Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

Develop the Training and Operations Plan


Discussion: Cloud User and Admin Training

Contains unread posts

Now that you have evaluated the AWS Service Catalog and have deployed it, you will discuss the critical elements that are needed to develop a training presentation that will be targeted toward the users of BallotOnline’s AWS Service Catalog. You will also discuss the critical elements needed to educate or train the administrators that will be managing the cloud services for BallotOnline. You should ensure that you cover the following areas:

· What should be included in the training for end users?

· What should be included in the training for administrators?

· What are some best practices for IT training?

Project 4: Develop the Training and Operations Plan 
Step 4: Prepare the Cloud Training 

In the previous step, you discussed with your colleagues the AWS Service Catalog and the different elements of cloud user and cloud administrator training. In this step, you will prepare your training presentation for the different elements of cloud user and cloud admin use of the AWS Service Catalog. This presentation will be stored in BallotOnline’s knowledge base of information on cloud computing.

Your presentation should include any key information related to cloud use for BallotOnline users as well as administration for the admins.

It should be five to eight slides long. Instead of recording an audio component, include any narration text as notes on each slide so that others will be able to present the slides in the future.

Submit the presentation for feedback after reading the instructions below before you submit it again as part of the overall Cloud Operations Plan.

Take Action

Submit your assignment to your instructor for review and feedback.

Follow these steps to access the assignment:

· Click My Tools in the top navigation bar.

· Click Assignments.

· Select the relevant assignment.

In the next step, you will begin work on the end-user guide.

Project 4: Develop the Training and Operations Plan 
Step 5: Create BallotOnline’s Cloud Operations End-User Guide 

Review


Employee Training on the Cloud Operations Plan

Now that the training materials have been created, it is time to work on BallotOnline’s Cloud Operations End-User Guide, using the 

End-User Guide Template
, and the information gleaned from the AWS Service Catalog deployment you performed in the earlier steps.

The Cloud Operations End-User Guide will help employees with their day-to-day cloud services use. The Cloud Operations End-User Guide will also include the description of BallotOnline’s cloud service offerings.

For this step, you may use the cloud backups and archiving as the cloud service offering.

When you have finished with the end-user guide, begin working on the admin guide, which you will complete in the next step.

Project 4: Develop the Training and Operations Plan 
Step 6: Create BallotOnline’s Cloud Operations Admin Guide 

In this step, you will create BallotOnline’s Cloud Operations Admin Guide, using the 

Admin Guide Template
 and the runbook from Project 3. The Cloud Operations Admin Guide will help the IT administrators with their day-to-day cloud services operations and administration. The Cloud Operations Admin Guide will also include the detailed accounts of BallotOnline’s cloud service offerings. For this step, you may use the cloud backups and archiving as the cloud service offering along with the runbook from Project 3.

Once you have created BallotOnline’s Cloud Operations Admin Guide, proceed to the final step, in which you submit the final operations plan.

Project 4: Develop the Training and Operations Plan 
Step 7: Submit the Training Materials and Cloud Operations Plan 

In this step, you will create and submit your consolidated Cloud Operations Plan for BallotOnline, which will include the operation plan and training presentation for the employees. It will be a comprehensive set of deliverables that you will give to Sophia, who will then present it to BallotOnline’s leadership.

The Cloud Operations Plan will enable you to consolidate all the work completed in previous steps along with some additional elements (scope, executive summary) to create a comprehensive plan for cloud operations for the selected “cloud ready” workloads.

Submit your final training presentation from Step 4 and use the 
Cloud Operations Plan Template to write your eight- to 10-page Cloud Operations Plan. Submit them both after reading the instructions below.

Check Your Evaluation Criteria

Before you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them. To view the complete grading rubric, click My Tools, select Assignments from the drop-down menu, and then click the project title.

· 1.1: Organize document or presentation clearly in a manner that promotes understanding and meets the requirements of the assignment.

· 1.4: Tailor communications to the audience.

· 1.7: Create neat and professional looking documents appropriate for the project or presentation.

· 8.3: Assess management and operational risks associated with cloud.

· 9.2: Develop a user training plan.

· 9.3: Develop documentation (plans, policies, and procedures) to support cloud operation.

· 10.3: Configure cloud management tools and software.

· 10.4: Configure cloud orchestration and automation software.

· 10.5: Configure service catalog software to support various user’s needs.

Take Action

Submit your assignment to your instructor for review and feedback.

Follow these steps to access the assignment:

· Click My Tools in the top navigation bar.

· Click Assignments.

· Select the relevant assignment.

Key Points

· After you have received successful grades on Project 4, you should stop and terminate the infrastructure you created in AWS to 
avoid incurring unexpected charges from AWS.

