1.2 Infrastructure as a Service

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *

Already have an account? Sign In »

7 hours 31 minutes
Video Transcription
Hello again, My cloudy friends. Welcome back to Cyber Security. Inninety Learnings, Cloud Architecture Foundations This is module 1.2 infrastructures of service. So if you're ready, let's get in our tele porters and we will beam over to that I s cloud.
So in our last video, we had an introduction to the cloud. We looked at a use case and we reviewed the various clown platforms
and we looked at the different clown modeling types that are offered to networks. We has I t professionals support
in this video, we will be reviewing, I s and we will be taking a deeper dive into infrastructures of service to compute the hardware, the storage and the networking infrastructure the cloud can provide us. So get your umbrellas, rain jackets and your waiters on because it's time to get cloudy.
So we've been talking about seeing the cloud of all for more than 12 years now. I sat in a presentation from Cisco Muraki this last week. A leader in cloud based networking as a service, Cisco Muraki offers the full stack of crowd networking products including firewalls, land switching and wireless land products.
Cisco Muraki is a great cloud networking provider, and there are a lot of other great networking as a service providers out there for the customer to choose from.
The presenter shared that. It took Cisco Muraki 10 years to get to one million cloud networks, but only in the last two years, where they able to double to two million cloud networks. The fact of doubling their global cloud networks that they have sold, seen, install and supported just in the last two years by a whole nother 1,000,000 shows that we're in the middle
oven I as explosion.
So this is my home lab that is protected by my cloud managed infrastructure is a service firewall. There's a lot of white space on this diagram because I've removed my eyepiece and my log in information that helps me remember all this stuff so that I can protect myself from all you hackers out there. So sorry, no confidential information about my lab today.
Anyway, my security lab includes two routers, another hardware firewall, wireless access points configured in local and repeat her moods
and avian, where computing host with several Windows and Linux virtual machines from my ethical hacking, testing and exploits lab is all of this infrastructure is behind my labs network, EJ Firewall and on premise and in my physical lab.
What's interesting, though, is that my cloud firewall, which is Ah, hardware appliance only a couple feet from my desk. I actually can't log into it locally,
and I can't terminal into it. I have to open up a browser, go out to the Internet, log into my cloud management dashboard and then come back down to my edge firewall in my lab to see it and manage it from the clouds network.
Pretty amazing.
So we're going to spend a little time and our cloud management front end. So here I am in my firewall, my cloud management dashboard, and we can see that my ports are up and that we're moving traffic.
So if my firewall is two feet away, why do I want to go all the way to the cloud just to come back to my security appliance? If I'm Alina Tea shop, one or two individuals might be managing hundreds of in points, servers and network infrastructure to keep the organization users happy.
They're too busy managing the day to day operations of the network and don't have time to stand up and get online every critical system. They would much rather pay a service to a cloud provider
to perform the heavy lifting. And then they're Lena. Tea Shop on Lee has to be the smart hands and feet.
Instead of standing up computing platforms, database baby databases and back in systems lean I t can consume infrastructures of service and point their firewalls. Their land switches their wireless access, points all to the cloud and participate in the simplicity and elegance of cloud managed networking.
So what is infrastructures of service? Infrastructures of service is the model by which the cloud consumer outsources responsibility for its computer hardware network and operating systems to an external clown provider.
The cloud provider owns the equipment that provides the infrastructure. Resource is, and it's responsible for the ongoing operation and maintenance of those resources.
So this is where the cloud consumer sees for the cloud provided infrastructure. As a service pays, you go pay as you use and pays you grow models. Basically, they all mean the same thing. Their payment methods for cloud computing that charges based on usage. It's a lot like your utility bill, you only use the resource is that air needed, and that's all you have to pay for
with the public cloud
the pay as you go method allows, for example, in storage on Lee to be charged for how much data your organization stores.
One major benefit of the cloud coin operated payment models is there are no wasted resource is since users on Lee pay for service is procured and not provisioned, such as We're building you a cloud storage container that can store a maximum of one terabyte of information. But you end up on Lee using 300 gigabytes of storage.
Be aware that our cloud platforms
on our infrastructures is a service platform is a service, and our software is the service. Each can use a different form of pay. As you use page, you go or pays you grow payment models.
The cloud consumer, for example, could deploy and run its own applications and operating systems, while the infrastructure is a service provider, would handled things like storage replication back up in our archiving computing resource is that traditionally provided by servers or server farms, including processor, memory, disk
and networking, and the infrastructure management
Such a security networking load balancing and firewalls. When an organization utilizes I s it no longer has to buy, maintain or upgrade server hardware. It could help. Save resource is time and money by doing so. And since I A s allows an organization to pay only for the resource is it uses
the organization no longer needs
to put put out a big capital outlay for hardware. Resource is either is not using or not using to the maximum capacity.
Hey, guys, have you met Peter, our new HTML developer?
Another benefit of infrastructure as the service is, it allows an organization to spin up Additional resource is quickly and efficiently without having to purchase new physical hardware. For example, the I T department might need a development environment to test a new application with I s. This development environment could be spun up quickly and then removed
when the new application has been fully tested.
I A s allows an organization to meet hardware capacity spikes without having to add resource is to its data center.
Compute storage and virtual ization are also huge infrastructures of service offerings. When you play in the enterprise network like ideo, you learn pretty quickly. That organization's been millions of dollars in computing platforms to run their mission critical applications.
But then enterprises will spend as much, if not more and all the licensing that is required to virtual eyes their computing servers, such as databases,
applications and information management systems. But what about all that data center networking that is needed to tile this computing and software infrastructure together, all the power generation to drive it, the cooling to keep the system's running efficiently.
And the backup system is necessary to keep your mission critical, systems running and your critical data always available. In the case of a hardware or service outage, we're talking big money
to have all of this infrastructure in house within your own secure data center. Because of all this capital expense to buy all this stuff and all the operating expenses to run it, it's 4 to 6 times more constantly to manage technology than it is for its outright purchase. It's obvious on why the cloud could be so compelling.
Oh, no, it's time for our scary cloud monster, The learning check.
So question number one named three types of infrastructure as a service.
What are the two responsibilities that we is lean? I t expect our cloud infrastructure is a service provider to provide for us. They could do a lot for us, but just name a couple.
What are the three types of cloud coin operated? I s payment types. Even other kind of same
in which scary cloud freak of nature is in our photo.
So hit pause, Get your answers together, and then when you're ready, hit play and we'll review our answers together. So welcome back, my cloudy friends. What are three types of infrastructure is a service. Well, there's a bunch of types out there, but we were looking for Networking is a service. Computers of service and storage is a service.
And even though our cloud provider has a lot of responsibilities in making sure they deliver tow us exactly what we're looking for.
The two responsibilities that we care the most about is provide us the equipment, hardware and software and then manage it for us. Those moves agin changes those software patches and updates. Do the management for us so that we can get back to managing our end users and managing our networks. Where did the three similar types of payment methods
for our cloud infrastructure is a service
and what those three payment methods are pays. You use pay as you go and pay as you grow, even though they're kind of similar. And who is that cloud monster in our photo? Well, I know most of you are saying it's that king of lizards Godzilla, but I think you're absolutely wrong. I think it's the king of birds. That's right.
Big Bird from Sesame Street.
So in today's brief lecture, we looked at infrastructures of service. We looked at networking, compute and storage is the service offers. We looked at usage based payment models, and we looked at a couple of the responsibilities that cloud providers deliver to us when we subscribe to their service is
until next time when we review Platform is a service all of the professionals that cyber security and I t learning when I wish you and the user's on your network.
Happy packets
Up Next