectiveness.

This course is part of the Cloud Computing MicroMaster’s program from UMUC. Upon completion of the program and receipt of the verified MicroMaster’s certificate, learners may then transition into the full UMUC Master’s Program in Cloud Computing Architecture without any application process or testing. See the MicroMasters program page for more.

 

What will you learn

  • Investigate various cloud computing technologies and providers including public, private and hybrid clouds
  • Analyze the applications of cloud technologies to business
  • Develop strategies to enhance organizational effectiveness using cloud technologies
  • Evaluate the cost benefits of cloud adoption

 

Сессии:
  • 22 октября 2018, 8 недель
Характеристики онлайн курса:
  • Бесплатный:
  • Платный:
  • Сертификат:
  • MOOC:
  • Видеолекции:
  • Аудиолекции:
  • Email-курс:
  • Язык: Английский Gb

Отзывы

Пока никто не написал отзыв по этому курсу. Хотите быть первым?

Зарегистрируйтесь, чтобы оставить отзыв

Ещё курсы на эту тему:
8e901136-3c8a-49c0-a3c2-48e9f5c31fd7-dc0437e2d659.small Introduction to Open Source Networking Technologies
Learn technical fundamentals needed to adopt SDN, NFV, disaggregation, orchestration...
Extensionflag Big Data Analytics
The recent explosion of social media and the computerization of every...
60038_8c89_8 Lean Analytics Workshop - Alistair Croll and Ben Yoskovitz
Lean Analytics: Use data to build a better startup faster The Lean Startup...
138926_69ee_3 Amazon AWS Tutorial - AWS Training Online
This updated course not only prepares you for the AWS CSA exam but also includes...
166256_36aa_3 Amazon Web Services Certified Developer - Associate Level by Linux Academy
AWS Certified Developer prep course. This course well help you learn the concepts...
Ещё из рубрики «Компьютерные науки»:
Bb90d02a-a562-4632-a0af-e72987f27fea-081bda0d942b.small Cybersecurity Fundamentals
Learn cybersecurity fundamentals, including how to detect threats, protect systems...
D2fb4b76-e398-42d8-9835-970a49678fa3-27d6ebda8cb9.small Computer Forensics
Learn the process, techniques and tools for performing a digital forensics investigation...
05fa3fc6-a169-41aa-a67c-3985abf7db0b-3bd5f54592bc.small Cybersecurity Capstone
Demonstrate the knowledge and skills acquired in the Cybersecurity MicroMasters...
8e901136-3c8a-49c0-a3c2-48e9f5c31fd7-dc0437e2d659.small Introduction to Open Source Networking Technologies
Learn technical fundamentals needed to adopt SDN, NFV, disaggregation, orchestration...
Regular_7b541420-e149-42fe-86cd-93e4588aaed5 Why We Post: the Anthropology of Social Media
Discover the varying uses of social media around the world and its consequences...
Ещё от edX:
85efb1e5-3a5f-4208-9557-d49de63f8bf3-99199f8f9c00.small Thinking & Acting like an Entrepreneur
Discover the entrepreneur inside of you – learn what it takes to turn...
19e9fb79-a26b-403d-ace9-90b55f9d1573-91ecb59bf6c2.small Sikhism Through Its Scriptures
This course examines the Sikh scripture from a doctrinal and historical perspective...
B6c4593e-d876-4326-a445-c8777c25cf83-09a793ff9944.small Marketing Management
Learn key marketing strategies and tactics to help your company develop products...
Bb90d02a-a562-4632-a0af-e72987f27fea-081bda0d942b.small Cybersecurity Fundamentals
Learn cybersecurity fundamentals, including how to detect threats, protect systems...
D2fb4b76-e398-42d8-9835-970a49678fa3-27d6ebda8cb9.small Computer Forensics
Learn the process, techniques and tools for performing a digital forensics investigation...

© 2013-2017