top of page

Self Paced
CompTIA Cloud+ (CV0-003)

Price

$199.00

Duration

32 Hours

About the Course

Cloud Deployment Models (1 hour and 24 minutes)

  • Public Cloud

  • Private Cloud

  • Hybrid Cloud

  • Community Cloud

  • Cloud Within a Cloud

  • Multicloud

  • Multitenancy

  •  

  • Cloud Service Models (36 minutes)

    • Infrastructure as a Service (IaaS)

    • Platform as a Service (PaaS)

    • Software as a Service (SaaS)

  •  

  • Advanced Cloud Services (36 minutes)

    • Internet of Things (IoT)

    • Serverless

    • Machine Learning/Artificial Intelligence (AI)

Lesson 2: Capacity Planning (3 hours and 12 minutes)

  • Requirements (48 minutes)

    • Hardware Requirements

    • Software Requirements

    • Budgetary Requirements

    • Business Need Analysis

  •  

  • Standard Templates (12 minutes)

  • Licensing (1 hour)

    • Per - user

    • Socket - based

    • Volume - based

    • Core - based

    • Subscription

  •  

  • User Density (12 minutes)

  • System Load (12 minutes)

  • Trend Analysis (36 minutes)

    • Baselines

    • Patterns

    • Anomalies

  •  

  • Performance Capacity Planning (12 minutes)

Lesson 3: High Availability and Scaling in Cloud Environments (3 hours and 36 minutes)

  • Hypervisors (24 minutes)

    • Affinity

    • Anti - affinity

  •  

  • Oversubscription (36 minutes)

    • Compute

    • Network

    • Storage

  •  

  • Regions and Zones (12 minutes)

  • Applications (12 minutes)

  • Containers (12 minutes)

  • Clusters (12 minutes)

  • High Availability of Network Functions (48 minutes)

    • Switches

    • Routers

    • Load Balancers

    • Firewalls

  •  

  • Avoid Single Points of Failure (1 hour)

    • Scalability

    • Auto - scaling

    • Horizontal Scaling

    • Vertical Scaling

    • Cloud Bursting

Lesson 4: Solution Design in Support of the Business Requirements (4 hours and 12 minutes)

  • Requirement Analysis (1 hour and 48 minutes)

    • Software

    • Hardware

    • Integration

    • Budgetary

    • Compliance

    • Service - Level Agreement (SLA)

    • User and Business Needs

    • Security

    • Network Requirements

  •  

  • Environments (1 hour and 12 minutes)

    • Development

    • Quality Assurance (QA)

    • Staging

    • Blue - Green

    • Production

    • Disaster Recovery (DR)

  •  

  • Testing Techniques (1 hour and 12 minutes)

    • Vulnerability Testing

    • Penetration Testing

    • Performance Testing

    • Regression Testing

    • Functional Testing

    • Usability Testing

Lesson 5: Identity and Access Management (2 hour and 24 minutes)

  • Identification and Authorization (48 minutes)

    • Privileged Access Management (PAM)

    • Logical Access Management

    • Account Lifecycle Management

    • Access Controls

  •  

  • Directory Services (12 minutes)

    • Lightweight Directory Access Protocol (LDAP)

  •  

  • Federation (12 minutes)

  • Certificate Management (12 minutes)

  • Multifactor Authentication (MFA) (12 minutes)

  • Single Sign - On (SSO) (12 minutes)

    • Security Assertion Markup Language (SAML)

  •  

  • Public Key Infrastructure (PKI) (12 minutes)

  • Secret Management (12 minutes)

  • Key Management (12 minutes)

Lesson 6: Secure Network in a Clous Environment (4 hours and 24 minutes)

  • Network Segmentation (36 minutes)

    • Virtual LAN (VLAN)/Virtual Extensible LAN (VxLAN)/ Generic Network Virtualization Encapsulation (GENEVE)

    • Microsegmentation

    • Tiering

  •  

  • Protocols (1 hour)

    • Domain Name Service (DNS)

    • Network Time Protocol (NTP)

    • Network Time Security (NTS)

    • Encryption

    • Tunneling

  •  

  • Network Services (1 hour and 24 minutes)

    • Firewalls

    • Web Application Firewall (WAF)

