About the Course
Cloud Deployment Models (1 hour and 24 minutes)
Public Cloud
Private Cloud
Hybrid Cloud
Community Cloud
Cloud Within a Cloud
Multicloud
Multitenancy
Â
Cloud Service Models (36 minutes)
Infrastructure as a Service (IaaS)
Platform as a Service (PaaS)
Software as a Service (SaaS)
Â
Advanced Cloud Services (36 minutes)
Internet of Things (IoT)
Serverless
Machine Learning/Artificial Intelligence (AI)
Lesson 2: Capacity Planning (3 hours and 12 minutes)
Requirements (48 minutes)
Hardware Requirements
Software Requirements
Budgetary Requirements
Business Need Analysis
Â
Standard Templates (12 minutes)
Licensing (1 hour)
Per - user
Socket - based
Volume - based
Core - based
Subscription
Â
User Density (12 minutes)
System Load (12 minutes)
Trend Analysis (36 minutes)
Baselines
Patterns
Anomalies
Â
Performance Capacity Planning (12 minutes)
Lesson 3: High Availability and Scaling in Cloud Environments (3 hours and 36 minutes)
Hypervisors (24 minutes)
Affinity
Anti - affinity
Â
Oversubscription (36 minutes)
Compute
Network
Storage
Â
Regions and Zones (12 minutes)
Applications (12 minutes)
Containers (12 minutes)
Clusters (12 minutes)
High Availability of Network Functions (48 minutes)
Switches
Routers
Load Balancers
Firewalls
Â
Avoid Single Points of Failure (1 hour)
Scalability
Auto - scaling
Horizontal Scaling
Vertical Scaling
Cloud Bursting
Lesson 4: Solution Design in Support of the Business Requirements (4 hours and 12 minutes)
Requirement Analysis (1 hour and 48 minutes)
Software
Hardware
Integration
Budgetary
Compliance
Service - Level Agreement (SLA)
User and Business Needs
Security
Network Requirements
Â
Environments (1 hour and 12 minutes)
Development
Quality Assurance (QA)
Staging
Blue - Green
Production
Disaster Recovery (DR)
Â
Testing Techniques (1 hour and 12 minutes)
Vulnerability Testing
Penetration Testing
Performance Testing
Regression Testing
Functional Testing
Usability Testing
Lesson 5: Identity and Access Management (2 hour and 24 minutes)
Identification and Authorization (48 minutes)
Privileged Access Management (PAM)
Logical Access Management
Account Lifecycle Management
Access Controls
Â
Directory Services (12 minutes)
Lightweight Directory Access Protocol (LDAP)
Â
Federation (12 minutes)
Certificate Management (12 minutes)
Multifactor Authentication (MFA) (12 minutes)
Single Sign - On (SSO) (12 minutes)
Security Assertion Markup Language (SAML)
Â
Public Key Infrastructure (PKI) (12 minutes)
Secret Management (12 minutes)
Key Management (12 minutes)
Lesson 6: Secure Network in a Clous Environment (4 hours and 24 minutes)
Network Segmentation (36 minutes)
Virtual LAN (VLAN)/Virtual Extensible LAN (VxLAN)/ Generic Network Virtualization Encapsulation (GENEVE)
Microsegmentation
Tiering
Â
Protocols (1 hour)
Domain Name Service (DNS)
Network Time Protocol (NTP)
Network Time Security (NTS)
Encryption
Tunneling
Â
Network Services (1 hour and 24 minutes)
Firewalls
Web Application Firewall (WAF)
Application Delivery Controller (ADC)
Intrusion Protection System (IPS)/Intrusion Detection System (IDS)
Data Loss Prevention (DLP)
Network Access Control (NAC)
Packet Brokers
Â
Log and Event Monitoring (12 minutes)
Network Flows (12 minutes)
Hardening and Configuration Changes (1 hour)
Disabling Unnecessary Ports and Services
Disabling Weak Protocols and Ciphers
Firmware Upgrades
Control Ingress and Egress Traffic
Distributed Denial - of - Service (DDoS) Protection
Lesson 7: OS and Application Security Controls (4 hours and 48 minutes)
Policies (1 hour)
Password Complexity
Account Lockout
Application Whitelisting
Software Feature
User/Group
Â
User Permissions (12 minutes)
Antivirus/Antimalware/Endpoint Detection and Response (EDR) (12 minutes)
Host - Based IDS (HIDS)/Host - Based IPS (HIPS) (12 minutes)
