To understand the implementation, design principles and goals of a Computer Network and touches upon the various routing algorithms used in CN (such as link-state and distance vector).
►Target Audience
Security personnel who are currently tasked with assessing the technical risks of cloud computing
Network and systems administrators who currently manage private clouds or need to leverage hybrid and/or public cloud services
Technical auditors and consultants who need to gain a deeper understanding of cloud computing and security concerns
Security and IT managers who need to understand the risks of cloud computing and advise business management of the risks and various approaches involved