    • Application Delivery Controller (ADC)

    • Intrusion Protection System (IPS)/Intrusion Detection System (IDS)

    • Data Loss Prevention (DLP)

    • Network Access Control (NAC)

    • Packet Brokers

  •  

  • Log and Event Monitoring (12 minutes)

  • Network Flows (12 minutes)

  • Hardening and Configuration Changes (1 hour)

    • Disabling Unnecessary Ports and Services

    • Disabling Weak Protocols and Ciphers

    • Firmware Upgrades

    • Control Ingress and Egress Traffic

    • Distributed Denial - of - Service (DDoS) Protection

Lesson 7: OS and Application Security Controls (4 hours and 48 minutes)

  • Policies (1 hour)

    • Password Complexity

    • Account Lockout

    • Application Whitelisting

    • Software Feature

    • User/Group

  •  

  • User Permissions (12 minutes)

  • Antivirus/Antimalware/Endpoint Detection and Response (EDR) (12 minutes)

  • Host - Based IDS (HIDS)/Host - Based IPS (HIPS) (12 minutes)

  • Hardened Baselines (12 minutes)

    • Single Function

  •  

  • File Integrity (12 minutes)

  • Log and Event Monitoring (12 minutes)

  • Configuration Management (12 minutes)

  • Builds (48 minutes)

    • Stable

    • Long - Term Support (LTS)

    • Beta

    • Canary

  •  

  • Operating System (OS) Upgrades (12 minutes)

  • Encryption (1 hour)

    • Application Programming Interface (API) Endpoint

    • Application

    • OS

    • Storage

    • Filesystem

  •  

  • Mandatory Access Control (12 minutes)

  • Firewall Software (12 minutes)

Lesson 8: Data Security and Compliance Controls in Cloud Environments (2 hours and 48 minutes)

  • Encryption (12 minutes)

  • Integrity (36 minutes)

    • Hashing Algorithms

    • Digital Signatures

    • File Integrity Monitoring (FIM)

  •  

  • Classification (12 minutes)

  • Segmentation (12 minutes)

  • Access Control (12 minutes)

  • Impact of Laws and Regulations (12 minutes)

    • Legal Hold

  •  

  • Records Management (48 minutes)

    • Versioning

    • Retention

    • Destruction

    • Write Once Read Many

  •  

  • Data Loss Prevention (DLP) (12 minutes)

  • Cloud Access Security Broker (CASB) (12 minutes)

Lesson 9: Security Requirements (3 hours and 12 minutes)

  • Tools (24 minutes)

  • Vulnerability Scanners

    • Port Scanners

  •  

  • Vulnerability Assessment (1 hour)

    • Default and Common Credential Scans

    • Credentialed Scans

    • Network - Based Scans

    • Agent - Based Scans

    • Service Availabilities Scans

  •  

  • Security Patches (1 hour)

    • Hot Fixes

    • Scheduled Updates

    • Virtual Patches

    • Signature Updates

    • Rollups

  •  

  • Risk Register (12 minutes)

  • Prioritization of Patch Applications (12 minutes)

  • Deactivate Default Accounts (12 minutes)

  • Impacts of Security Tools on Systems and Services (12 minutes)

Lesson 10: Incident Response Procedures (1 hour and 48 minutes)

  • Preparation (1 hour and 12 minutes)

    • Documentation

    • Call Trees

    • Training

    • Tabletops

    • Documented Incident Types/Categories

    • Roles and Responsibilities

  •  

  • Incident Response Procedures (36 minutes)

    • Identification

    • Containment, Eradication, and Recovery

    • Post-incident and Lessons Learned

Lesson 11: Integrate Components into a Cloud Solution (4 hours and 24 minutes)

  • Subscription Services (1 hour and 48 minutes)

    • File Subscriptions

    • Communications

    • Collaboration

    • Virtual Desktop Infrastructure (VDI)

    • Directory and Identity Services

    • Cloud Resources

    • IaaS

    • PaaS

    • SaaS

  •  

  • Provisioning Resources (36 minutes)

    • Compute

    • Storage

    • Network

  •  

  • Application (12 minutes)

    • Serverless

  •  

  • Deploying Virtual Machines (VMs) and Custom Images (12 minutes)