Hardened Baselines (12 minutes)
Single Function
Â
File Integrity (12 minutes)
Log and Event Monitoring (12 minutes)
Configuration Management (12 minutes)
Builds (48 minutes)
Stable
Long - Term Support (LTS)
Beta
Canary
Â
Operating System (OS) Upgrades (12 minutes)
Encryption (1 hour)
Application Programming Interface (API) Endpoint
Application
OS
Storage
Filesystem
Â
Mandatory Access Control (12 minutes)
Firewall Software (12 minutes)
Lesson 8: Data Security and Compliance Controls in Cloud Environments (2 hours and 48 minutes)
Encryption (12 minutes)
Integrity (36 minutes)
Hashing Algorithms
Digital Signatures
File Integrity Monitoring (FIM)
Â
Classification (12 minutes)
Segmentation (12 minutes)
Access Control (12 minutes)
Impact of Laws and Regulations (12 minutes)
Legal Hold
Â
Records Management (48 minutes)
Versioning
Retention
Destruction
Write Once Read Many
Â
Data Loss Prevention (DLP) (12 minutes)
Cloud Access Security Broker (CASB) (12 minutes)
Lesson 9: Security Requirements (3 hours and 12 minutes)
Tools (24 minutes)
Vulnerability Scanners
Port Scanners
Â
Vulnerability Assessment (1 hour)
Default and Common Credential Scans
Credentialed Scans
Network - Based Scans
Agent - Based Scans
Service Availabilities Scans
Â
Security Patches (1 hour)
Hot Fixes
Scheduled Updates
Virtual Patches
Signature Updates
Rollups
Â
Risk Register (12 minutes)
Prioritization of Patch Applications (12 minutes)
Deactivate Default Accounts (12 minutes)
Impacts of Security Tools on Systems and Services (12 minutes)
Lesson 10: Incident Response Procedures (1 hour and 48 minutes)
Preparation (1 hour and 12 minutes)
Documentation
Call Trees
Training
Tabletops
Documented Incident Types/Categories
Roles and Responsibilities
Â
Incident Response Procedures (36 minutes)
Identification
Containment, Eradication, and Recovery
Post-incident and Lessons Learned
Lesson 11: Integrate Components into a Cloud Solution (4 hours and 24 minutes)
Subscription Services (1 hour and 48 minutes)
File Subscriptions
Communications
Collaboration
Virtual Desktop Infrastructure (VDI)
Directory and Identity Services
Cloud Resources
IaaS
PaaS
SaaS
Â
Provisioning Resources (36 minutes)
Compute
Storage
Network
Â
Application (12 minutes)
Serverless
Â
Deploying Virtual Machines (VMs) and Custom Images (12 minutes)
Templates (24 minutes)
OS Templates
Solution Templates
Â
Identity Management (12 minutes)
Containers (36 minutes)
Configure Variables
Configure Secrets
Persistent Storage
Â
Auto – scaling (12 minutes)
Post-deployment Validation (12 minutes)
Lesson 12: Storage in Cloud Environments (5 hours and 12 minutes)
Types (36 minutes)
Block
File
Object
Â
Tiers (48 minutes)
Flash
Hybrid
Spinning Disks
Long - Term
Â
Input/Output Operations per Second (IOPS) and Read/Write (12 minutes)
Protocols (1 hour)
Network File System (NFS)
Common Internet File System (CIFS)
Internet Small Computer System Interface (iSCSI)
Fibre Channel (FC)
Non - Volatile Memory Express over Fabrics (NVMe - oF)
Â
Redundant Array of Inexpensive Disks (RAID) (1 hour)
0
1
5
6
10
Â
Storage System Features (1 hour)
Compression
Deduplication
Thin Provisioning
Thick Provisioning
Replication
Â
User Quotas (12 minutes)
Hyperconverged (12 minutes)
Software - Defined Storage (SDS) (12 minutes)
Lesson 13: Cloud Networking Solutions (4 hours)
Services (1 hour)
Dynamic Host Configuration Protocol (DHCP)
Network Time Protocol (NTP)
Domain Name Service (DNS)
Content Delivery Network (CDN)
IP Address Management (IPAM)
Â
Virtual Private Networks (VPNs) (1 hour)
Site - to - site
Point - to - Point
Point - to - Site
IPsec
Multiprotocol Label Switching (MPLS)
Â
Virtual Routing (36 minutes)
Dynamic and Static Routing
Virtual Network Interface Controller (vNIC)
Subnetting
Â
