top of page
Game Developers

CompTIA Cloud+ (CV0-003)

CompTIA (Computing Technology Industry Association) offers a range of certifications that are highly regarded in the IT industry. These certifications cover various technology-related skills and are designed to validate the expertise of IT professionals. As of my last update in January 2022, here are some of the key CompTIA certifications:

  1. CompTIA IT Fundamentals (ITF+): This certification is ideal for individuals who are new to IT. It covers essential IT skills and helps beginners understand the basics of IT, including hardware, software, networking, and security.

  2. CompTIA A+: A+ certification is for entry-level IT technicians. It covers topics related to hardware, operating systems, networking, security, and troubleshooting. A+ is a widely recognized certification for technical support and IT operational roles.

  3. CompTIA Network+: Network+ certification is for professionals who work in IT networking roles. It covers networking concepts, infrastructure, network operations, security, and troubleshooting.

  4. CompTIA Security+: Security+ certification is for IT professionals specializing in cybersecurity. It validates knowledge and skills in areas such as network security, compliance, threats, vulnerabilities, access control, and cryptography.

  5. CompTIA Linux+: Linux+ certification is for IT professionals who work with Linux operating systems. It covers Linux administration, security, and troubleshooting.

  6. CompTIA Cloud+: Cloud+ certification is for IT professionals working in cloud technologies. It covers cloud models, virtualization, infrastructure, security, and resource management.

  7. CompTIA Cybersecurity Analyst (CySA+): CySA+ certification focuses on cybersecurity analytics and helps professionals perform data analysis, threat detection, and respond to cybersecurity threats.

  8. CompTIA Advanced Security Practitioner (CASP+): CASP+ certification is an advanced-level certification that validates expertise in enterprise security, risk management, and advanced security solutions.

It's important to note that CompTIA certifications are typically valid for three years. To maintain certification, individuals can participate in CompTIA's Continuing Education (CE) program, which allows them to earn CEUs (Continuing Education Units) by participating in various activities such as training, attending conferences, and writing articles.

cloudplus-logo.png

Self-Study Course Includes:

Books: a $75 value

Videos: a $250 value

Practice Test by MeasureUp: a $100 value

Training Lab: a $75 value

 

With CertPREP, you get all this and
more for just
$199.00. Get started today!

CompTIA

CompTIA Cloud+ (CV0-003)

  • Cloud Deployment Models (1 hour and 24 minutes)

    • Public Cloud

    • Private Cloud

    • Hybrid Cloud

    • Community Cloud

    • Cloud Within a Cloud

    • Multicloud

    • Multitenancy

  •  

  • Cloud Service Models (36 minutes)

    • Infrastructure as a Service (IaaS)

    • Platform as a Service (PaaS)

    • Software as a Service (SaaS)

  •  

  • Advanced Cloud Services (36 minutes)

    • Internet of Things (IoT)

    • Serverless

    • Machine Learning/Artificial Intelligence (AI)


Lesson 2: Capacity Planning (3 hours and 12 minutes)

  • Requirements (48 minutes)

    • Hardware Requirements

    • Software Requirements

    • Budgetary Requirements

    • Business Need Analysis

  •  

  • Standard Templates (12 minutes)

  • Licensing (1 hour)

    • Per - user

    • Socket - based

    • Volume - based

    • Core - based

    • Subscription

  •  

  • User Density (12 minutes)

  • System Load (12 minutes)

  • Trend Analysis (36 minutes)

    • Baselines

    • Patterns

    • Anomalies

  •  

  • Performance Capacity Planning (12 minutes)


Lesson 3: High Availability and Scaling in Cloud Environments (3 hours and 36 minutes)

  • Hypervisors (24 minutes)

    • Affinity

    • Anti - affinity

  •  

  • Oversubscription (36 minutes)

    • Compute

    • Network

    • Storage

  •  

  • Regions and Zones (12 minutes)

