The Cloud is being widely adopted today for a diverse set of reasons! But why? What can we expect? How is it implemented? Is it secure? There are many additional questions that can be asked related to this fast adoption of cloud offerings. We see anything from the ease of sharing documents with co-workers to the use of a cloud access security broker to supply enforcement of our security policies for many cloud-based implementations. This course will begin by providing the necessary architecture components to help us understand what technologies are being used under the hood so that we can make informed decisions when choosing a cloud vendor.