  • Templates (24 minutes)

    • OS Templates

    • Solution Templates

  •  

  • Identity Management (12 minutes)

  • Containers (36 minutes)

    • Configure Variables

    • Configure Secrets

    • Persistent Storage

  •  

  • Auto – scaling (12 minutes)

  • Post-deployment Validation (12 minutes)

Lesson 12: Storage in Cloud Environments (5 hours and 12 minutes)

  • Types (36 minutes)

    • Block

    • File

    • Object

  •  

  • Tiers (48 minutes)

    • Flash

    • Hybrid

    • Spinning Disks

    • Long - Term

  •  

  • Input/Output Operations per Second (IOPS) and Read/Write (12 minutes)

  • Protocols (1 hour)

    • Network File System (NFS)

    • Common Internet File System (CIFS)

    • Internet Small Computer System Interface (iSCSI)

    • Fibre Channel (FC)

    • Non - Volatile Memory Express over Fabrics (NVMe - oF)

  •  

  • Redundant Array of Inexpensive Disks (RAID) (1 hour)

    • 0

    • 1

    • 5

    • 6

    • 10

  •  

  • Storage System Features (1 hour)

    • Compression

    • Deduplication

    • Thin Provisioning

    • Thick Provisioning

    • Replication

  •  

  • User Quotas (12 minutes)

  • Hyperconverged (12 minutes)

  • Software - Defined Storage (SDS) (12 minutes)

Lesson 13: Cloud Networking Solutions (4 hours)

  • Services (1 hour)

    • Dynamic Host Configuration Protocol (DHCP)

    • Network Time Protocol (NTP)

    • Domain Name Service (DNS)

    • Content Delivery Network (CDN)

    • IP Address Management (IPAM)

  •  

  • Virtual Private Networks (VPNs) (1 hour)

    • Site - to - site

    • Point - to - Point

    • Point - to - Site

    • IPsec

    • Multiprotocol Label Switching (MPLS)

  •  

  • Virtual Routing (36 minutes)

    • Dynamic and Static Routing

    • Virtual Network Interface Controller (vNIC)

    • Subnetting

  •  

  • Network Appliances (24 minutes)

    • Load Balancers

    • Firewalls

  •  

  • Virtual Private Cloud (VPC) (24 minutes)

    • Hub and Spoke

    • Peering

  •  

  • VLAN/VxLAN/GENEVE (12 minutes)

  • Single Root Input/Output Virtualization (SR - IOV) (12 minutes)

  • Software - Defined Network (SDN) (12 minutes)

Lesson 14: Compute Sizing for a Deployment (2 hours and 12 minutes)

  • Virtualization (48 minutes)

    • Hypervisors

    • Simultaneous Multithreading (SMT)

    • Dynamic Allocations

    • Oversubscription

  •  

  • Central Processing Unit (CPU)/Virtual CPU (vCPU) (12 minutes)

  • Graphics Processing Unit (GPU) (24 minutes)

    • Virtual

    • Pass - through

  •  

  • Clock Speed/Instructions per Cycle (IPC) (12 minutes)

  • Hyperconverged (12 minutes)

  • Memory (24 minutes)

    • Dynamic Allocation

    • Ballooning

Lesson 15: Cloud Migrations (1 hour and 48 minutes)

  • Physical to Virtual (P2V) (12 minutes)

  • Virtual to Virtual (V2V) (12 minutes)

  • Cloud - to - Cloud Migrations (24 minutes)

    • Vendor Lock - in

    • PaaS or SaaS Migrations

  •  

  • Storage Migrations (36 minutes)

    • Block

    • File

    • Object

  •  

  • Database Migrations (24 minutes)

    • Relational

    • Nonrelational

Lesson 16: Logging, Monitoring, And Alerting (4 hours)

  • Logging (1 hour and 24 minutes)

    • Collectors

    • Analysis

    • Severity Categorization

    • Audits

    • Types

    • Automation

    • Trending

  •  

  • Monitoring (1 hour and 48 minutes)

    • Baselines

    • Thresholds

    • Tagging

    • Log Scrubbing

    • Performance Monitoring

    • Resource Utilization

    • Availability

    • Verification of Continuous Monitoring Activities

    • Service Management Tool Integration

  •  

  • Alerting (48 minutes)