  • Applications (12 minutes)

  • Containers (12 minutes)

  • Clusters (12 minutes)

  • High Availability of Network Functions (48 minutes)

    • Switches

    • Routers

    • Load Balancers

    • Firewalls

  •  

  • Avoid Single Points of Failure (1 hour)

    • Scalability

    • Auto - scaling

    • Horizontal Scaling

    • Vertical Scaling

    • Cloud Bursting


Lesson 4: Solution Design in Support of the Business Requirements (4 hours and 12 minutes)

  • Requirement Analysis (1 hour and 48 minutes)

    • Software

    • Hardware

    • Integration

    • Budgetary

    • Compliance

    • Service - Level Agreement (SLA)

    • User and Business Needs

    • Security

    • Network Requirements

  •  

  • Environments (1 hour and 12 minutes)

    • Development

    • Quality Assurance (QA)

    • Staging

    • Blue - Green

    • Production

    • Disaster Recovery (DR)

  •  

  • Testing Techniques (1 hour and 12 minutes)

    • Vulnerability Testing

    • Penetration Testing

    • Performance Testing

    • Regression Testing

    • Functional Testing

    • Usability Testing


Lesson 5: Identity and Access Management (2 hour and 24 minutes)

  • Identification and Authorization (48 minutes)

    • Privileged Access Management (PAM)

    • Logical Access Management

    • Account Lifecycle Management

    • Access Controls

  •  

  • Directory Services (12 minutes)

    • Lightweight Directory Access Protocol (LDAP)

  •  

  • Federation (12 minutes)

  • Certificate Management (12 minutes)

  • Multifactor Authentication (MFA) (12 minutes)

  • Single Sign - On (SSO) (12 minutes)

    • Security Assertion Markup Language (SAML)

  •  

  • Public Key Infrastructure (PKI) (12 minutes)

  • Secret Management (12 minutes)

  • Key Management (12 minutes)


Lesson 6: Secure Network in a Clous Environment (4 hours and 24 minutes)

  • Network Segmentation (36 minutes)

    • Virtual LAN (VLAN)/Virtual Extensible LAN (VxLAN)/ Generic Network Virtualization Encapsulation (GENEVE)

    • Microsegmentation

    • Tiering

  •  

  • Protocols (1 hour)

    • Domain Name Service (DNS)

    • Network Time Protocol (NTP)

    • Network Time Security (NTS)

    • Encryption

    • Tunneling

  •  

  • Network Services (1 hour and 24 minutes)

    • Firewalls

    • Web Application Firewall (WAF)

    • Application Delivery Controller (ADC)

    • Intrusion Protection System (IPS)/Intrusion Detection System (IDS)

    • Data Loss Prevention (DLP)

    • Network Access Control (NAC)

    • Packet Brokers

  •  

  • Log and Event Monitoring (12 minutes)

  • Network Flows (12 minutes)

  • Hardening and Configuration Changes (1 hour)

    • Disabling Unnecessary Ports and Services

    • Disabling Weak Protocols and Ciphers

    • Firmware Upgrades

    • Control Ingress and Egress Traffic

    • Distributed Denial - of - Service (DDoS) Protection


Lesson 7: OS and Application Security Controls (4 hours and 48 minutes)

  • Policies (1 hour)

    • Password Complexity

    • Account Lockout

    • Application Whitelisting

    • Software Feature

    • User/Group

  •  

  • User Permissions (12 minutes)

  • Antivirus/Antimalware/Endpoint Detection and Response (EDR) (12 minutes)

  • Host - Based IDS (HIDS)/Host - Based IPS (HIPS) (12 minutes)

  • Hardened Baselines (12 minutes)

    • Single Function

  •  

  • File Integrity (12 minutes)

  • Log and Event Monitoring (12 minutes)

  • Configuration Management (12 minutes)

  • Builds (48 minutes)

    • Stable

    • Long - Term Support (LTS)

