Skip to main content

Proof Point in Cloud Migration

$249.00
Toolkit Included:
Includes a practical, ready-to-use toolkit containing implementation templates, worksheets, checklists, and decision-support materials used to accelerate real-world application and reduce setup time.
Your guarantee:
30-day money-back guarantee — no questions asked
How you learn:
Self-paced • Lifetime updates
Who trusts this:
Trusted by professionals in 160+ countries
When you get access:
Course access is prepared after purchase and delivered via email
Adding to cart… The item has been added

This curriculum spans the technical, operational, and governance dimensions of cloud migration with a scope and granularity comparable to a multi-workshop architecture review and remediation program conducted during an enterprise advisory engagement.

Module 1: Defining Migration Scope and Application Rationalization

  • Decide which applications to rehost, refactor, retire, or replace based on business criticality, technical debt, and integration dependencies.
  • Conduct workload dependency mapping using network flow analysis and application discovery tools to avoid breaking interdependent systems.
  • Establish criteria for excluding legacy systems with incompatible architectures or unpatched vulnerabilities from migration.
  • Negotiate ownership and timelines with business unit leaders whose applications are slated for retirement or consolidation.
  • Document technical constraints such as unsupported operating systems or proprietary hardware dependencies that prevent lift-and-shift.
  • Validate licensing models for third-party software to avoid cost overruns or compliance violations in cloud environments.

Module 2: Cloud Architecture and Design Patterns

  • Select between multi-AZ and multi-region deployment based on RTO/RPO requirements and data residency regulations.
  • Implement VPC design with segmentation for production, non-production, and DMZ workloads using shared services or transit gateway models.
  • Choose between monolithic migration and microservices refactoring based on team capability, CI/CD maturity, and long-term support costs.
  • Design data egress strategies to minimize cross-AZ and cross-region bandwidth charges in public cloud billing models.
  • Integrate edge computing patterns for latency-sensitive applications instead of full cloud relocation.
  • Define naming conventions and tagging policies that align with cost allocation, security, and automation requirements.

Module 3: Identity, Access, and Privilege Management

  • Map on-premises Active Directory groups to cloud IAM roles using attribute-based or claim-based federation.
  • Enforce least privilege by analyzing historical access logs and pruning excessive permissions before migration.
  • Implement just-in-time (JIT) access for administrative functions using privileged access management (PAM) tools.
  • Design service account governance to prevent long-lived credentials and enforce rotation policies.
  • Integrate multi-factor authentication (MFA) enforcement at the identity provider level for all cloud console access.
  • Establish cross-account IAM trust relationships with boundary policies to limit lateral movement in multi-account structures.

Module 4: Data Migration and Storage Strategy

  • Select between online and offline data transfer methods based on data volume, network bandwidth, and downtime tolerance.
  • Classify data by sensitivity and apply encryption at rest using customer-managed or cloud provider keys (CMK vs KMS).
  • Define retention and archival rules for migrated data using lifecycle policies aligned with legal hold requirements.
  • Migrate database workloads using native replication tools (e.g., AWS DMS, Azure Database Migration Service) with cutover validation checkpoints.
  • Reconcile referential integrity after data migration when source and target schemas diverge.
  • Implement storage tiering strategies (e.g., S3 Standard vs Glacier, Premium vs Standard SSD) based on access frequency and cost targets.

Module 5: Network and Connectivity Engineering

  • Provision high-throughput connections (e.g., AWS Direct Connect, Azure ExpressRoute) with redundant paths and SLA-backed uptime.
  • Configure DNS failover and split-horizon DNS to support phased cutover and hybrid resolution during transition.
  • Implement firewall rules and security groups to restrict east-west traffic between migrated and on-premises systems.
  • Size and deploy load balancers with health checks tuned to application-specific endpoints and response thresholds.
  • Optimize MTU and TCP window scaling for high-latency WAN links between data centers and cloud regions.
  • Monitor and baseline network performance pre- and post-migration to detect throughput degradation or packet loss.

Module 6: Security, Compliance, and Risk Posture

  • Conduct cloud security posture management (CSPM) scans pre-migration to remediate misconfigurations in target environments.
  • Map existing regulatory controls (e.g., HIPAA, PCI-DSS) to cloud-native services and shared responsibility model boundaries.
  • Implement centralized logging with immutable storage for audit trails using cloud-native services (e.g., CloudTrail, Azure Monitor).
  • Perform penetration testing on migrated workloads under cloud provider authorization policies.
  • Define incident response playbooks that incorporate cloud-specific artifacts such as API call logs and console access events.
  • Enforce encryption in transit using TLS 1.2+ and certificate management integrated with private CAs or public PKI.

Module 7: Operational Readiness and Monitoring

  • Deploy monitoring agents and configure alerts for CPU, memory, disk I/O, and application-specific metrics in cloud environments.
  • Integrate cloud-native logging with existing SIEM systems using structured ingestion pipelines and parsing rules.
  • Test backup and restore procedures for cloud-native storage and databases using point-in-time recovery.
  • Validate disaster recovery runbooks with failover simulations that include DNS and data replication components.
  • Train L1/L2 support teams on cloud console navigation, log querying, and incident triage workflows.
  • Establish cost anomaly detection using budget alerts and tagging compliance checks to prevent uncontrolled spending.

Module 8: Governance, FinOps, and Continuous Optimization

  • Implement chargeback or showback models using resource tagging to allocate cloud costs to business units.
  • Conduct monthly cost reviews to identify underutilized instances, orphaned storage, and idle resources.
  • Standardize deployment templates using Infrastructure as Code (IaC) to enforce policy and reduce configuration drift.
  • Enforce policy-as-code using tools like AWS Config, Azure Policy, or HashiCorp Sentinel in CI/CD pipelines.
  • Negotiate reserved instance or savings plan commitments based on stable workload baselines and utilization forecasts.
  • Establish feedback loops between operations, finance, and architecture teams to refine resource allocation and scaling policies.