Introduction to Cloud Computing
About this Course
Please Note: Learners who successfully complete this IBM course can earn a skill badge —a detailed, verifiable and digital credential that profiles the knowledge and skills you’ve acquired in this course. Enroll to learn more, complete the course and claim your badge! This course introduces you to the core concepts of cloud computing. You will gain the foundational knowledge required for understanding cloud computing from both business and practitioner perspectives. You will learn about the definition and essential characteristics of cloud computing, its history, emerging trends, and the business case for cloud computing. You also learn about the various cloud service models (IaaS, PaaS, SaaS) and deployment models (Public Cloud, Private Cloud, Hybrid Cloud) and the key components of a cloud architecture (Virtualization, VMs, Storage, Networking, Containers). The course will also familiarize you with emerging trends associated with cloud including, Hybrid Multicloud, Microservices, Serverless, Cloud Native, DevOps, and Application Modernization. You learn about Cloud Security basics and will be introduced to some case studies and career opportunities related to cloud computing. This introduction to cloud computing course from IBM is suitable for anyone who is new to Cloud – whether you just want to understand the Cloud jargon, or are intending to start a career in a Cloud related profession.Created by: IBM
Level: Introductory

Related Online Courses
About the Database Series of Courses "Databases" was one of Stanford's three inaugural massive open online courses in the fall of 2011. It has been offered in synchronous and then in self-paced... more
Building adequate housing is a pressing issue worldwide. With close to a billion people currently living in slums, accommodating a growing population, and improving dwelling conditions is a... more
Every day, our computers and phones correct our spelling, curate our social media, or translate news articles for us. But have you ever wondered how these applications work on a basic level? It... more
With today's increasing challenges of dealing with more aggressive and persistent threat actors, while also being inundated with information that is full of misinformation and false flags across... more
The rapid evolution of computers has brought technical devices as an active weapon to criminals. Cybercriminals have enjoyed the pleasure of being able to combine a large array of complex... more