    • Beta

    • Canary

  •  

  • Operating System (OS) Upgrades (12 minutes)

  • Encryption (1 hour)

    • Application Programming Interface (API) Endpoint

    • Application

    • OS

    • Storage

    • Filesystem

  •  

  • Mandatory Access Control (12 minutes)

  • Firewall Software (12 minutes)


Lesson 8: Data Security and Compliance Controls in Cloud Environments (2 hours and 48 minutes)

  • Encryption (12 minutes)

  • Integrity (36 minutes)

    • Hashing Algorithms

    • Digital Signatures

    • File Integrity Monitoring (FIM)

  •  

  • Classification (12 minutes)

  • Segmentation (12 minutes)

  • Access Control (12 minutes)

  • Impact of Laws and Regulations (12 minutes)

    • Legal Hold

  •  

  • Records Management (48 minutes)

    • Versioning

    • Retention

    • Destruction

    • Write Once Read Many

  •  

  • Data Loss Prevention (DLP) (12 minutes)

  • Cloud Access Security Broker (CASB) (12 minutes)


Lesson 9: Security Requirements (3 hours and 12 minutes)

  • Tools (24 minutes)

  • Vulnerability Scanners

    • Port Scanners

  •  

  • Vulnerability Assessment (1 hour)

    • Default and Common Credential Scans

    • Credentialed Scans

    • Network - Based Scans

    • Agent - Based Scans

    • Service Availabilities Scans

  •  

  • Security Patches (1 hour)

    • Hot Fixes

    • Scheduled Updates

    • Virtual Patches

    • Signature Updates

    • Rollups

  •  

  • Risk Register (12 minutes)

  • Prioritization of Patch Applications (12 minutes)

  • Deactivate Default Accounts (12 minutes)

  • Impacts of Security Tools on Systems and Services (12 minutes)


Lesson 10: Incident Response Procedures (1 hour and 48 minutes)

  • Preparation (1 hour and 12 minutes)

    • Documentation

    • Call Trees

    • Training

    • Tabletops

    • Documented Incident Types/Categories

    • Roles and Responsibilities

  •  

  • Incident Response Procedures (36 minutes)

    • Identification

    • Containment, Eradication, and Recovery

    • Post-incident and Lessons Learned


Lesson 11: Integrate Components into a Cloud Solution (4 hours and 24 minutes)

  • Subscription Services (1 hour and 48 minutes)

    • File Subscriptions

    • Communications

    • Collaboration

    • Virtual Desktop Infrastructure (VDI)

    • Directory and Identity Services

    • Cloud Resources

    • IaaS

    • PaaS

    • SaaS

  •  

  • Provisioning Resources (36 minutes)

    • Compute

    • Storage

    • Network

  •  

  • Application (12 minutes)

    • Serverless

  •  

  • Deploying Virtual Machines (VMs) and Custom Images (12 minutes)

  • Templates (24 minutes)

    • OS Templates

    • Solution Templates

  •  

  • Identity Management (12 minutes)

  • Containers (36 minutes)

    • Configure Variables

    • Configure Secrets

    • Persistent Storage

  •  

  • Auto – scaling (12 minutes)

  • Post-deployment Validation (12 minutes)


Lesson 12: Storage in Cloud Environments (5 hours and 12 minutes)

  • Types (36 minutes)

    • Block

    • File

    • Object

  •  

  • Tiers (48 minutes)

    • Flash

    • Hybrid

    • Spinning Disks

    • Long - Term

  •  

  • Input/Output Operations per Second (IOPS) and Read/Write (12 minutes)

  • Protocols (1 hour)

    • Network File System (NFS)

    • Common Internet File System (CIFS)

    • Internet Small Computer System Interface (iSCSI)

    • Fibre Channel (FC)

    • Non - Volatile Memory Express over Fabrics (NVMe - oF)