Network Appliances (24 minutes)
Load Balancers
Firewalls
Â
Virtual Private Cloud (VPC) (24 minutes)
Hub and Spoke
Peering
Â
VLAN/VxLAN/GENEVE (12 minutes)
Single Root Input/Output Virtualization (SR - IOV) (12 minutes)
Software - Defined Network (SDN) (12 minutes)
Lesson 14: Compute Sizing for a Deployment (2 hours and 12 minutes)
Virtualization (48 minutes)
Hypervisors
Simultaneous Multithreading (SMT)
Dynamic Allocations
Oversubscription
Â
Central Processing Unit (CPU)/Virtual CPU (vCPU) (12 minutes)
Graphics Processing Unit (GPU) (24 minutes)
Virtual
Pass - through
Â
Clock Speed/Instructions per Cycle (IPC) (12 minutes)
Hyperconverged (12 minutes)
Memory (24 minutes)
Dynamic Allocation
Ballooning
Lesson 15: Cloud Migrations (1 hour and 48 minutes)
Physical to Virtual (P2V) (12 minutes)
Virtual to Virtual (V2V) (12 minutes)
Cloud - to - Cloud Migrations (24 minutes)
Vendor Lock - in
PaaS or SaaS Migrations
Â
Storage Migrations (36 minutes)
Block
File
Object
Â
Database Migrations (24 minutes)
Relational
Nonrelational
Lesson 16: Logging, Monitoring, And Alerting (4 hours)
Logging (1 hour and 24 minutes)
Collectors
Analysis
Severity Categorization
Audits
Types
Automation
Trending
Â
Monitoring (1 hour and 48 minutes)
Baselines
Thresholds
Tagging
Log Scrubbing
Performance Monitoring
Resource Utilization
Availability
Verification of Continuous Monitoring Activities
Service Management Tool Integration
Â
Alerting (48 minutes)
Common Messaging Methods
Enable/Disable Alerts
Appropriate Responses
Policies for Categorizing and Communicating Alerts
Lesson 17: Operation of a Cloud Environment (5 hours and 48 minutes)
Confirm Completion of Backups (12 minutes)
Lifecycle Management (48 minutes)
Roadmaps
Old/Current/New Versions
Upgrading and Migrating Systems
Deprecations or End of Life
Â
Change Management (12 minutes)
Asset Management (12 minutes)
Configuration Management Data base (CMDB)
Â
Patching (1 hour and 12 minutes)
Features or Enhancements
Fixes for Broken or Critical Infrastructure or Applications
Scope of Cloud Elements to Be Patched
Software
Policies
Rollbacks
Â
Impacts of Process Improvements on Systems (12 minutes)
Upgrade Methods (1 hour)
Rolling Upgrades
Blue - Green
Canary
Active - Passive
Development/QA/Production/DR
Â
Dashboard and Reporting (2 hours)
Tagging
Costs
Elasticity Usage
Connectivity
Latency
Capacity
Incidents
Health
Overall Utilization
Availability
Lesson 18: Optimize Cloud Environments (2 hours and 48 minutes)
Right - sizing (12 minutes)
Compute and Storage (12 minutes)
Network (1 hour)
Bandwidth
Network Interface Controllers (NICs)
Latency
Software - Defined Networks (SDNs)
Edge Computing
Â
Placement (48 minutes)
Geographical
Cluster Placement
Redundancy
Colocation
Â
Device Drivers and Firmware (36 minutes)
Generic
Vendor
Open Source
Lesson 19: Automation and Orchestration Techniques (3 hours and 12 minutes)
Infrastructure as Code (IaC) (12 minutes)
Infrastructure Components and Their Integration
Â
Continuous Integration/Continuous Deployment (CI/CD) (12 minutes)
Version Control (12 minutes)
Configuration Management (12 minutes)
Playbook
Â
Containers (12 minutes)
Automation Activities (1 hour and 12 minutes)
Routine Operations
Updates
Scaling
Shutdowns
Restarts
Create Internal APIs
Â
Secure Scripting (48 minutes)
No Hardcoded Passwords
Use of Individual Service Accounts
Password Vaults
Key - Based Authentication
Â
Orchestration Sequencing (12 minutes)
Lesson 20: Backup and Restore Operations (4 hours and 48 minutes)
Backup Types (1 hour)
Incremental
Differential
Full
Synthetic Full
Snapshot
Â
Backup Objects (48 minutes)
Application - Level Backup
File - System Backup
Database Dumps
Configuration Files
Â
Backup Targets (36 minutes)
Tape
Disk
Object
Â
