Skip to main content

Public Cloud in Cloud Migration

$249.00
How you learn:
Self-paced • Lifetime updates
Who trusts this:
Trusted by professionals in 160+ countries
Toolkit Included:
Includes a practical, ready-to-use toolkit containing implementation templates, worksheets, checklists, and decision-support materials used to accelerate real-world application and reduce setup time.
When you get access:
Course access is prepared after purchase and delivered via email
Your guarantee:
30-day money-back guarantee — no questions asked
Adding to cart… The item has been added

This curriculum spans the technical, operational, and governance dimensions of cloud migration with a depth comparable to a multi-workshop advisory engagement, addressing real-world challenges such as legacy system integration, secure landing zone design, data migration trade-offs, and ongoing cost and compliance management.

Module 1: Cloud Readiness Assessment and Application Portfolio Analysis

  • Conduct application dependency mapping to identify tightly coupled systems that may require refactoring before migration.
  • Evaluate legacy application compatibility with cloud-native services, particularly those relying on proprietary middleware or static IP dependencies.
  • Classify workloads using the Gartner five-tier model to determine migration fit for rehost, refactor, rearchitect, rebuild, or replace.
  • Assess data residency and compliance constraints that may restrict workload placement in specific geographic regions.
  • Engage application owners to validate performance baselines and define acceptable downtime windows during migration.
  • Document technical debt in existing systems that could amplify risk or cost in cloud environments.

Module 2: Cloud Architecture Design and Landing Zone Implementation

  • Define organizational units and service control policies in AWS Organizations or Azure Management Groups to enforce guardrails at scale.
  • Implement multi-account or multi-subscription strategies with centralized logging, monitoring, and identity federation.
  • Design VPC/VNet topology with segmentation for production, non-production, and shared services, including DNS and routing strategies.
  • Select between hub-and-spoke and mesh transit gateway models based on latency, cost, and security inspection requirements.
  • Integrate on-premises identity providers with cloud IAM using SAML 2.0 or SCIM, including role mapping and JIT provisioning.
  • Establish centralized logging account with immutable storage and automated log aggregation from all environments.

Module 3: Data Migration and Database Modernization

  • Choose between online and offline data transfer methods based on data volume, network bandwidth, and cutover tolerance.
  • Use AWS DMS or Azure Data Migration Service to perform homogeneous or heterogeneous database migrations with minimal downtime.
  • Implement change data capture (CDC) replication with conflict resolution strategies for bidirectional sync scenarios.
  • Decommission legacy backup systems only after validating recovery point and recovery time objectives in cloud-native backups.
  • Optimize large database migrations using native export/import tools with parallel processing and compression.
  • Evaluate licensing implications when migrating bring-your-own-license (BYOL) database workloads to cloud VMs.

Module 4: Application Migration and Refactoring Strategies

  • Execute lift-and-shift migrations using automated replication tools while preserving OS-level configurations and dependencies.
  • Containerize monolithic applications using Docker and orchestrate with Kubernetes only when scalability and DevOps benefits justify the effort.
  • Decouple stateful components by migrating session stores to managed services like Redis or DynamoDB.
  • Modify application configuration to consume cloud metadata services for dynamic instance identity and networking.
  • Refactor hardcoded DNS entries and IP addresses to use internal load balancers or service discovery mechanisms.
  • Implement blue-green deployment patterns using route switching to reduce cutover risk for customer-facing applications.

Module 5: Identity, Access, and Security Governance

  • Enforce least privilege access using role-based access control (RBAC) with just-in-time elevation via PIM or similar.
  • Integrate cloud-native IAM with enterprise identity lifecycle management to automate provisioning and deprovisioning.
  • Configure cross-account roles with external ID and MFA requirements for third-party access scenarios.
  • Deploy cloud security posture management (CSPM) tools to detect and remediate misconfigurations in real time.
  • Implement encryption key management using customer-managed keys (CMKs) with defined key rotation policies.
  • Define incident response playbooks specific to cloud environments, including snapshot preservation and API log analysis.

Module 6: Cost Management and Financial Governance

  • Tag all resources according to cost center, environment, application, and owner to enable chargeback and showback reporting.
  • Negotiate enterprise discount programs (e.g., AWS Enterprise Discount Program, Azure Commitment Plans) based on forecasted usage.
  • Implement automated shutdown policies for non-production instances using scheduling and idle detection.
  • Compare TCO between reserved instances, savings plans, and spot instances for stateless, fault-tolerant workloads.
  • Monitor unattached storage volumes and orphaned snapshots to eliminate stranded costs.
  • Establish budget alerts with escalating thresholds and automated remediation actions for cost overruns.

Module 7: Operations, Monitoring, and Incident Response

  • Centralize logs from cloud and on-premises systems into a SIEM with normalized schema and retention policies.
  • Configure synthetic transactions to monitor end-user experience across global regions and CDN edges.
  • Define cloud-specific runbooks for common incidents such as autoscaling failures or IAM permission errors.
  • Integrate cloud monitoring tools with existing ITSM platforms to route alerts to appropriate teams.
  • Implement automated remediation using Lambda or Azure Functions for known failure patterns like disk saturation.
  • Conduct chaos engineering experiments to validate resilience of cloud workloads under network partition or zone failure.

Module 8: Governance, Compliance, and Continuous Improvement

  • Map cloud controls to regulatory frameworks (e.g., HIPAA, GDPR, SOC 2) and document evidence collection processes.
  • Use infrastructure-as-code (IaC) scanning tools to enforce policy-as-code before deployment to production.
  • Conduct quarterly architecture review boards to evaluate adherence to cloud center of excellence (CCoE) standards.
  • Measure migration success using KPIs such as mean time to recovery (MTTR), deployment frequency, and change failure rate.
  • Rotate and audit service account credentials and API keys on a defined schedule with automated revocation.
  • Establish feedback loops from operations teams to refine migration patterns and update reference architectures.