  •  

  • Redundant Array of Inexpensive Disks (RAID) (1 hour)

    • 0

    • 1

    • 5

    • 6

    • 10

  •  

  • Storage System Features (1 hour)

    • Compression

    • Deduplication

    • Thin Provisioning

    • Thick Provisioning

    • Replication

  •  

  • User Quotas (12 minutes)

  • Hyperconverged (12 minutes)

  • Software - Defined Storage (SDS) (12 minutes)


Lesson 13: Cloud Networking Solutions (4 hours)

  • Services (1 hour)

    • Dynamic Host Configuration Protocol (DHCP)

    • Network Time Protocol (NTP)

    • Domain Name Service (DNS)

    • Content Delivery Network (CDN)

    • IP Address Management (IPAM)

  •  

  • Virtual Private Networks (VPNs) (1 hour)

    • Site - to - site

    • Point - to - Point

    • Point - to - Site

    • IPsec

    • Multiprotocol Label Switching (MPLS)

  •  

  • Virtual Routing (36 minutes)

    • Dynamic and Static Routing

    • Virtual Network Interface Controller (vNIC)

    • Subnetting

  •  

  • Network Appliances (24 minutes)

    • Load Balancers

    • Firewalls

  •  

  • Virtual Private Cloud (VPC) (24 minutes)

    • Hub and Spoke

    • Peering

  •  

  • VLAN/VxLAN/GENEVE (12 minutes)

  • Single Root Input/Output Virtualization (SR - IOV) (12 minutes)

  • Software - Defined Network (SDN) (12 minutes)


Lesson 14: Compute Sizing for a Deployment (2 hours and 12 minutes)

  • Virtualization (48 minutes)

    • Hypervisors

    • Simultaneous Multithreading (SMT)

    • Dynamic Allocations

    • Oversubscription

  •  

  • Central Processing Unit (CPU)/Virtual CPU (vCPU) (12 minutes)

  • Graphics Processing Unit (GPU) (24 minutes)

    • Virtual

    • Pass - through

  •  

  • Clock Speed/Instructions per Cycle (IPC) (12 minutes)

  • Hyperconverged (12 minutes)

  • Memory (24 minutes)

    • Dynamic Allocation

    • Ballooning


Lesson 15: Cloud Migrations (1 hour and 48 minutes)

  • Physical to Virtual (P2V) (12 minutes)

  • Virtual to Virtual (V2V) (12 minutes)

  • Cloud - to - Cloud Migrations (24 minutes)

    • Vendor Lock - in

    • PaaS or SaaS Migrations

  •  

  • Storage Migrations (36 minutes)

    • Block

    • File

    • Object

  •  

  • Database Migrations (24 minutes)

    • Relational

    • Nonrelational


Lesson 16: Logging, Monitoring, And Alerting (4 hours)

  • Logging (1 hour and 24 minutes)

    • Collectors

    • Analysis

    • Severity Categorization

    • Audits

    • Types

    • Automation

    • Trending

  •  

  • Monitoring (1 hour and 48 minutes)

    • Baselines

    • Thresholds

    • Tagging

    • Log Scrubbing

    • Performance Monitoring

    • Resource Utilization

    • Availability

    • Verification of Continuous Monitoring Activities

    • Service Management Tool Integration

  •  

  • Alerting (48 minutes)

    • Common Messaging Methods

    • Enable/Disable Alerts

    • Appropriate Responses

    • Policies for Categorizing and Communicating Alerts


Lesson 17: Operation of a Cloud Environment (5 hours and 48 minutes)

  • Confirm Completion of Backups (12 minutes)

  • Lifecycle Management (48 minutes)

    • Roadmaps

    • Old/Current/New Versions

    • Upgrading and Migrating Systems

    • Deprecations or End of Life

  •  

  • Change Management (12 minutes)

  • Asset Management (12 minutes)

    • Configuration Management Data base (CMDB)