    • Common Messaging Methods

    • Enable/Disable Alerts

    • Appropriate Responses

    • Policies for Categorizing and Communicating Alerts

Lesson 17: Operation of a Cloud Environment (5 hours and 48 minutes)

  • Confirm Completion of Backups (12 minutes)

  • Lifecycle Management (48 minutes)

    • Roadmaps

    • Old/Current/New Versions

    • Upgrading and Migrating Systems

    • Deprecations or End of Life

  •  

  • Change Management (12 minutes)

  • Asset Management (12 minutes)

    • Configuration Management Data base (CMDB)

  •  

  • Patching (1 hour and 12 minutes)

    • Features or Enhancements

    • Fixes for Broken or Critical Infrastructure or Applications

    • Scope of Cloud Elements to Be Patched

    • Software

    • Policies

    • Rollbacks

  •  

  • Impacts of Process Improvements on Systems (12 minutes)

  • Upgrade Methods (1 hour)

    • Rolling Upgrades

    • Blue - Green

    • Canary

    • Active - Passive

    • Development/QA/Production/DR

  •  

  • Dashboard and Reporting (2 hours)

    • Tagging

    • Costs

    • Elasticity Usage

    • Connectivity

    • Latency

    • Capacity

    • Incidents

    • Health

    • Overall Utilization

    • Availability

Lesson 18: Optimize Cloud Environments (2 hours and 48 minutes)

  • Right - sizing (12 minutes)

  • Compute and Storage (12 minutes)

  • Network (1 hour)

    • Bandwidth

    • Network Interface Controllers (NICs)

    • Latency

    • Software - Defined Networks (SDNs)

    • Edge Computing

  •  

  • Placement (48 minutes)

    • Geographical

    • Cluster Placement

    • Redundancy

    • Colocation

  •  

  • Device Drivers and Firmware (36 minutes)

    • Generic

    • Vendor

    • Open Source

Lesson 19: Automation and Orchestration Techniques (3 hours and 12 minutes)

  • Infrastructure as Code (IaC) (12 minutes)

    • Infrastructure Components and Their Integration

  •  

  • Continuous Integration/Continuous Deployment (CI/CD) (12 minutes)

  • Version Control (12 minutes)

  • Configuration Management (12 minutes)

    • Playbook

  •  

  • Containers (12 minutes)

  • Automation Activities (1 hour and 12 minutes)

    • Routine Operations

    • Updates

    • Scaling

    • Shutdowns

    • Restarts

    • Create Internal APIs

  •  

  • Secure Scripting (48 minutes)

    • No Hardcoded Passwords

    • Use of Individual Service Accounts

    • Password Vaults

    • Key - Based Authentication

  •  

  • Orchestration Sequencing (12 minutes)

Lesson 20: Backup and Restore Operations (4 hours and 48 minutes)

  • Backup Types (1 hour)

    • Incremental

    • Differential

    • Full

    • Synthetic Full

    • Snapshot

  •  

  • Backup Objects (48 minutes)

    • Application - Level Backup

    • File - System Backup

    • Database Dumps

    • Configuration Files

  •  

  • Backup Targets (36 minutes)

    • Tape

    • Disk

    • Object

  •  

  • Backup and Restore Policies (1 hour and 36 minutes)

    • Retention

    • Schedules

    • Location

    • Service - Level Agreements (SLAs)

    • Recovery Time Objective (RTO)

    • Recovery Point Objective (RPO)

    • Mean Time to Recovery (MTTR)

    • 3 - 2 - 1 Rule

  •  

  • Restoration Methods (48 minutes)

    • In Place

    • Alternate Location

    • Restore Files

    • Snapshot

Lesson 21: Disaster Recovery Tasks (2 hours and 24 minutes)

  • Failovers (12 minutes)

  • Failback (12 minutes)

  • Restore Backups (12 minutes)

  • Replication (12 minutes)

  • On - Premises and Cloud Sites (36 minutes)

    • Hot

    • Warm

    • Cold

  •  

  • Requirements (12 minutes)

    • Corporate Guidelines

  •  

  • Documentation (36 minutes)

