Cloud Engineering and network Skills

Cloud Engineering

Using cloud computing as an engineering tool involves designing, building, and managing the infrastructure and services that enable organizations to leverage cloud computing technologies. Computing resources (such as computing power, storage, databases, networking, software, and more) are delivered over the internet on a pay-as-you-go basis with cloud computing.

Microsoft Azure

I have set up an Azure account to manage Azure services. The Azure Portal is a web-based interface I use once I have an Azure account. In order to organize resources, I create resource groups. Virtual machines, databases, and networking components can be grouped into resource groups. I set up networking components such as virtual networks (VNets), subnets, and configure network security groups (NSGs) to control traffic to and from your resources. Depending on your organization’s needs, the specific implementation steps for Azure can vary widely. Backup and Disaster Recovery, Security and Compliance, Cost Management, Scaling and Automation Testing and Deployment.

Amazon Web Services

I created an AWS account. As soon as I have an AWS account, I can access the AWS Management Console, which is a web-based interface for managing AWS services. There are geographically distributed data centers within AWS regions. Using Identity and Access Management (IAM), I create users, groups, and roles with appropriate permissions. Access to AWS resources is controlled by IAM. I include Amazon EC2 for virtual machines, Amazon RDS for databases, and Amazon S3 for object storage. These services may be configured according to your needs. It is my responsibility to set up networking components such as Amazon VPC (Virtual Private Cloud), subnets, security groups, and Network ACLs so that network traffic can be controlled and resources can be isolated..

System Administrator:

Analyzing system logs and identifying potential issues with computer systems.
Applying operating system updates, patches, and configuration changes.
Installing and configuring new hardware and software.
Adding, removing, or updating user account information, resetting passwords, etc.
Answering technical queries and assisting users.
Responsibility for security.
Responsible for documenting the configuration of the system.
Troubleshooting any reported problems.
System performance tuning.
Ensure that the network infrastructure is up and running.
Configuring, adding, and deleting file systems.
Ensuring parity between devices, test, and production environments.
Training users.
Plan and manage the machine room environment.

Network and Computer Administrator:

Setting up a new network for the first time.
Maintaining and upgrading existing computer networks, including routers and switches.
Troubleshooting software, hardware, and communications equipment problems and fixing the issues as they arise.
Monitor the network in order to find out what is going on.
Testing the network to see if there are any weaknesses in it.
Keeping an eye out for needed updates.
Installing and implementing security programs.
E-mail and Internet filters.
Evaluation of the implementing network.

I have replaced the following components:

Computer Case
Server Rack
Blade Server
Power Supply
Motherboard
CPU
RAM
CMOS Battery
Fans
Storage Devices Hard Drive, hot-swappable hard disk, SSDs Solid State Drives, NVMe M.2
Input Devices: Mouse Keyword Webcams Microphone Joystick Scanners
Output devices Monitor speakers Multifunction Printers.

I used the following network components:

Router
Switch
Firewall
Network Interface Card (NIC)
Bridges
Gateway
Wireless Access Point (WAP)
Ethernet Cables
Fiber Cables
Coax Cables

I have installed the following applications

Microsoft Suite (Word, Excel, PowerPoint Outlook, Access, Visio, Publisher, Office 365, Teams). Visual Studio, Visual Studio Code, Adobe Acrobat, Quicken, QuickBooks, MoneyDance, Zoom, Antivirus McAfee, Norton, etc. Trading software: El Toro, TradeView, MetaTrader 4. There were other applications that I had installed, but I do not recall all of them.

These are the network protocols I used:

Internet Protocol (IP)
 Internet Control Message Protocol (ICMP)
Transmission Control Protocol (TCP)
User Datagram Protocol (UDP)
Address Resolution Protocol (ARP)
TELNET
Secure Shell (SSH)
File Transfer Protocol (FTP)
Hypertext Transfer Protocol (HTTP)
Virtual Network Protocol (VPN)
Local Area Network (LAN)
Wire Area Netkork (WAP)
Remote Desktop Connection (RDP)
Simple Mail Transfer Protocol (SMTP)
Post Office Protocol (POP3)

I have installed the following operating systems:

Windows Operating Systems: DOS, 3.11, 95, 98, ME, XP, 7, 8.1, 10, and 11
Server Operating Systems:  NT 4.0, 2000. 2003, 2008, 2012, 2016, and 2019      Exchange Server 5.0 and 5.5                                                                                              Mac OS X 10.5 (Leopard) and Mac OS X 10.6 (Snow Leopard)
Linux Ubuntu and Linux Kali
Hyper-V and Virtual Box

The following are the command lines that I used:

Command Prompt.
PowerShell.
Cisco Command Line Interface.                                                                                          Basic Input Out Systems (BIOS) and Unified Extensible Firmware Interface (UEFI)
error: Content is protected !!