  •  

  • Patching (1 hour and 12 minutes)

    • Features or Enhancements

    • Fixes for Broken or Critical Infrastructure or Applications

    • Scope of Cloud Elements to Be Patched

    • Software

    • Policies

    • Rollbacks

  •  

  • Impacts of Process Improvements on Systems (12 minutes)

  • Upgrade Methods (1 hour)

    • Rolling Upgrades

    • Blue - Green

    • Canary

    • Active - Passive

    • Development/QA/Production/DR

  •  

  • Dashboard and Reporting (2 hours)

    • Tagging

    • Costs

    • Elasticity Usage

    • Connectivity

    • Latency

    • Capacity

    • Incidents

    • Health

    • Overall Utilization

    • Availability


Lesson 18: Optimize Cloud Environments (2 hours and 48 minutes)

  • Right - sizing (12 minutes)

  • Compute and Storage (12 minutes)

  • Network (1 hour)

    • Bandwidth

    • Network Interface Controllers (NICs)

    • Latency

    • Software - Defined Networks (SDNs)

    • Edge Computing

  •  

  • Placement (48 minutes)

    • Geographical

    • Cluster Placement

    • Redundancy

    • Colocation

  •  

  • Device Drivers and Firmware (36 minutes)

    • Generic

    • Vendor

    • Open Source


Lesson 19: Automation and Orchestration Techniques (3 hours and 12 minutes)

  • Infrastructure as Code (IaC) (12 minutes)

    • Infrastructure Components and Their Integration

  •  

  • Continuous Integration/Continuous Deployment (CI/CD) (12 minutes)

  • Version Control (12 minutes)

  • Configuration Management (12 minutes)

    • Playbook

  •  

  • Containers (12 minutes)

  • Automation Activities (1 hour and 12 minutes)

    • Routine Operations

    • Updates

    • Scaling

    • Shutdowns

    • Restarts

    • Create Internal APIs

  •  

  • Secure Scripting (48 minutes)

    • No Hardcoded Passwords

    • Use of Individual Service Accounts

    • Password Vaults

    • Key - Based Authentication

  •  

  • Orchestration Sequencing (12 minutes)


Lesson 20: Backup and Restore Operations (4 hours and 48 minutes)

  • Backup Types (1 hour)

    • Incremental

    • Differential

    • Full

    • Synthetic Full

    • Snapshot

  •  

  • Backup Objects (48 minutes)

    • Application - Level Backup

    • File - System Backup

    • Database Dumps

    • Configuration Files

  •  

  • Backup Targets (36 minutes)

    • Tape

    • Disk

    • Object

  •  

  • Backup and Restore Policies (1 hour and 36 minutes)

    • Retention

    • Schedules

    • Location

    • Service - Level Agreements (SLAs)

    • Recovery Time Objective (RTO)

    • Recovery Point Objective (RPO)

    • Mean Time to Recovery (MTTR)

    • 3 - 2 - 1 Rule

  •  

  • Restoration Methods (48 minutes)

    • In Place

    • Alternate Location

    • Restore Files

    • Snapshot


Lesson 21: Disaster Recovery Tasks (2 hours and 24 minutes)

  • Failovers (12 minutes)

  • Failback (12 minutes)

  • Restore Backups (12 minutes)

  • Replication (12 minutes)

  • On - Premises and Cloud Sites (36 minutes)

    • Hot

    • Warm

    • Cold

  •  

  • Requirements (12 minutes)

    • Corporate Guidelines

  •  

  • Documentation (36 minutes)

    • DR Kit

    • Playbook

    • Network Diagram

  •  

  • Geographical Data Center Requirements (12 minutes)


Lesson 22: Troubleshooting Methodology (1 hour and 24 minutes)

  • Always Consider Corporate Policies, Procedures, and Impacts Before Implementing Changes (12 minutes)

  • Identify the Problem (12 minutes)