    • DR Kit

    • Playbook

    • Network Diagram

  •  

  • Geographical Data Center Requirements (12 minutes)

Lesson 22: Troubleshooting Methodology (1 hour and 24 minutes)

  • Always Consider Corporate Policies, Procedures, and Impacts Before Implementing Changes (12 minutes)

  • Identify the Problem (12 minutes)

  • Establish a Theory of Probable Cause (Question the Obvious) (12 minutes)

  • Test the Theory to Determine Cause (12 minutes)

  • Establish a Plan of Action to Resolve the Problem and Implement the Solution (12 minutes)

  • Verify Full System Functionality and, if Applicable, Implement Preventive Measures (12 minutes)

  • Document the Findings, Actions, and Outcomes Throughout the Process (12 minutes)

Lesson 23: Troubleshoot Security Issues (4 hours and 36 minutes)

  • Privilege (48 minutes)

    • Missing

    • Incomplete

    • Escalation

    • Keys

  •  

  • Authentication (12 minutes)

  • Authorization (12 minutes)

  • Security Groups (24 minutes)

    • Network Security Groups

    • Directory Security Groups

  •  

  • Keys and Certificates (1 hour)

    • Expired

    • Revoked

    • Trust

    • Compromised

    • Misconfigured

  •  

  • Misconfigured or Misapplied Policies (12 minutes)

  • Data Security Issues (1 hour)

    • Unencrypted Data

    • Data Breaches

    • Misclassification

    • Lack of Encryption in Protocols

    • Insecure Ciphers

  •  

  • Exposed Endpoints (12 minutes)

  • Misconfigured or Failed Security Appliances (12 minutes)

  • Unsupported Protocols (12 minutes)

  • External/Internal Attacks (12 minutes)

Lesson 24: Troubleshoot Deployment, Automation, and Orchestration Issues (4 hours and 24 minutes)

  • Connectivity Issues (12 minutes)

    • Cloud Service Provider (CSP) or Internet Service Provider (ISP) Outages

  •  

  • Performance Degradation (12 minutes)

    • Latency

  •  

  • Configurations (12 minutes)

    • Scripts

  •  

  • Applications in Containers (12 minutes)

  • Misconfigured Templates (12 minutes)

  • Missing or Incorrect Tags (12 minutes)

  • Insufficient Capacity (12 minutes)

  • Licensing Issues (12 minutes)

  • Vendor - Related Issues (48 minutes)

    • Migrations of Vendors or Platforms

    • Integration of Vendors or Platforms

    • API Request Limits

    • Cost or Billing Issues

  •  

  • Account Mismatches (12 minutes)

  • Change Management Failures (12 minutes)

  • Server Name Changes (12 minutes)

  • IP Address Changes (12 minutes)

  • Location Changes (12 minutes)

  • Version/Feature Mismatch (12 minutes)

  • Automation Tool Incompatibility (24 minutes)

    • Deprecated Features

    • API Version Incompatibility

  •  

  • Job Validation Issue (12 minutes)

  • Patching Failure (12 minutes)

Lesson 25: Troubleshooting Connectivity Issues and Common Performance Issues (5 hours and 36 minutes)

  • Network Security Group Misconfigurations (24 minutes)

    • Access Control Lists (ACLs)

    • Inheritance

  •  

  • Common Networking Configuration Issues (2 hours)

    • Peering

    • Incorrect Subnet, IP Address, and IP Space

    • Routes

    • Firewall

    • Network Address Translation (NAT)

    • Load Balancers and DNS Records

    • VLAN/VxLAN/GENEVE and Proxy

    • Maximum Transmission Unit (MTU)

    • Quality of Service (QoS)

    • Time Synchronization Issues

  •  

  • Network Troubleshooting Tools (2 hours and 24 minutes)

    • ping

    • tracert/traceroute

    • flushdns

    • ipconfig/ifconfig/ip

    • nslookup/dig

    • netstat/ss

    • route

    • arp

    • curl

    • Packet Capture

    • Packet Analyzer

    • OpenSSL Client

  •  

  • Resource Utilization (12 minutes)

  • Application (24 minutes)

    • Memory Management

    • Service Overload

  •  

  • Incorrectly Configured or Failed Load Balancing (12 minutes)

bottom of page