Skip to main content

Cloud Platforms in Cloud Migration

$299.00
Who trusts this:
Trusted by professionals in 160+ countries
How you learn:
Self-paced • Lifetime updates
Your guarantee:
30-day money-back guarantee — no questions asked
Toolkit Included:
Includes a practical, ready-to-use toolkit containing implementation templates, worksheets, checklists, and decision-support materials used to accelerate real-world application and reduce setup time.
When you get access:
Course access is prepared after purchase and delivered via email
Adding to cart… The item has been added

This curriculum spans the technical, operational, and governance dimensions of cloud migration with a scope and granularity comparable to a multi-phase internal capability program delivered across a large organisation’s infrastructure and security teams.

Module 1: Strategic Assessment and Cloud Readiness

  • Evaluate existing on-premises workloads for cloud suitability based on performance dependencies, data gravity, and compliance constraints.
  • Conduct application portfolio analysis to classify systems by migration complexity (e.g., lift-and-shift, refactor, retire).
  • Define business KPIs for migration success, including TCO reduction targets and system availability benchmarks.
  • Assess organizational readiness by auditing internal skill gaps in cloud operations and security.
  • Select migration scope by prioritizing non-customer-facing systems for initial pilot migrations.
  • Negotiate data egress cost implications with cloud providers during contract scoping.
  • Establish a cross-functional migration governance board with representation from IT, security, and finance.
  • Document legacy system interdependencies using network flow analysis and configuration management databases.

Module 2: Cloud Provider Selection and Contract Negotiation

  • Compare SLA terms across AWS, Azure, and GCP for mission-critical workloads, focusing on uptime guarantees and penalty structures.
  • Negotiate enterprise discount agreements based on committed spend, factoring in reserved instance utilization forecasts.
  • Validate regional compliance alignment (e.g., GDPR, HIPAA) before selecting cloud regions for data residency.
  • Assess multi-cloud management tooling compatibility with existing monitoring and identity systems.
  • Define exit strategies and data portability requirements in provider contracts to avoid lock-in.
  • Compare managed service capabilities across providers for databases, Kubernetes, and AI/ML workloads.
  • Evaluate provider-specific integration with existing enterprise identity providers (e.g., Active Directory).
  • Quantify network latency differences between provider edge locations and user populations.

Module 3: Network Architecture and Connectivity Design

  • Design hybrid DNS strategies to resolve on-premises and cloud resources during phased migration.
  • Implement AWS Direct Connect or Azure ExpressRoute with redundant circuits and BGP failover.
  • Size transit gateways or cloud routers based on peak inter-VPC and on-premises traffic patterns.
  • Configure DNS forwarding rules to support split-horizon resolution during cutover.
  • Segment cloud workloads using VPC peering or shared services hubs with strict routing policies.
  • Enforce encryption for data in transit using TLS 1.3 and IPsec for site-to-site tunnels.
  • Plan for asymmetric routing scenarios in multi-region active-passive deployments.
  • Implement bandwidth throttling for non-critical data transfers to preserve production performance.

Module 4: Identity, Access, and Privilege Management

  • Integrate cloud IAM with on-premises identity providers using SAML or SCIM for just-in-time provisioning.
  • Enforce least-privilege access by mapping existing AD groups to cloud roles with boundary conditions.
  • Implement cross-account IAM roles with trust policies to limit lateral movement.
  • Rotate long-lived access keys using automated credential rotation workflows.
  • Define service account governance policies for non-human identities in containerized environments.
  • Enable detailed CloudTrail or Azure Activity Log integration with SIEM for privilege escalation detection.
  • Configure conditional access policies based on IP location, device compliance, and MFA status.
  • Establish break-glass account procedures with time-limited access and mandatory dual approval.

Module 5: Data Migration and Storage Strategies

  • Select between online and offline data transfer methods (e.g., Snowball, Azure Data Box) based on data volume and RTO.
  • Validate data integrity post-migration using cryptographic checksum comparisons.
  • Implement tiered storage policies using lifecycle rules to move data from hot to cold storage.
  • Encrypt data at rest using customer-managed keys (CMKs) with key rotation schedules.
  • Design cross-region replication for critical databases with conflict resolution protocols.
  • Assess performance impact of storage backend choices (e.g., EBS gp3 vs. io2) on application latency.
  • Plan for schema migration when moving from on-premises RDBMS to managed cloud database services.
  • Establish data retention and deletion workflows aligned with legal hold requirements.

Module 6: Application Refactoring and Modernization

  • Decompose monolithic applications into microservices using domain-driven design principles.
  • Migrate stateful applications by externalizing session storage to managed Redis or database services.
  • Containerize legacy applications using Docker with minimal configuration changes for lift-and-shift.
  • Implement API gateways to manage versioning and rate limiting for refactored services.
  • Adapt configuration management to cloud-native patterns using parameter stores or secrets managers.
  • Refactor batch jobs to use serverless functions with event-driven triggers and timeout handling.
  • Integrate health checks and readiness probes for Kubernetes orchestration compatibility.
  • Modify logging pipelines to forward structured logs to cloud-native observability platforms.

Module 7: Security, Compliance, and Audit Controls

  • Deploy cloud security posture management (CSPM) tools to detect misconfigurations in real time.
  • Implement network security groups and firewall rules with least-permissive inbound/outbound rules.
  • Conduct penetration testing under provider-approved scopes and disclosure policies.
  • Map cloud controls to compliance frameworks (e.g., SOC 2, ISO 27001) using automated compliance dashboards.
  • Enforce encryption standards through policy-as-code using AWS Config or Azure Policy.
  • Isolate PCI-DSS workloads in dedicated accounts or subscriptions with restricted access paths.
  • Conduct forensic readiness planning by preserving disk snapshots and logging artifacts.
  • Implement DDoS protection at the edge using cloud provider CDN and WAF services.

Module 8: Monitoring, Observability, and Incident Response

  • Configure centralized logging with deduplication and retention policies across hybrid environments.
  • Define SLOs and error budgets for cloud services using Prometheus or Cloud Monitoring metrics.
  • Instrument applications with distributed tracing to diagnose latency across microservices.
  • Set up alerting thresholds based on historical baselines to reduce false positives.
  • Integrate incident response runbooks with cloud-native event triggers and paging systems.
  • Validate backup and restore procedures for cloud-native databases and file systems.
  • Conduct chaos engineering experiments to test failover mechanisms in staging environments.
  • Optimize monitoring costs by filtering low-value telemetry at the source.

Module 9: Cost Management and Optimization

  • Implement tagging strategies for cost allocation across departments, projects, and environments.
  • Use reserved instance and savings plan recommendations based on 30-day utilization patterns.
  • Right-size overprovisioned VMs using performance telemetry and autoscaling baselines.
  • Enforce budget alerts with automated actions (e.g., stop non-production instances) at threshold breaches.
  • Compare spot instance risk profiles across providers for fault-tolerant batch workloads.
  • Optimize data transfer costs by caching content at the edge and minimizing cross-region replication.
  • Decommission orphaned resources (e.g., unattached disks, idle load balancers) using automated cleanup jobs.
  • Conduct monthly cost review meetings with stakeholders using chargeback reports.