  • Establish a Theory of Probable Cause (Question the Obvious) (12 minutes)

  • Test the Theory to Determine Cause (12 minutes)

  • Establish a Plan of Action to Resolve the Problem and Implement the Solution (12 minutes)

  • Verify Full System Functionality and, if Applicable, Implement Preventive Measures (12 minutes)

  • Document the Findings, Actions, and Outcomes Throughout the Process (12 minutes)


Lesson 23: Troubleshoot Security Issues (4 hours and 36 minutes)

  • Privilege (48 minutes)

    • Missing

    • Incomplete

    • Escalation

    • Keys

  •  

  • Authentication (12 minutes)

  • Authorization (12 minutes)

  • Security Groups (24 minutes)

    • Network Security Groups

    • Directory Security Groups

  •  

  • Keys and Certificates (1 hour)

    • Expired

    • Revoked

    • Trust

    • Compromised

    • Misconfigured

  •  

  • Misconfigured or Misapplied Policies (12 minutes)

  • Data Security Issues (1 hour)

    • Unencrypted Data

    • Data Breaches

    • Misclassification

    • Lack of Encryption in Protocols

    • Insecure Ciphers

  •  

  • Exposed Endpoints (12 minutes)

  • Misconfigured or Failed Security Appliances (12 minutes)

  • Unsupported Protocols (12 minutes)

  • External/Internal Attacks (12 minutes)


Lesson 24: Troubleshoot Deployment, Automation, and Orchestration Issues (4 hours and 24 minutes)

  • Connectivity Issues (12 minutes)

    • Cloud Service Provider (CSP) or Internet Service Provider (ISP) Outages

  •  

  • Performance Degradation (12 minutes)

    • Latency

  •  

  • Configurations (12 minutes)

    • Scripts

  •  

  • Applications in Containers (12 minutes)

  • Misconfigured Templates (12 minutes)

  • Missing or Incorrect Tags (12 minutes)

  • Insufficient Capacity (12 minutes)

  • Licensing Issues (12 minutes)

  • Vendor - Related Issues (48 minutes)

    • Migrations of Vendors or Platforms

    • Integration of Vendors or Platforms

    • API Request Limits

    • Cost or Billing Issues

  •  

  • Account Mismatches (12 minutes)

  • Change Management Failures (12 minutes)

  • Server Name Changes (12 minutes)

  • IP Address Changes (12 minutes)

  • Location Changes (12 minutes)

  • Version/Feature Mismatch (12 minutes)

  • Automation Tool Incompatibility (24 minutes)

    • Deprecated Features

    • API Version Incompatibility

  •  

  • Job Validation Issue (12 minutes)

  • Patching Failure (12 minutes)


Lesson 25: Troubleshooting Connectivity Issues and Common Performance Issues (5 hours and 36 minutes)

  • Network Security Group Misconfigurations (24 minutes)

    • Access Control Lists (ACLs)

    • Inheritance

  •  

  • Common Networking Configuration Issues (2 hours)

    • Peering

    • Incorrect Subnet, IP Address, and IP Space

    • Routes

    • Firewall

    • Network Address Translation (NAT)

    • Load Balancers and DNS Records

    • VLAN/VxLAN/GENEVE and Proxy

    • Maximum Transmission Unit (MTU)

    • Quality of Service (QoS)

    • Time Synchronization Issues

  •  

  • Network Troubleshooting Tools (2 hours and 24 minutes)

    • ping

    • tracert/traceroute

    • flushdns

    • ipconfig/ifconfig/ip

    • nslookup/dig

    • netstat/ss

    • route

    • arp

    • curl

    • Packet Capture

    • Packet Analyzer

    • OpenSSL Client

  •  

  • Resource Utilization (12 minutes)

  • Application (24 minutes)

    • Memory Management

    • Service Overload

  •  

  • Incorrectly Configured or Failed Load Balancing (12 minutes)

bottom of page