Backup and Restore Policies (1 hour and 36 minutes)
Retention
Schedules
Location
Service - Level Agreements (SLAs)
Recovery Time Objective (RTO)
Recovery Point Objective (RPO)
Mean Time to Recovery (MTTR)
3 - 2 - 1 Rule
Â
Restoration Methods (48 minutes)
In Place
Alternate Location
Restore Files
Snapshot
Lesson 21: Disaster Recovery Tasks (2 hours and 24 minutes)
Failovers (12 minutes)
Failback (12 minutes)
Restore Backups (12 minutes)
Replication (12 minutes)
On - Premises and Cloud Sites (36 minutes)
Hot
Warm
Cold
Â
Requirements (12 minutes)
Corporate Guidelines
Â
Documentation (36 minutes)
DR Kit
Playbook
Network Diagram
Â
Geographical Data Center Requirements (12 minutes)
Lesson 22: Troubleshooting Methodology (1 hour and 24 minutes)
Always Consider Corporate Policies, Procedures, and Impacts Before Implementing Changes (12 minutes)
Identify the Problem (12 minutes)
Establish a Theory of Probable Cause (Question the Obvious) (12 minutes)
Test the Theory to Determine Cause (12 minutes)
Establish a Plan of Action to Resolve the Problem and Implement the Solution (12 minutes)
Verify Full System Functionality and, if Applicable, Implement Preventive Measures (12 minutes)
Document the Findings, Actions, and Outcomes Throughout the Process (12 minutes)
Lesson 23: Troubleshoot Security Issues (4 hours and 36 minutes)
Privilege (48 minutes)
Missing
Incomplete
Escalation
Keys
Â
Authentication (12 minutes)
Authorization (12 minutes)
Security Groups (24 minutes)
Network Security Groups
Directory Security Groups
Â
Keys and Certificates (1 hour)
Expired
Revoked
Trust
Compromised
Misconfigured
Â
Misconfigured or Misapplied Policies (12 minutes)
Data Security Issues (1 hour)
Unencrypted Data
Data Breaches
Misclassification
Lack of Encryption in Protocols
Insecure Ciphers
Â
Exposed Endpoints (12 minutes)
Misconfigured or Failed Security Appliances (12 minutes)
Unsupported Protocols (12 minutes)
External/Internal Attacks (12 minutes)
Lesson 24: Troubleshoot Deployment, Automation, and Orchestration Issues (4 hours and 24 minutes)
Connectivity Issues (12 minutes)
Cloud Service Provider (CSP) or Internet Service Provider (ISP) Outages
Â
Performance Degradation (12 minutes)
Latency
Â
Configurations (12 minutes)
Scripts
Â
Applications in Containers (12 minutes)
Misconfigured Templates (12 minutes)
Missing or Incorrect Tags (12 minutes)
Insufficient Capacity (12 minutes)
Licensing Issues (12 minutes)
Vendor - Related Issues (48 minutes)
Migrations of Vendors or Platforms
Integration of Vendors or Platforms
API Request Limits
Cost or Billing Issues
Â
Account Mismatches (12 minutes)
Change Management Failures (12 minutes)
Server Name Changes (12 minutes)
IP Address Changes (12 minutes)
Location Changes (12 minutes)
Version/Feature Mismatch (12 minutes)
Automation Tool Incompatibility (24 minutes)
Deprecated Features
API Version Incompatibility
Â
Job Validation Issue (12 minutes)
Patching Failure (12 minutes)
Lesson 25: Troubleshooting Connectivity Issues and Common Performance Issues (5 hours and 36 minutes)
Network Security Group Misconfigurations (24 minutes)
Access Control Lists (ACLs)
Inheritance
Â
Common Networking Configuration Issues (2 hours)
Peering
Incorrect Subnet, IP Address, and IP Space
Routes
Firewall
Network Address Translation (NAT)
Load Balancers and DNS Records
VLAN/VxLAN/GENEVE and Proxy
Maximum Transmission Unit (MTU)
Quality of Service (QoS)
Time Synchronization Issues
Â
Network Troubleshooting Tools (2 hours and 24 minutes)
ping
tracert/traceroute
flushdns
ipconfig/ifconfig/ip
nslookup/dig
netstat/ss
route
arp
curl
Packet Capture
Packet Analyzer
OpenSSL Client
Â
Resource Utilization (12 minutes)
Application (24 minutes)
Memory Management
Service Overload
Â
Incorrectly Configured or Failed Load Balancing (12 minutes)