·
Remember to clean up your AWS files.

image4.png

image1.png

image2.png

image3.png

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

VIII

see attached Project 4 includes two labs, Lab 9 and Lab 10. Lab 9 Assignment: Conducting Forensic Investigations on Network Infrastructure. Locate and complete Lab 9: Conducting Forensic Investigations on Network Infrastructure. Upon completion of Section 2 of the lab, you are required to provide the deliverables listed below. Note:

Information Systems assignment 1

Page 1 of 2 Background iPremier (A), iPremier (B), and iPremier (C) cases describe an IT security crisis, and raise issues of risk management, preparation for crisis, management of crises, computer security, and public disclosure of security risks. After you experience the cases and debrief what you have learned, you

Deliverable 6 – Project Close-Out Reports item options

Assignment Content 1. Top of Form Competency · Analyze metrics for information technology projects. Student Success Criteria View the grading rubric for this deliverable by selecting the “This item is graded with a rubric” link, which is located in the Details & Information pane. Scenario The Project Manager for GDS

Deliverable 3 – Art Event for Workplace Colleagues

Assignment Content 1. Top of Form Competency Utilize art elements in real-world contexts and the workplace. Student Success Criteria View the grading rubric for this deliverable by selecting the “This item is graded with a rubric” link, which is located in the Details & Information pane. Scenario Your workplace has

Deliverable 2 – Grant Proposal Summary

Assignment Content 1. Top of Form Competency Identify the role of music, poetry, prose, and visual art in the modern world and workplace. Student Success Criteria View the grading rubric for this deliverable by selecting the “This item is graded with a rubric” link, which is located in the Details

Deliverable 1 – Timeline of Major Periods in Art

Assignment Content 1. Top of Form Competency Determine the historical impact of art on modern culture, society, and the workplace. Student Success Criteria View the grading rubric for this deliverable by selecting the “This item is graded with a rubric” link, which is located in the Details & Information pane.

Anti-Forensic Techniques

 Discuss anti-forensics techniques and explain how to detect steganography, hidden data in file system structures, trail obfuscation, and file extension mismatch. 

2 peer responses

Review the discussion posts and select two peers to respond to. Your two peer responses should be substantive. Substantive responses are those that further develop the topic and pursue an understanding of the domain. Simple messages that offer agreement or simple encouragement are considered conversant, but are not considered substantive.

VII

see attached Project 3 includes two labs, Lab 5, and Lab 6. Lab 5 Assignment: Conducting Forensic Investigations on Windows Systems. Locate and complete Lab 5: Conducting Forensic Investigations on Windows Systems. Upon completion of Section 2 of the lab, you are required to provide the deliverables listed below. Note:

Research

Creating a plan  Competencies 7035.1.1  :  Health Information Systems and Business Process The graduate explains how information systems affect business processes within the healthcare industry. 7035.1.2 :  Systems Development The graduate analyzes the different methods of system development for the purpose of recommending an appropriate method for a project. 7035.1.3 :  Health Information

Technology Leader

The topic is Katherine Johnson Katherine Johnson, an American mathematician, played a crucial role in NASA’s space missions. She excelled at orbital mechanics calculations and pioneered the use of computers. During her 33-year tenure at NASA, Johnson calculated trajectories, launch windows, and emergency return courses for the Project Mercury, Apollo

V

What are some nefarious purposes that stenography could be used for in the commission of a cybercrime? Do you think that stenography is a major security concern? Explain why or why not. Discuss what legitimate reasons a person would have for hiding data inside of an image, video, or audio

Computer Hardware & Software Project

Computer Hardware & Software Project OBJECTIVES: Successful completion of this assignment demonstrates your understanding of the following course level outcomes: 1. Explain the functions of hardware, software, data, procedures, and people in a business computer system. 2. Identify the major hardware elements of a computer system and describe the purpose

IV

see attached Lab 3 Assignment: Recovering Deleted and Damaged Files Locate and complete Lab 3: Recovering Deleted and Damaged Files. Upon completion of Section 2 of the lab, you are required to provide the deliverables listed below. Note: You do not have to complete Section 3 of the lab. 1.

Forensics

see attached. Unit III Project Project 1 includes two labs, Lab 1 and Lab 2. Lab 1 Assignment: Applying the Daubert Standard to Forensic Evidence Locate and complete Lab 1: Recognizing the Use of Steganography in Forensic Evidence. Upon completion of Section 2 of the lab, you are required to

Capstone Project: CSIS 474

Capstone Project: Project Management Assignment CSIS 474 Capstone Project Overview The objective of the final Capstone Project is to assess your knowledge on the learning objectives for the information technology program. All assignments in this course will build upon one another and provide you with different components for your Capstone

Input Device Dialogue

The choice of an appropriate input device for a product is often based on both the type of device being used and the target market for that device. For instance, a device targeted to college students and one targeted to older individuals may use different input methods. Suppose that you

Case Study-2

 Assessment 3:   This file is too large to display.View in new window